New Syslog servers have been deployed in an organization. The BIG-IP Administrator must
reconfigure the BIG-IP system to send log messages to these servers.
In which location in the Configuration Utility can the BIG-IP Administrator make the needed
configuration changes to accomplish this? (Choose one answer)
The BIG-IP Administrator suspects unauthorized SSH login attempts on the BIG-IP system. Which log file would contain details of these attempts? (Choose one answer)
The BIG-IP Administrator suspects unauthorized SSH login attempts on the BIG-IP system. Which log file would contain details of these attempts? (Choose one answer)