Pass4itsure > F5 > F5 Certification > F50-536 > F50-536 Online Practice Questions and Answers

F50-536 Online Practice Questions and Answers

Questions 4

Flow login allows for more granular protection of login and logout URLs within web applications. Which of the following are components of flow login? (Choose 3)

A. Schema

B. Login URLs

C. Login pages

D. Attack signatures

E. Access validation

Buy Now
Questions 5

Which of the following is not a configurable parameter data type?

A. Email

B. Array

C. Binary

D. Decimal

Buy Now
Questions 6

When we have a * wildcard entity configured in the File Type section with tightening enabled, the following may occur when requests are passed through the policy. Which is the most accurate statement?

A. File type violations will not be triggered.

B. File type violations will be triggered and learning will be available based on these violations.

C. File type entities will automatically be added to the policy (policy will tighten).

D. File type violations will not be triggered and the entity learning section will be populated with file type recommendations.

Buy Now
Questions 7

Which of the following is correct regarding static parameters?

A. A static parameter is stored in a frame cookie.

B. A static parameter is pre-defined by the web application logic.

C. A static parameter is learned only by using the Deployment Wizard.

D. A static parameter is mapped once when creating the application flow model.

Buy Now
Questions 8

A client sends a request to a virtual server http://www.foo.com configured on the BIG-IP ASM System. The virtual server has an HTTP class profile associated with Application Security enabled, all class filters set to match all, and a pool consisting of foo.com members. The virtual server also has a default pool associated with it. When the client sends a request for http://www.foo.com, this traffic will be forwarded to which of the following?

A. The fallback host

B. The default pool

C. The HTTP class profile pool

D. The request will be dropped

Buy Now
Questions 9

A user is building a security policy using the Deployment Wizard and the Rapid Deployment application template. By default, which settings will be applied to the security policy? (Choose 3)

A. Data Guard will be enabled.

B. The enforcement mode will be set to transparent.

C. The encoding language will be set to auto detect.

D. Wildcard tightening will be enabled on file types and parameters.

E. The Attack signature set applied will be Generic Detection Signatures.

Buy Now
Questions 10

Which HTTP response code ranges indicate an error condition? (Choose 2)

A. 1xx

B. 2xx

C. 3xx

D. 4xx

E. 5xx

Buy Now
Questions 11

On a BIG-IP ASM 3600, in standalone mode, which of the following pool configurations is valid?

A. Pool named vs_pool with 1 pool member, no persistence, and no load balancing method

B. Pool named vs_pool with 1 pool member, cookie persistence, and ratio load balancing method

C. Pool named vs_pool with 2 pool members, cookie persistence, and ratio load balancing method

D. Pool named vs_pool with 3 pool members, source IP persistence, and least connections load balancing method

Buy Now
Questions 12

Which level of parameter assumes the highest precedence in BIG-IP ASM System processing logic?

A. Flow

B. Object

C. Global

D. URL

Buy Now
Questions 13

Which of the following storage type combinations are configurable in an ASM logging profile?

A. Local and Syslog

B. Local and Remote

C. Remote and Syslog

D. Remote and Reporting Server

Buy Now
Exam Code: F50-536
Exam Name: BIG-IP ASM v10.x
Last Update: Dec 15, 2024
Questions: 50
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99