لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following is correct regarding User-defined Attack signatures?
A. User-defined signatures use an F5-supplied syntax
B. User-defined signatures may only use regular expressions
C. Attack signatures may be grouped within system-supplied signatures
D. User-defined signatures may not be applied globally within the entire policy
عرض الإجابة
اجابة صحيحة: AD
السؤال #2
A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it: when CLIENT_ACCEPTED { if {[TCP::local_port] equals 21 } { pool ftppool } elseif {[TCP::local_port] equals 23 } { pool telnetpool } If a user connects to 10.10.1.100 and port 22, which pool will receive the request?
A. ftppool
B. telnetpool
C. None
D. Unknown
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following storage type combinations are configurable in an ASM loggingprofile?
A. Local and Syslog
B. Local and Remote
C. Remote and Syslog
D. Remote and Reporting Server
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Which of the following methods of protection operates on server responses?
A. Dynamic parameter protection
B. Response code validation and response scrubbing
C. Response code validation and HTTP method validation
D. HTTP RFC compliancy check and meta-character enforcement
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which of the following methods of protection is not available within the Protocol SecurityManager for HTTP traffic?
A. Data guard B
C. Evasion techniques
D. File type enforcement
عرض الإجابة
اجابة صحيحة: BCE
السؤال #6
When building a policy based on live traffic using the automated policy builder, which of thefollowing elements will not be taken into account when analyzing the traffic?
A. The size of the response
B. The requested resource (URI)
C. The response code from the web server
D. The parameter values of static based parameters
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which method of protection is not provided by the Rapid Deployment policy template?
A. Data leakage
B. Buffer overflow
C. HTTP protocol compliance
D. Dynamic parameter validation
عرض الإجابة
اجابة صحيحة: BC
السؤال #8
Which events are valid iRule events triggered by BIG-IP ASM processing? (Choose 2)
A. ASM_REQUEST_BLOCKING
B. ASM_REQUEST_ACCEPTED C
D. ASM_RESPONSE_BLOCKING
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?
A. The BIG-IP would drop the request since the traffic didn arrive destined to the NAT address
B. The source address would not change, but the destination address would be changed to the NAT address
C. The source address would be changed to the NAT address and destination address would be left unchanged
D. The source address would not change, but the destination address would be changed to a self-IP of the BIG-IP
عرض الإجابة
اجابة صحيحة: ABC
السؤال #10
Tightening is a feature of which type of entity? A. Explicit URLs
B. Attack signatures
C. Flow login URLs
D. Wildcard parameters
عرض الإجابة
اجابة صحيحة: AC
السؤال #11
Which is an advantage of terminating SSL communication at the BIG-IP rather than the ultimate web server? A. Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.
B. Terminating SSL at the BIG-IP eliminates all un-encrypted traffic from the nternal?network
C. Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority
D. Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in the network
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which of the following is not a configurable parameter data type?
A. Email
B. Array C
D. Decimal
عرض الإجابة
اجابة صحيحة: D
السؤال #13
A web client accesses a web application using what protocol? A. TCP
B. XML
C. HTML
D. HTTP
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which of the following are properties of an ASM logging profile? (Choose 2)
A. storage type
B. storage filter
C. storage policy D
عرض الإجابة
اجابة صحيحة: C
السؤال #15
A virtual server is defined using a source-address based persistence profile. The last five connections were A, B, C, A,
C. Given the conditions shown in the graphic, if a client with IP address 205
B. 10
C. 10
D. 10
E. 10
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which of the following is not a method of protection for user-input parameters?
A. Value extraction
B. Attack signatures
C. Length restriction
D. Meta character enforcement
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Which of the following methods of protection are used by the BIG-IP ASM System tomitigate buffer overflow attacks?
A. HTTP RFC compliancy checks
B. Length restrictions and attack signatures
C. Length restrictions and site cookie compliancy checks
D. Meta-character enforcement and HTTP RFC compliancy check
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Which of the following does not pertain to protecting the Requested Resource (URI)element?
A. File type validation
B. URL name validation
C. Domain cookie validation
D. Attack signature validation
عرض الإجابة
اجابة صحيحة: ADE
السؤال #19
Which cookie persistence method requires the fewest configuration changes on the web servers to be implemented correctly?
A. insert
B. rewrite
C. passive
D. session
عرض الإجابة
اجابة صحيحة: B
السؤال #20
There are many user roles configurable on the BIG-IP ASM System. Which of the followinguser roles have access to make changes to ASM policies? (Choose 3)
A. Guest
B. Operator
C. Administrator
D. Web Application Security Editor
E. Web Application Security Administrator
عرض الإجابة
اجابة صحيحة: D
السؤال #21
The BIG-IP ASM System sets two types of cookies to enforce elements in the securitypolicy. The two types are main and frame cookies. What is the purpose of the frame cookie?(Choose 2)
A. Validates domain cookies B
C. Stores dynamic parameters and values
D. Handles dynamic parameter names and flow extractions
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Logging profiles are assigned to?
A. HTTP class
B. Security policies
C. Web applications
D. Attack signatures
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: