An administrator is performing a capture from a lagged port on an Ethernet SWITCH.
Which OSI layer should be inspected to determine with which VLAN a datagram is associated?
Correct Answer:B
in which scenario is a full proxy required?
Correct Answer:A
Reference https //devcentral.f5.com/articles/three-things-your-proxy-cart-do-unless-its-a-full-proxy
A BIG-IP Administrator needs a solution to tunnel traffic and transmit encrypted connections over the Internet using only a standard browser and common ports and protocols. Which solution should the administrator select?
Correct Answer:D
This is APMs use of the netscape plugin api (NPAPI) that most browsers have deprecated at this point.
The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?
Correct Answer:C
https //www.dosarrpst.com'ddos-blog/the-difference-between-positive-s-negatto-wafi
in which scenario is a full proxy TCP connection required?
Correct Answer:A