Vendor
: F5
Exam Code : F50-101
Version: Free Demo
IT Certification Guaranteed, The Easy Way!
Cheat-Test.us - The Worldwide Renowned IT Certification Material Provider! The safer, easier way to help you pass any IT Certification exams.
We provide high quality IT Certification exams practice questions and answers (Q&A). Especially Cisco, Microsoft, HP, IBM, Oracle, CompTIA, Adobe, Apple, Citrix, EMC, Isaca, Avaya, SAP and so on. And help you pass an IT Certification exams at the first try.
Cheat-Test product Features: •
Verified Answers Researched by Industry Experts
•
Questions updated on regular basis
•
Like actual certification exams our product is in multiple-choice questions (MCQs).
•
Our questions and answers are backed by our GUARANTEE.
7x24 online customer service: support@cheat-test.us
Click Here to get more Free Cheat-Test Certification exams!
http://www.Cheat-Test.us
Q: 1 What are the best reasons for using the Deployment Wizard? (Choose 3) A. Flow-level parameters checking is required. B. The application encoding scheme needs to be determined by the BIG-IP ASM System. C. Sufficient time is available to allow completely automated policy building based onobserving live traffic. D. The application platform must be protected against known attacks for the specificoperating system, web server, and database. Answer: B,C,D Q: 2 When building a policy based on live traffic using the automated policy builder, which of the following elements will not be taken into account when analyzing the traffic? A. The size of the response B. The requested resource (URI) C. The response code from the web server D. The parameter values of static based parameters Answer: A Q: 3 Which method of protection is not provided by the Rapid Deployment policy template? A. Data leakage B. Buffer overflow C. HTTP protocol compliance D. Dynamic parameter validation Answer: D Q: 4 Which of the following are properties of an ASM logging profile? (Choose 2) A. storage type B. storage filter C. storage policy D. web application Answer: A,B Q: 5 Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks? A. HTTP RFC compliancy checks B. Length restrictions and attack signatures C. Length restrictions and site cookie compliancy checks D. Meta-character enforcement and HTTP RFC compliancy check Answer: B Q: 6 The Web Application Security Administrator user role can perform which of the following functions? (Choose 2) A. Modify HTTP class profiles. B. Create new HTTP class profiles.
C. Create new Attack signature sets. D. Assign HTTP class profiles to virtual servers. E. Configure Advanced options within the BIG-IP ASM System. Answer: C,E Q: 7 The following request is sent to the BIG-IP ASM System: GET http://www.example.local/financials/week1.xls? display=yes&user=john&logon=true Which of the following components in this requests line represent the query string? A. .xls B. /week1.xls C. /financials/week1.xls D. display=yes&user=john&logon=true Answer: D Q: 8 Which level of parameter assumes the highest precedence in BIG-IP ASM System processing logic? A. Flow B. Object C. Global D. URL Answer: A Q: 9 Which of the following storage type combinations are configurable in an ASM logging profile? A. Local and Syslog B. Local and Remote C. Remote and Syslog D. Remote and Reporting Server Answer: B Q: 10 When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose 2) A. All client requests B. All server responses C. Specific client requests D. Specific server responses Answer: B,D Q: 11 When initially configuring the GTM System using the config tool, which two parameters can be set? (Choose two.) A. System hostname B. IP Address of management port C. IP Address of the external VLAN D. Default route for management port E. Port lockdown of management port Answer: B,D
Q: 12 Without creating a user-defined region, what is the most specific group a topology record can identify? A. city B. country C. continent D. state/province E. region of country Answer: D Q: 13 The SNMP monitor can collect data based on which three metrics? (Choose three.) A. packet rate B. memory utilization C. content verification D. current connections E. hops along the network path Answer: A,B,D Q: 14 Could an iRule perform persistence based on a cookie? A. Yes An iRule could be designed to persist based on the contents of a cookie. B. No. iRules cannot affect persistence. C. Yes. An iRule could be desiged to persist based on the contents of a cookie. D. No. Cookie persistence is only is based on a cookie persistence profile. Answer: C Q: 15 How is traffic flow through transparent virtual servers different from typical virtual servers? A. Traffic flow through transparent virtual servers must be forwarded through a single routingdevice. B. Traffic flow through transparent virtual servers does not have IP address translationperformed. C. Traffic flow through transparent virtual severs is not load balabced. D. Traffic flow through transparent virtual servers is bridged ( leave IP and lMAC.addressesintact) rather than routed (leave IP address intact but change the MAC.addresses). Answer: B Q: 16 You have created a custom profile named TEST2. The parent profile of TEST2 is named TEST1. If additional changes are made to TEST1, what is the effect on TEST2? A. All changes to TEST1 are propagated to TEST2. B. Some of the changes to TEST1 may propagate to TEST2. C. Changes to TEST1 cannot affect TEST2 once TEST2 is saved. D. When TEST1 is changed, the administrator is prompted and can choose whether to propagate changes toTEST2. Answer: B Q: 17 If a client's browser does not accept cookies, what occurs when the client connects to a virtual server using cookie persistence? A. The connection request is not processed.
B. The connection request is sent to a server. C. The connection request is load-balanced to an available pool member. D. The connection request is refused and the client is sent a "server not available" message. Answer: C Q: 18 What is the purpose of MAC masquerading? A. to prevent ARP cache errors B. to minimize ARP entries on routers C. to minimize connection loss due to ARP cache refresh delays D. to allow both BIG-IP devices to simultaneously use the same MAC address Answer: C Q: 19 Which process or system can be monitored by the BIG-IP system and used as a fail-over trigger in a redundant pair configuration? A. bandwidth utilization B. duplicate IP address C. CPU utilization percentage D. VLAN communication ability Answer: D Q: 20 Which two statements are true concerning the default communication between a redundant pair of BIG-IP systems? (Choose two.) A. Synchronization occurs via a TCP connection using ports 683 and 684. B. Connection mirroring data is shared via a TCP connection using port 1028. C. Persistence mirroring data is shared via a TCP connection using port 1028. D. Connection mirroring data is shared through the serial fail-over cable unless network fail-over is enabled. Answer: B,C