Free F50-536 Exam Braindumps (page: 3)

Page 3 of 13

In the following configuration, a virtual server has the following HTTP class configuration:
HTTP Class 1 = Host pattern www.f5.com
HTTP Class 2 = No filters
A request arriving for WWW.F5.COM will be matched by which class(es)?

  1. Class 1
  2. Class 2
  3. Both Class 1 and Class 2
  4. The request will be dropped

Answer(s): B



Learning suggestions in the Policy Building pages allow for which of the following? (Choose 2)

  1. XML-based parameters and associated schema are automatically learned.
  2. Blocking response pages can be automatically generated from web site content.
  3. Flow level parameters are displayed when found and can be accepted into the current policy.
  4. The administrator may modify whether the BIG-IP ASM System will learn, alarm, or block detected violations.
  5. Maximum acceptable values for length violations are calculated and can be accepted into the security policy by the administrator.

Answer(s): C,E



Which of the following statements are correct regarding positive and negative security models? (Choose 2)

  1. Positive security model allows all transactions by default.
  2. Negative security model denies all transactions by default.
  3. Negative security model allows all transactions by default and rejects only transactions that contain attacks.
  4. Positive security model denies all transactions by default and uses rules that allow only those transactions that are considered safe and valid.

Answer(s): C,D



Which events are valid iRule events triggered by BIG-IP ASM processing? (Choose 2)

  1. ASM_REQUEST_BLOCKING
  2. ASM_REQUEST_ACCEPTED
  3. ASM_REQUEST_VIOLATION
  4. ASM_RESPONSE_BLOCKING

Answer(s): A,C



Page 3 of 13



Post your Comments and Discuss F5 F50-536 exam with other Community members:

Kiran commented on October 16, 2024
These are related questions
UNITED STATES
upvote