Pass4itsure > F5 > F5 Certification > F50-536 > F50-536 Online Practice Questions and Answers

F50-536 Online Practice Questions and Answers

Questions 4

Which of the following is correct regarding User-defined Attack signatures?

A. User-defined signatures use an F5-supplied syntax

B. User-defined signatures may only use regular expressions

C. Attack signatures may be grouped within system-supplied signatures

D. User-defined signatures may not be applied globally within the entire policy

Buy Now
Questions 5

In the following configuration, a virtual server has the following HTTP class configuration:

HTTP Class 1 = Host pattern www.f5.com

HTTP Class 2 = No filters

A request arriving for WWW.F5.COM will be matched by which class(es)?

A. Class 1

B. Class 2

C. Both Class 1 and Class 2

D. The request will be dropped

Buy Now
Questions 6

Logging profiles are assigned to?

A. HTTP class

B. Security policies

C. Web applications

D. Attack signatures

Buy Now
Questions 7

Which of the following methods of protection operates on server responses?

A. Dynamic parameter protection

B. Response code validation and response scrubbing

C. Response code validation and HTTP method validation

D. HTTP RFC compliancy check and meta-character enforcement

Buy Now
Questions 8

A request is sent to the BIG-IP ASM System that generates a Length error violation. Which of the following length types provides a valid learning suggestion? (Choose 3)

A. URL

B. Cookie

C. Response

D. POST data

E. Query string

Buy Now
Questions 9

When configuring the BIG-IP ASM System in redundant pairs, which of the following are synchronized? (Choose 2)

A. License file

B. Security policies

C. Web applications

D. Request information

E. Traffic learning information

Buy Now
Questions 10

Sensitive parameters is a feature used to hide sensitive information from being displayed in which of the following?

A. Client request

B. Server response

C. GUI and logs of BIG-IP ASM System

D. Configuration file of BIG-IP ASM System

Buy Now
Questions 11

Tightening is a feature of which type of entity?

A. Explicit URLs

B. Attack signatures

C. Flow login URLs

D. Wildcard parameters

Buy Now
Questions 12

Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?

A. HTTP RFC compliancy checks

B. Length restrictions and attack signatures

C. Length restrictions and site cookie compliancy checks

D. Meta-character enforcement and HTTP RFC compliancy check

Buy Now
Questions 13

Which of the following storage type combinations are configurable in an ASM logging profile?

A. Local and Syslog

B. Local and Remote

C. Remote and Syslog

D. Remote and Reporting Server

Buy Now
Exam Code: F50-536
Exam Name: BIG-IP ASM v10.x
Last Update: Apr 22, 2024
Questions: 50
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99