Which of the following does not pertain to protecting the Requested Resource (URI) element?
A. File type validation
B. URL name validation
C. Domain cookie validation
D. Attack signature validation
Which of the following protocol protections is not provided by the Protocol Security Manager?
A. FTP
B. SSH
C. HTTP
D. SMTP
Which of the following methods of protection is not available within the Protocol Security Manager for HTTP traffic?
A. Data guard
B. Attack signatures
C. Evasion techniques
D. File type enforcement
Logging profiles are assigned to?
A. HTTP class
B. Security policies
C. Web applications
D. Attack signatures
An HTTP class is available
A. on any BIG-IP LTM system
B. only when ASM is licensed.
C. only when ASM or WA are licensed.
D. only when a specific license key is required.
Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A. Brute force attack prevention
B. Cross-site request forgery prevention
C. Web scraping attack prevention
D. Parameter tampering prevention
When configuring the BIG-IP ASM System in redundant pairs, which of the following are synchronized? (Choose 2)
A. License file
B. Security policies
C. Web applications
D. Request information
E. Traffic learning information
A user is building a security policy using the Deployment Wizard and the Rapid Deployment application template. By default, which settings will be applied to the security policy? (Choose 3)
A. Data Guard will be enabled.
B. The enforcement mode will be set to transparent.
C. The encoding language will be set to auto detect.
D. Wildcard tightening will be enabled on file types and parameters.
E. The Attack signature set applied will be Generic Detection Signatures.
Which of the following are properties of an ASM logging profile? (Choose 2)
A. storage type
B. storage filter
C. storage policy
D. web application
The Web Application Security Administrator user role can perform which of the following functions? (Choose 2)
A. Modify HTTP class profiles
B. Create new HTTP class profiles
C. Create new Attack signature sets
D. Assign HTTP class profiles to virtual servers
E. Configure Advanced options within the BIG-IP ASM System