Free F50-526 Exam Braindumps (page: 4)

Page 3 of 13

The Heuristics process is designed to ensure what aspect of a good security policy?

  1. The response traffic is sampled by the policy builder
  2. A security policy is built with a minimum amount of false positives
  3. The security policy accurately reflects all elements of a web application
  4. All possible parameter values are automatically configured in the security policy

Answer(s): B



When building a policy based on live traffic using the automated policy builder, which of the following elements will not be taken into account when analyzing the traffic?

  1. The size of the response
  2. The requested resource (URI)
  3. The response code from the web server
  4. The parameter values of static based parameters

Answer(s): A



Which of the following statements are correct regarding positive and negative security models? (Choose 2)

  1. Positive security model allows all transactions by default
  2. Negative security model allows all transactions by default
  3. Negative security model allows all transactions by default and rejects only transactions that contain attacks
  4. Positive security model denies all transactions by default and uses rules that allow only those transactions that are considered safe and alid

Answer(s): C,D



Which of the following are correct when using the Policy Builder with trusted traffic? (Choose 2)

  1. All request data observed by the BIG-IP ASM System will be applied to the active security policy
  2. The BIG-IP ASM System will build the security policy without using HTTP response data
  3. Heuristics will be used to determine if an entity becomes an element of an active security policy
  4. The BIG-IP ASM System will automatically scan the web application to look for security violations

Answer(s): A,B






Post your Comments and Discuss F5 F50-526 exam with other Community members:

F50-526 Discussions & Posts