[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 321-330

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.321

Which of the following are correct regarding Wildcard entities? (Choose two.)

  1. Wildcard entities are the basis for positive security logic.

  2. Wildcard entities are the basis for negative security logic.

  3. Wildcard entities require the need to learn only from violations.

  4. Wildcard entities can be applied to file types, URLs, cookies and parameters.

Correct Answer: AD

Question No.322

Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the BIG- IP?

  1. No SSL certificates are required on the BIG-IP.

  2. The BIG-IP#39;s SSL certificates must only exist.

  3. The BIG-IP#39;s SSL certificates must be issued from a certificate authority.

  4. The BIG-IP#39;s SSL certificates must be created within the company hosting the BIG-IPs.

Correct Answer: A

Question No.323

Which aspect of F5#39;s Intelligent Services Platform helps you extend your security conversation to include F5professionals and customers?

  1. Modular Functionality

  2. iApps

  3. TMOS

  4. DevCentral

Correct Answer: D

Question No.324

Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?

  1. HTTP RFC compliancy checks

  2. Length restrictions and attack signatures

  3. Length restrictions and site cookie compliancy checks

  4. Metacharacter enforcement and HTTP RFC compliancy check

Correct Answer: B

Question No.325

An LTM object represents a downstream server that hosts a secure Web site and contains the IP address and port combination 192.168.9.250:443. What is this object?

  1. Self IP

  2. Virtual Server

  3. Pool

  4. Node

  5. Pool Member

Correct Answer: E

Question No.326

Which statement about root DNS servers is true?

  1. Root servers have databases of all registered DNS servers.

  2. Root servers have databases of the DNS servers for top-level domains.

  3. Root servers have databases of DNS servers for each geographical area. They direct requests to appropriate LDNS servers.

  4. Root servers have databases of commonly accessed sites. They also cache entries for additional

servers as requests are made.

Correct Answer: B

Question No.327

Select the question you would ask your customer related to DNS attacks. Based on the material, choose the most appropriate question.

  1. How do you secure you DNS infrastructure against attacks?

  2. Do you rely on your network firewall to protect you DNS server?

  3. Do you over-provision your DNS infrastructure?

  4. Do you regularly update BIND or some other DNS application to the latest release?

Correct Answer: A

Question No.328

If the config tool is complete, which two access methods are available by default for GTM administration and configuration? (Choose two.)

  1. network access via http

  2. network access via https

  3. network access via telnet

  4. direct access via serial port

Correct Answer: BD

Question No.329

A, steaming profile will do which of the following?

  1. Search and replace all occurrences of a specified string only is responses processed by a virtual server.

  2. Search and replace all occurrences of a specified string only in request processed by a virtual server.

  3. Search and replace all occurrences of a specified string in requests and responses processed by a virtual server.

  4. Search and replace the first occurrence of a specified of a specified string in either a request or response processed by a virtual server.

Correct Answer: C

Question No.330

To share device information with F5 technical support, a customer must either verbally share the information over the phone or copy and send the information in an Email.

  1. True

  2. False

Correct Answer: B

Get Full Version of the Exam
101 Dumps
101 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.