[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 31-40

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.31

Which of the following statements are incorrect regarding protection of web services? (Choose two.)

  1. The BIG-IP ASM System checks to ensure web services use cookies.

  2. The BIG-IP ASM System parses XML requests and XML responses.

  3. The BIG-IP ASM System checks to ensure XML documents are well formed.

  4. The BIG-IP ASM System uses attack signatures to enforce negative security logic.

  5. The BIG-IP ASM System checks for XML syntax, schema validation, and WSDL validation.

Correct Answer: AB

Question No.32

Which of the following statements are correct regarding Attack signatures? (Choose two.)

  1. Attack signatures can apply to requests, responses, and parameters.

  2. Attack signatures are the basis for positive security logic with the BIG-IP ASM System.

  3. Any new Attack signature downloaded manually or automatically will be active and assigned directly to the security policy.

  4. Individual Attack signatures can be assigned to the security policy. Only Attack signature sets can apply to the security policy.

Correct Answer: AD

Question No.33

Assuming that systems are synchronized, which action could take place if the failover cable is connected correctly and working properly, but the systems cannot communicate over the network due to extern al network problems.

  1. If network failover is enabled, the standby system will assume the active mode.

  2. Whether or not network failover is enabled, the standby system will stay in standby mode.

  3. Whether or not network failover is enabled, the standby system will assume the active mode.

  4. If network failover is enabled, the standby system will go into active mode but only until the network recovers.

Correct Answer: B

Question No.34

Select F5 platforms have which three certifications? (Choose three.)

  1. FIPS

  2. SECG

  3. NEBS

  4. IEEE

  5. Common Criteria

  6. AFSSI

Correct Answer: ACE

Question No.35

Which four are GTM server static load balancing modes? (Choose four.)

  1. Return to DNS

  2. CPU

  3. Packet Rate

  4. Drop Packet

  5. Round Robin

  6. Static Persist

Correct Answer: ADEF

Question No.36

A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types that must be associated with such a virtual server? (Choose two.)

  1. TCP

  2. HTTP

  3. HTTPS

  4. ClientSSL

  5. ServerSSL

Correct Answer: AD

Question No.37

Which VLANs must be enabled for a SNAT to perform as desired (translating only desired packets)?

  1. The SNAT must be enabled for all VLANs.

  2. The SNAT must be enabled for the VLANs where desired packets leave the BIG-IP.

  3. The SNAT must be enabled for the VLANs where desired packets arrive on the BIG-IP.

  4. The SNAT must be enabled for the VLANs where desired packets arrive and leave the BIG-IP.

Correct Answer: C

Question No.38

A customer says his business wouldn#39;t benefit from buying ARX because it already has block based storage virtualization in place. Is he right? Why or why not?

  1. Yes. Block based storage virtualization is just another name for file virtualization.

  2. No. ARX allows customers to implement storage tiering benefits, but block based storage virtualization does not.

  3. Yes. Block based storage virtualization offers the same functionality as ARX#39;s file virtualization, although it uses slightly different technology.

  4. No. Both technologies attempt to solve similar problems, but only the ARX allows the customer to have visibility into their data and apply business policy at the file level. Block based virtualization has no visibility into the type of data.

Correct Answer: D

Question No.39

Which three parameters could be used to determine whether a connection request will have the source address translated as the request is processed? (Choose three.)

  1. the client#39;s router#39;s IP address

  2. the client#39;s browser#39;s preferred language

  3. the client#39;s IP netmask

  4. the client#39;s TCP port

  5. the client#39;s IP address

  6. the client IP fragment offset

Correct Answer: BDE

Question No.40

Select the key question you would use to ask your customer related to DNS attacks?

  1. Do you over-provision your DNS infrastructure?

  2. Do you regularly update BIND or some other DNS application to the latest release?

  3. Do you rely on your network firewall to protect your DNS server?

  4. How do you secure your DNS infrastructure against attacks?

Correct Answer: D

Get Full Version of the Exam
101 Dumps
101 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.