Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.181
Could an iRule perform persistence based on a cookie?
-
Yes an iRule could be designed to persist based on the contents of a cookie.
-
No. iRules cannot affect persistence.
-
Yes. An iRule could be designed to persist based on the contents of a cookie.
-
No. Cookie persistence is only is based on a cookie persistence profile.
Correct Answer: C
Question No.182
Which of the following methods of protection operates on server responses?
-
Dynamic parameter protection
-
Response code validation and response scrubbing
-
Response code validation and HTTP method validation
-
HTTP RFC compliancy check and metacharacter enforcement
Correct Answer: B
Question No.183
The PCI compliance report is proof that a company is secure.
-
True
-
False
Correct Answer: B
Question No.184
A BIG-IP has the following objects configured:
A virtual server at 150.10.30.30:80 that is associated with both the SNAT pool and the load balancing pool. If a client at IP address 200.10.10.10 initiates a connection to the virtual server, what will the source IP address be in the packets sent to the chosen pool member?
A.
150.10.33.33
B.
10.10.1.33
C.
10.10.1.10
D.
150.10.30.30
E.
200.10.10.10
F.
It could be any of the addresses of the members of the load balancing pool.
Correct Answer: B
Question No.185 DRAG DROP
Match the security-related term with the correct definition.
Correct Answer:
Question No.186
The Policy Builder benefits include:
-
Doesn#39;t require in depth web application knowledge
-
Only requires limited ASM knowledge
-
All of the above
-
Very low administrative impact
-
Correct Answer: C
Question No.187
Which of the following platforms support both standalone and modular BIG-IP ASM implementations? (Choose 2)
A. |
3900 |
B. |
6800 |
C. |
6900 |
D. |
8800 |
Correct Answer: AC
Question No.188
Which tool is used on BIG-IP systems to capture data packets?
-
tcpdump
-
snoop
-
ethereal
-
qkview
Correct Answer: A
Question No.189
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
-
They want GTM to examine all DNS queries.
-
They want GTM to make load balancing decisions based on metrics.
-
They have data centers in several countries.
-
They are using several operating systems for the local DNS servers.
Correct Answer: C
Question No.190
Which of the following protocols can be protected by Protocol Security Manager? (Choose three.)
-
FTP
-
SSH
-
HTTP
-
SMTP
-
Telnet
Correct Answer: D
Get Full Version of the Exam
101 Dumps
101 VCE and PDF