Exam Details

  • Exam Code
    :F50-536
  • Exam Name
    :BIG-IP ASM v10.x
  • Certification
    :F5 Certification
  • Vendor
    :F5
  • Total Questions
    :50 Q&As
  • Last Updated
    :May 12, 2024

F5 F5 Certification F50-536 Questions & Answers

  • Question 21:

    What are the best reasons for using the Deployment Wizard? (Choose 3)

    A. Flow-level parameters checking is required.

    B. The application encoding scheme needs to be determined by the BIG-IP ASM System.

    C. Sufficient time is available to allow completely automated policy building based on observing live traffic.

    D. The application platform must be protected against known attacks for the specific operating system, web server, and database.

  • Question 22:

    When initially configuring the BIG-IP System using the config tool, which of the following parameters can be configured? (Choose 3)

    A. System hostname

    B. Netmask of the management port

    C. IP address of the management port

    D. Default route of the management port

    E. Port lockdown of the management port

  • Question 23:

    Which of the following mitigation techniques is based on anomaly detection? (Choose 2)

    A. Brute force attack prevention

    B. Cross-site request forgery prevention

    C. Web scraping attack prevention

    D. Parameter tampering prevention

  • Question 24:

    Which of the following are default settings when using the Policy Builder to build a security policy based on the QA lab deployment scenario? (Choose 2)

    A. All learned entities are placed in staging.

    B. Attack signatures are not placed in staging

    C. The security policy is placed in blocking mode

    D. Tightening is enabled only on file types and parameters.

  • Question 25:

    The BIG-IP ASM System sets two types of cookies to enforce elements in the security policy. The two types are main and frame cookies. What is the purpose of the frame cookie? (Choose 2)

    A. Validates domain cookies

    B. Detects session expiration

    C. Stores dynamic parameters and values

    D. Handles dynamic parameter names and flow extractions

  • Question 26:

    Which statement is correct concerning differences between BIG-IP ASM platforms?

    A. The 3900 has more ports than the 6800.

    B. The 3900 and 6800 have the same number of ports.

    C. The 3900 and 6800 can support both the module and standalone versions of BIG-IP ASM.

    D. The 3900 can support both module and standalone versions of BIG-IP ASM whereas the 6800 can support only the module version of BIG-IP ASM.

  • Question 27:

    A security audit has determined that your web application is vulnerable to a cross-site scripting attack. Which of the following measures are appropriate when building a security policy? (Choose 2)

    A. Cookie length must be restricted to 1024 bytes.

    B. Attack signature sets must be applied to any user input parameters.

    C. Parameter data entered for explicit objects must be checked for minimum and maximum values.

    D. Parameter data entered for flow-level parameters must allow some meta-characters but not others.

  • Question 28:

    A request is sent to the BIG-IP ASM System that generates a Length error violation. Which of the following length types provides a valid learning suggestion? (Choose 3)

    A. URL

    B. Cookie

    C. Response

    D. POST data

    E. Query string

  • Question 29:

    There are multiple HTTP class profiles assigned to a virtual server. Each profile has Application Security enabled. Which statement is true?

    A. Traffic will process through every HTTP class profile every time.

    B. Traffic will process through the first HTTP class profile that it matches and then stops.

    C. Traffic will process through one HTTP class profile and if the traffic matches another profile, BIG-IP System will send a redirect to the client.

    D. Traffic will only process through the HTTP class profile that it matches but always processes through the whole list and will process through each HTTP class profile it matches.

  • Question 30:

    An HTTP class is available

    A. on any BIG-IP LTM system

    B. only when ASM is licensed.

    C. only when ASM or WA are licensed.

    D. only when a specific license key is required.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only F5 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your F50-536 exam preparations and F5 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.