Vcehome > F5 > F5 Certification > F50-536 > F50-536 Online Practice Questions and Answers

F50-536 Online Practice Questions and Answers

Questions 4

Which of the following does not pertain to protecting the Requested Resource (URI) element?

A. File type validation

B. URL name validation

C. Domain cookie validation

D. Attack signature validation

Browse 50 Q&As
Questions 5

Which of the following protocol protections is not provided by the Protocol Security Manager?

A. FTP

B. SSH

C. HTTP

D. SMTP

Browse 50 Q&As
Questions 6

Which of the following methods of protection is not available within the Protocol Security Manager for HTTP traffic?

A. Data guard

B. Attack signatures

C. Evasion techniques

D. File type enforcement

Browse 50 Q&As
Questions 7

Logging profiles are assigned to?

A. HTTP class

B. Security policies

C. Web applications

D. Attack signatures

Browse 50 Q&As
Questions 8

An HTTP class is available

A. on any BIG-IP LTM system

B. only when ASM is licensed.

C. only when ASM or WA are licensed.

D. only when a specific license key is required.

Browse 50 Q&As
Questions 9

Which of the following mitigation techniques is based on anomaly detection? (Choose 2)

A. Brute force attack prevention

B. Cross-site request forgery prevention

C. Web scraping attack prevention

D. Parameter tampering prevention

Browse 50 Q&As
Questions 10

When configuring the BIG-IP ASM System in redundant pairs, which of the following are synchronized? (Choose 2)

A. License file

B. Security policies

C. Web applications

D. Request information

E. Traffic learning information

Browse 50 Q&As
Questions 11

A user is building a security policy using the Deployment Wizard and the Rapid Deployment application template. By default, which settings will be applied to the security policy? (Choose 3)

A. Data Guard will be enabled.

B. The enforcement mode will be set to transparent.

C. The encoding language will be set to auto detect.

D. Wildcard tightening will be enabled on file types and parameters.

E. The Attack signature set applied will be Generic Detection Signatures.

Browse 50 Q&As
Questions 12

Which of the following are properties of an ASM logging profile? (Choose 2)

A. storage type

B. storage filter

C. storage policy

D. web application

Browse 50 Q&As
Questions 13

The Web Application Security Administrator user role can perform which of the following functions? (Choose 2)

A. Modify HTTP class profiles

B. Create new HTTP class profiles

C. Create new Attack signature sets

D. Assign HTTP class profiles to virtual servers

E. Configure Advanced options within the BIG-IP ASM System

Browse 50 Q&As
Exam Code: F50-536
Exam Name: BIG-IP ASM v10.x
Last Update: May 11, 2024
Questions: 50 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99