F50-536 Dumps

F50-536 Braindumps F50-536 Real Questions F50-536 Practice Test

F50-536 Actual Questions


killexams.com F5-Networks F50-536


BIG-IP ASM v10.x (F50-536)


https://killexams.com/pass4sure/exam-detail/F50-536


  1. storage filter

  2. storage policy

  3. web application


Answer: A, B


QUESTION: 44

Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?


  1. HTTP RFC compliancy checks

  2. Length restrictions and attack signatures

  3. Length restrictions and site cookie compliancy checks

  4. Meta-character enforcement and HTTP RFC compliancy check


Answer: B


QUESTION: 45

Which HTTP response code ranges indicate an error condition? (Choose 2)


  1. 1xx

  2. 2xx

  3. 3xx

  4. 4xx

  5. 5xx


Answer: D, E


QUESTION: 46

The Web Application Security Administrator user role can perform which of the following functions? (Choose 2)


  1. Modify HTTP class profiles

  2. Create new HTTP class profiles

  3. Create new Attack signature sets


  4. Assign HTTP class profiles to virtual servers

  5. Configure Advanced options within the BIG-IP ASM System


Answer: C, E


QUESTION: 47

On a BIG-IP ASM 3600, in standalone mode, which of the following pool configurations is valid?


  1. Pool named vs_pool with 1 pool member, no persistence, and no load balancing method

  2. Pool named vs_pool with 1 pool member, cookie persistence, and ratio load balancing method

  3. Pool named vs_pool with 2 pool members, cookie persistence, and ratio load balancing method

  4. Pool named vs_pool with 3 pool members, source IP persistence, and least connections load balancing method


Answer: A


QUESTION: 48

The following request is sent to the BIG-IP ASM System:

GET http://www.example.local/financials/week1.xls?display=yes&user=john&logon=true Which of the following components in this requests line represent the query string?


  1. .xls

  2. /week1.xls

  3. /financials/week1.xls

  4. display=yes&user=john&logon=true


Answer: D


QUESTION: 49

Which level of parameter assumes the highest precedence in BIG-IP ASM System processing logic?


  1. Flow

  2. Object

  3. Global

  4. URL


Answer: A


QUESTION: 50

Which of the following storage type combinations are configurable in an ASM logging profile?


  1. Local and Syslog

  2. Local and Remote

  3. Remote and Syslog

  4. Remote and Reporting Server


Answer: B