F5 BIG-IP ASM Specialist 303 Question # 16 Topic 2 Discussion

F5 BIG-IP ASM Specialist 303 Question # 16 Topic 2 Discussion

303 Exam Topic 2 Question 16 Discussion:
Question #: 16
Topic #: 2

An LTM Specialist has noticed in the audit log that there are numerous attempts to loginto the Admin account. Theses attempts are sourced from a suspicious IP address range to the Configuration Utility of the LTM device.

How should the LTM Specialist block these attempts?


A.

add the permitted source IP addresses to the httpd allow list viatmsh


B.

add the suspicious source IP addresses to the httpd deny list via tmsh


C.

add the suspicious source IP addresses to the httpd deny list via Configuration Utility


D.

add the permitted source IP addresses to the allow list viaConfiguration Utility


Get Premium 303 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.