A BIG-IP Administrator needs to determine who changed a Virtual Server configuration.
In which log file would the BIG-IP Administrator find this data? (Choose one answer)
The BIG-IP Administrator suspects unauthorized SSH login attempts on the BIG-IP system. Which log file would contain details of these attempts? (Choose one answer)
A BIG-IP Administrator needs to determine who changed a Virtual Server configuration.
In which log file would the BIG-IP Administrator find this data? (Choose one answer)