List of questions
Related questions
Question 54 - 301a discussion
An LTM Specialist has noticed in the audit log that there are numerous attempts to log into the Admin account. Theses attempts are sourced from a suspicious IP address range to the Configuration Utility of the LTM device.
How should the LTM Specialist block these attempts?
A.
add the permitted source IP addresses to the httpd allow list via tmsh
B.
add the suspicious source IP addresses to the httpd deny list via tmsh
C.
add the suspicious source IP addresses to the httpd deny list via Configuration Utility
D.
add the permitted source IP addresses to the allow list via Configuration Utility
Your answer:
0 comments
Sorted by
Leave a comment first