[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 321-330
Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.321
Which of the following are correct regarding Wildcard entities? (Choose two.)
-
Wildcard entities are the basis for positive security logic.
-
Wildcard entities are the basis for negative security logic.
-
Wildcard entities require the need to learn only from violations.
-
Wildcard entities can be applied to file types, URLs, cookies and parameters.
Correct Answer: AD
Question No.322
Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the BIG- IP?
-
No SSL certificates are required on the BIG-IP.
-
The BIG-IP#39;s SSL certificates must only exist.
-
The BIG-IP#39;s SSL certificates must be issued from a certificate authority.
-
The BIG-IP#39;s SSL certificates must be created within the company hosting the BIG-IPs.
Correct Answer: A
Question No.323
Which aspect of F5#39;s Intelligent Services Platform helps you extend your security conversation to include F5professionals and customers?
-
Modular Functionality
-
iApps
-
TMOS
-
DevCentral
Correct Answer: D
Question No.324
Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?
-
HTTP RFC compliancy checks
-
Length restrictions and attack signatures
-
Length restrictions and site cookie compliancy checks
-
Metacharacter enforcement and HTTP RFC compliancy check
Correct Answer: B
Question No.325
An LTM object represents a downstream server that hosts a secure Web site and contains the IP address and port combination 192.168.9.250:443. What is this object?
-
Self IP
-
Virtual Server
-
Pool
-
Node
-
Pool Member
Correct Answer: E
Question No.326
Which statement about root DNS servers is true?
-
Root servers have databases of all registered DNS servers.
-
Root servers have databases of the DNS servers for top-level domains.
-
Root servers have databases of DNS servers for each geographical area. They direct requests to appropriate LDNS servers.
-
Root servers have databases of commonly accessed sites. They also cache entries for additional
servers as requests are made.
Correct Answer: B
Question No.327
Select the question you would ask your customer related to DNS attacks. Based on the material, choose the most appropriate question.
-
How do you secure you DNS infrastructure against attacks?
-
Do you rely on your network firewall to protect you DNS server?
-
Do you over-provision your DNS infrastructure?
-
Do you regularly update BIND or some other DNS application to the latest release?
Correct Answer: A
Question No.328
If the config tool is complete, which two access methods are available by default for GTM administration and configuration? (Choose two.)
-
network access via http
-
network access via https
-
network access via telnet
-
direct access via serial port
Correct Answer: BD
Question No.329
A, steaming profile will do which of the following?
-
Search and replace all occurrences of a specified string only is responses processed by a virtual server.
-
Search and replace all occurrences of a specified string only in request processed by a virtual server.
-
Search and replace all occurrences of a specified string in requests and responses processed by a virtual server.
-
Search and replace the first occurrence of a specified of a specified string in either a request or response processed by a virtual server.
Correct Answer: C
Question No.330
To share device information with F5 technical support, a customer must either verbally share the information over the phone or copy and send the information in an Email.
-
True
-
False
Correct Answer: B
Get Full Version of the Exam
101 Dumps
101 VCE and PDF