Which of the following are correct regarding Wildcard entities? (Choose 2)
A. Wildcard entities are the basis for positive security logic.
B. Wildcard entities are the basis for negative security logic.
C. Wildcard entities require the need to learn only from violations.
D. Wildcard entities can be applied to file types, URLs, cookies and parameters.
Learning suggestions in the Policy Building pages allow for which of the following? (Choose 2)
A. XML-based parameters and associated schema are automatically learned.
B. Blocking response pages can be automatically generated from web site content.
C. Flow level parameters are displayed when found and can be accepted into the current policy.
D. The administrator may modify whether the BIG-IP ASM System will learn, alarm, or block detected violations.
E. Maximum acceptable values for length violations are calculated and can be accepted into the security policy by the administrator.
Which of the following can be associated with an XML profile?
A. Flow
B. Method
C. Parameter
D. File type
Which of the following methods of protection operates on server responses?
A. Dynamic parameter protection
B. Response code validation and response scrubbing
C. Response code validation and HTTP method validation
D. HTTP RFC compliancy check and meta-character enforcement
When configuring the BIG-IP ASM System in redundant pairs, which of the following are synchronized? (Choose 2)
A. License file
B. Security policies
C. Web applications
D. Request information
E. Traffic learning information
Tightening is a feature of which type of entity?
A. Explicit URLs
B. Attack signatures
C. Flow login URLs
D. Wildcard parameters
Which of the following is correct concerning HTTP classes?
A. A single web application can be used by several HTTP classes
B. A virtual server can only have one web application associated with it
C. A single ASM enabled HTTP class can be used by multiple virtual servers
D. Each ASM enabled HTTP class can have several active security policies associated with it
Which method of protection is not provided by the Rapid Deployment policy template?
A. Data leakage
B. Buffer overflow
C. HTTP protocol compliance
D. Dynamic parameter validation
The Web Application Security Administrator user role can perform which of the following functions? (Choose 2)
A. Modify HTTP class profiles
B. Create new HTTP class profiles
C. Create new Attack signature sets
D. Assign HTTP class profiles to virtual servers
E. Configure Advanced options within the BIG-IP ASM System
The following request is sent to the BIG-IP ASM System:
GET http://www.example.local/financials/week1.xls?display=yesanduser=johnandlogon=true
Which of the following components in this requests line represent the query string?
A. .xls
B. /week1.xls
C. /financials/week1.xls
D. display=yesanduser=johnandlogon=true