Flow login allows for more granular protection of login and logout URLs within web applications. Which of the following are components of flow login? (Choose 3)
A. Schema
B. Login URLs
C. Login pages
D. Attack signatures
E. Access validation
Which of the following is not a configurable parameter data type?
A. Email
B. Array
C. Binary
D. Decimal
When we have a * wildcard entity configured in the File Type section with tightening enabled, the following may occur when requests are passed through the policy. Which is the most accurate statement?
A. File type violations will not be triggered.
B. File type violations will be triggered and learning will be available based on these violations.
C. File type entities will automatically be added to the policy (policy will tighten).
D. File type violations will not be triggered and the entity learning section will be populated with file type recommendations.
Which of the following is correct regarding static parameters?
A. A static parameter is stored in a frame cookie.
B. A static parameter is pre-defined by the web application logic.
C. A static parameter is learned only by using the Deployment Wizard.
D. A static parameter is mapped once when creating the application flow model.
A client sends a request to a virtual server http://www.foo.com configured on the BIG-IP ASM System. The virtual server has an HTTP class profile associated with Application Security enabled, all class filters set to match all, and a pool consisting of foo.com members. The virtual server also has a default pool associated with it. When the client sends a request for http://www.foo.com, this traffic will be forwarded to which of the following?
A. The fallback host
B. The default pool
C. The HTTP class profile pool
D. The request will be dropped
A user is building a security policy using the Deployment Wizard and the Rapid Deployment application template. By default, which settings will be applied to the security policy? (Choose 3)
A. Data Guard will be enabled.
B. The enforcement mode will be set to transparent.
C. The encoding language will be set to auto detect.
D. Wildcard tightening will be enabled on file types and parameters.
E. The Attack signature set applied will be Generic Detection Signatures.
Which HTTP response code ranges indicate an error condition? (Choose 2)
A. 1xx
B. 2xx
C. 3xx
D. 4xx
E. 5xx
On a BIG-IP ASM 3600, in standalone mode, which of the following pool configurations is valid?
A. Pool named vs_pool with 1 pool member, no persistence, and no load balancing method
B. Pool named vs_pool with 1 pool member, cookie persistence, and ratio load balancing method
C. Pool named vs_pool with 2 pool members, cookie persistence, and ratio load balancing method
D. Pool named vs_pool with 3 pool members, source IP persistence, and least connections load balancing method
Which level of parameter assumes the highest precedence in BIG-IP ASM System processing logic?
A. Flow
B. Object
C. Global
D. URL
Which of the following storage type combinations are configurable in an ASM logging profile?
A. Local and Syslog
B. Local and Remote
C. Remote and Syslog
D. Remote and Reporting Server