최신 F5 Networks Certification Study Materials F50-536 무료샘플문제:
1. An HTTP class is available
A) only when ASM or WAare licensed.
B) only when a specific license key is required.
C) on any BIG-IP LTM system
D) only when ASM is licensed.
2. Which of the following methods of protection operates on server responses?
A) Dynamic parameter protection
B) HTTP RFC compliancy check and meta-character enforcement
C) Response code validation and HTTP method validation
D) Response code validation and response scrubbing
3. In the following configuration, a virtual server has the following HTTP class configuration:
HTTP Class 1 = Host pattern www.f5.com
HTTP Class 2 = No filters
A request arriving for WWW.F5.COM will be matched by which class(es)?
A) Both Class 1 and Class 2
B) Class 1
C) Class 2
D) The request will be dropped
4. Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?
A) Meta-character enforcement and HTTP RFC compliancy check
B) Length restrictions and site cookie compliancy checks
C) HTTP RFC compliancy checks
D) Length restrictions and attack signatures
5. Which of the following does not pertain to protecting the Requested Resource (URI) element?
A) Domain cookie validation
B) Attack signature validation
C) File type validation
D) URL name validation
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: D | 질문 # 3 정답: C | 질문 # 4 정답: D | 질문 # 5 정답: A |