Free F50-536 Exam Braindumps (page: 2)

Page 2 of 13

Which of the following protocol protections is not provided by the Protocol Security Manager?

  1. FTP
  2. SSH
  3. HTTP
  4. SMTP

Answer(s): B



Which of the following is correct regarding User-defined Attack signatures?

  1. User-defined signatures use an F5-supplied syntax
  2. User-defined signatures may only use regular expressions
  3. Attack signatures may be grouped within system-supplied signatures
  4. User-defined signatures may not be applied globally within the entire policy

Answer(s): A



Which of the following methods of protection is not available within the Protocol Security Manager for HTTP traffic?

  1. Data guard
  2. Attack signatures
  3. Evasion techniques
  4. File type enforcement

Answer(s): B



There are many user roles configurable on the BIG-IP ASM System.
Which of the following user roles have access to make changes to ASM policies? (Choose 3)

  1. Guest
  2. Operator
  3. Administrator
  4. Web Application Security Editor
  5. Web Application Security Administrator

Answer(s): C,D,E



Page 2 of 13



Post your Comments and Discuss F5 F50-536 exam with other Community members:

Kiran commented on October 16, 2024
These are related questions
UNITED STATES
upvote