Want to pass your BIG-IP ASM v10.x F50-536 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
In the following configuration, a virtual server has the following HTTP class configuration:
HTTP Class 1 = Host pattern www.f5.com
HTTP Class 2 = No filters
A request arriving for WWW.F5.COM will be matched by which class(es)?
A. Class 1
B. Class 2
C. Both Class 1 and Class 2
D. The request will be dropped
When building a policy based on live traffic using the automated policy builder, which of the following elements will not be taken into account when analyzing the traffic?
A. The size of the response
B. The requested resource (URI)
C. The response code from the web server
D. The parameter values of static based parameters
Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?
A. HTTP RFC compliancy checks
B. Length restrictions and attack signatures
C. Length restrictions and site cookie compliancy checks
D. Meta-character enforcement and HTTP RFC compliancy check