Which of the following methods of protection is not available within the Protocol Security Manager for HTTP traffic?
A. Data guard
B. Attack signatures
C. Evasion techniques
D. File type enforcement
In the following configuration, a virtual server has the following HTTP class configuration:
HTTP Class 1 = Host pattern www.f5.com
HTTP Class 2 = No filters
A request arriving for WWW.F5.COM will be matched by which class(es)?
A. Class 1
B. Class 2
C. Both Class 1 and Class 2
D. The request will be dropped
Which of the following methods are used by the BIG-IP ASM System to protect against SQL injections?
A. HTTP RFC compliancy checks
B. Meta-character enforcement and attack signatures
C. HTTP RFC compliancy checks and length restrictions
D. Response scrubbing, HTTP RFC compliancy checks, and meta-character enforcement
Which of the following is not a configurable parameter data type?
A. Email
B. Array
C. Binary
D. Decimal
There are multiple HTTP class profiles assigned to a virtual server. Each profile has Application Security enabled. Which statement is true?
A. Traffic will process through every HTTP class profile every time.
B. Traffic will process through the first HTTP class profile that it matches and then stops.
C. Traffic will process through one HTTP class profile and if the traffic matches another profile, BIG-IP System will send a redirect to the client.
D. Traffic will only process through the HTTP class profile that it matches but always processes through the whole list and will process through each HTTP class profile it matches.
Tightening is a feature of which type of entity?
A. Explicit URLs
B. Attack signatures
C. Flow login URLs
D. Wildcard parameters
Which of the following is not a feature of a standalone BIG-IP ASM System?
A. Attack signatures
B. Multiple pool members
C. Positive security model
D. Real-time traffic policy builder
E. Pre-defined security policy templates
Which method of protection is not provided by the Rapid Deployment policy template?
A. Data leakage
B. Buffer overflow
C. HTTP protocol compliance
D. Dynamic parameter validation
Which level of parameter assumes the highest precedence in BIG-IP ASM System processing logic?
A. Flow
B. Object
C. Global
D. URL
Which of the following storage type combinations are configurable in an ASM logging profile?
A. Local and Syslog
B. Local and Remote
C. Remote and Syslog
D. Remote and Reporting Server