Which of the following are correct regarding Wildcard entities? (Choose 2)
A. Wildcard entities are the basis for positive security logic.
B. Wildcard entities are the basis for negative security logic.
C. Wildcard entities require the need to learn only from violations.
D. Wildcard entities can be applied to file types, URLs, cookies and parameters.
Which of the following is correct regarding User-defined Attack signatures?
A. User-defined signatures use an F5-supplied syntax
B. User-defined signatures may only use regular expressions
C. Attack signatures may be grouped within system-supplied signatures
D. User-defined signatures may not be applied globally within the entire policy
Learning suggestions in the Policy Building pages allow for which of the following? (Choose 2)
A. XML-based parameters and associated schema are automatically learned.
B. Blocking response pages can be automatically generated from web site content.
C. Flow level parameters are displayed when found and can be accepted into the current policy.
D. The administrator may modify whether the BIG-IP ASM System will learn, alarm, or block detected violations.
E. Maximum acceptable values for length violations are calculated and can be accepted into the security policy by the administrator.
Which of the following methods of protection is not available within the Protocol Security Manager for FTP protection?
A. Session timeout
B. Command length
C. Allowed commands
D. Anonymous FTP restriction
Which of the following is a language used for content provided by a web server to a web client?
A. FTP
B. TCP
C. HTTP
D. HTML
Which of the following can be associated with an XML profile?
A. Flow
B. Method
C. Parameter
D. File type
An HTTP class is available
A. on any BIG-IP LTM system
B. only when ASM is licensed.
C. only when ASM or WA are licensed.
D. only when a specific license key is required.
The BIG-IP ASM System sets two types of cookies to enforce elements in the security policy. The two types are main and frame cookies. What is the purpose of the frame cookie? (Choose 2)
A. Validates domain cookies
B. Detects session expiration
C. Stores dynamic parameters and values
D. Handles dynamic parameter names and flow extractions
Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A. Brute force attack prevention
B. Cross-site request forgery prevention
C. Web scraping attack prevention
D. Parameter tampering prevention
Which of the following statements are incorrect regarding protection of web services? (Choose 2)
A. The BIG-IP ASM System checks to ensure web services use cookies.
B. The BIG-IP ASM System parses XML requests and XML responses.
C. The BIG-IP ASM System checks to ensure XML documents are well formed.
D. The BIG-IP ASM System uses attack signatures to enforce negative security logic.
E. The BIG-IP ASM System checks for XML syntax, schema validation, and WSDL validation.