A. The application encoding scheme needs to be determined by the BIG-IP ASM System.
B. Flow-level parameters checkingis required.
C. Sufficient time is available to allow completely automated policy building based on observing live traffic.
D. The application platform must be protected against known attacks for the specific operating system, web server, and database.
A. Wildcard tightening will be enabled on file types and parameters.
B. The enforcement mode will be set to transparent.
C. The encoding language will be set to auto detect.
D. Data Guard will be enabled.
E. The Attack signature set applied will be Generic Detection Signatures.
A. Blocking response pages can be automatically generated from web site content.
B. Maximum acceptable values for length violations are calculated and can be accepted into the security policy by the administrator.
C. XML-based parameters and associated schema are automatically learned.
D. The administrator may modify whether the BIG-IP ASM System will learn, alarm, or block detected violations.
E. Flow level parameters are displayed when found and can be accepted into the current policy.
A. Security policies
B. Web applications
C. HTTP class
D. Attack signatures
A. Global
B. URL
C. Object
D. Flow