لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following protocol protections is not provided by the Protocol SecurityManager?
A. FTP
B. SSH
C. HTTP
D. SMTP
عرض الإجابة
اجابة صحيحة: ADE
السؤال #2
Which statement about root DNS servers is true?
A. Root servers have databases of all registered DNS servers
B. Root servers have databases of the DNS servers for top-level domains
C. Root servers have databases of DNS servers for each geographical area
D. Root servers have databases of commonly accessed sites
عرض الإجابة
اجابة صحيحة: BD
السؤال #3
Which of the following can be associated with an XML profile?
A. Flow
B. Method
C. Parameter
D. File type
عرض الإجابة
اجابة صحيحة: AC
السؤال #4
Which statement is correct if a TOP-based monitor is assigned to an LTM System and anHTTP- based monitor is assigned to one of that LTM System's Virtual Servers?
A. The Virtual Server status is based on the TCP monitor only
B. The Virtual Server status is based on the HTTP monitor only
C. GTM Systems do not allow monitors on both an LTM System and one of its VirtualServers
D. The Virtual Server status is based on both the TOP and HTTP monitor; if either fails, theVirtual Server is unavailable
E. The Virtual Server status is based on both the TOP and HTTP monitor; if either succeeds,the Virtual Server is available
عرض الإجابة
اجابة صحيحة: B
السؤال #5
What is the primary benefit of associating Servers with Data Centers?
A. The primary benefit is in assigning a single IP address to identify a Data Center
B. The primary benefit is in combining probing metrics
C. The primary benefit is administrative
D. The primary benefit is in load balancing
عرض الإجابة
اجابة صحيحة: BC
السؤال #6
When configuring the BIG-IP ASM System in redundant pairs, which of the following aresynchronized? (Choose 2)
A. License file
B. Security policies
C. Web applications
D. Request information
E. Traffic learning information
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Tightening is a feature of which type of entity?
A. Explicit URLs
B. Attack signatures
C. Flow login URLs
D. Wildcard parameters
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
iQuery is a proprietary protocol that distributes metrics gathered from which three sources?(Choose three.)
A. SNMP
B. DNS root servers
C. Path probes such as ICMP
D. Monitors from LTM Systems
E. Monitors from Generic Host Servers
عرض الإجابة
اجابة صحيحة: AB
السؤال #9
Which of the following methods of protection is not available within the Protocol SecurityManager for HTTP traffic?
A. Data guard
B. Attack signatures
C. Evasion techniques
D. File type enforcement
عرض الإجابة
اجابة صحيحة: BCE
السؤال #10
Listeners that correspond to non-floating self lP addresses are stored in which configurationfile?
A. /config/bigip
B. /config/bigip_base
C. /config/gtm/wideip
D. /config/bigip_local
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A request is sent to the BIGIP ASM System that generates a Length error violation. Whichof the following length types provides a valid learning suggestion? (Choose 3)
A. URL
B. Cookie
C. Response
D. POST data
E. Query string
عرض الإجابة
اجابة صحيحة: C
السؤال #12
When we have a * wildcard entity configured in the File Type section with tighteningenabled, the following may occur when requests are passed through the policy. Which is themost accurate statement?
A. File type violations will not be triggered
B. File type violations will be triggered and learning will be available based on theseviolations
C. File type entities will automatically be added to the policy (policy will tighten)
D. File type violations will not be triggered and the entity learning section will be populatedwith file type recommendations
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following statements are incorrect regarding protection of web services?(Choose 2)
A. The BIG-IP ASM System checks to ensure web services use cookies
B. The BIG-IP ASM System parses XML requests and XML responses
C. The BIG-IP ASM System checks to ensure XML documents are well formed
D. The BIG-IP ASM System uses attack signatures to enforce negative security logic
E. The BIG-IP ASM System checks for XML syntax, schema validation, and WSDLvalidation
عرض الإجابة
اجابة صحيحة: BD
السؤال #14
Which of the following is a language used for content provided by a web server to a webclient?
A. FTP
B. TCP
C. HTTP
D. HTML
عرض الإجابة
اجابة صحيحة: CE
السؤال #15
A security audit has determined that your web application is vulnerable to a cross-sitescripting attack. Which of the following measures are appropriate when building a securitypolicy?(Choose 2)
A. Cookie length must be restricted to 1024 bytes
B. Attack signature sets must be applied to any user input parameters
C. Parameter data entered for explicit objects must be checked for minimum and maximumvalues
D. Parameter data entered for flowlevel parameters must allow some meta-characters butnot others
عرض الإجابة
اجابة صحيحة: B
السؤال #16
When probing LDNSs, which protocol is used by default?
A. TCP
B. ICMP
C. DNS_REV
D. DNS_DOT
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Which of the following methods of protection is not available within the Protocol SecurityManager for FTP protection?
A. Session timeout
B. Command length
C. Allowed commands
D. Anonymous FTP restriction
عرض الإجابة
اجابة صحيحة: CDE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: