F5 BIG-IP ASM v10.x Sample Questions:
1. Which of the following can be associated with an XML profile?
A) File type
B) Flow
C) Method
D) Parameter
2. Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A) Brute force attack prevention
B) Cross-site request forgery prevention
C) Web scraping attack prevention
D) Parameter tampering prevention
3. Which statement is correct concerning differences between BIG-IP ASM platforms?
A) The 3900 and 6800 can support both the module and standalone versions of BIG-IP ASM.
B) The 3900 can support both module and standalone versions of BIG-IP ASM whereas the 6800 can support only the module version of BIG-IP ASM.
C) The 3900 and 6800 have the same number of ports.
D) The 3900 has more ports than the 6800.
4. Which of the following storage type combinations are configurable in an ASM logging profile?
A) Remote andSyslog
B) Local andSyslog
C) Remote and Reporting Server
D) Local and Remote
5. The BIG-IP ASM System is configured with a virtual server that contains an HTTP class profile and the protected pool members are associated within the HTTP class profile pool definition. The status of this virtual server is unknown (Blue). Which of the following conditions will make this virtual server become available (Green)?
A) Assign a successful monitor to the members of the HTTP class profile pool
B) Associate a default pool to the virtual server and assign a successful monitor to the pool members
C) Associate a fallback host to the virtual server and assign a successful monitor to the fallback host
D) Assign a successful monitor to the virtual server
Solutions:
Question # 1 Answer: D | Question # 2 Answer: A,C | Question # 3 Answer: B | Question # 4 Answer: D | Question # 5 Answer: B |