Podcast
Questions and Answers
Each security policy has a fixed set of attack signatures that cannot be changed.
Each security policy has a fixed set of attack signatures that cannot be changed.
False
User-defined attack signatures can be edited but not deleted from the Attack Signatures Pool.
User-defined attack signatures can be edited but not deleted from the Attack Signatures Pool.
False
System-supplied attack signatures are stored in a separate pool from user-defined attack signatures.
System-supplied attack signatures are stored in a separate pool from user-defined attack signatures.
False
You cannot create your own custom attack signature sets.
You cannot create your own custom attack signature sets.
Signup and view all the answers
All attack signature sets are suitable for all types of applications or attacks.
All attack signature sets are suitable for all types of applications or attacks.
Signup and view all the answers
Information Leakage occurs when an attacker attempts to inject XPath queries into a susceptible web application.
Information Leakage occurs when an attacker attempts to inject XPath queries into a susceptible web application.
Signup and view all the answers
User-defined attack signatures are created by the system and added to the attack signature pool.
User-defined attack signatures are created by the system and added to the attack signature pool.
Signup and view all the answers
Filter-based signature sets require manual selection of individual attack signatures to include.
Filter-based signature sets require manual selection of individual attack signatures to include.
Signup and view all the answers
A security policy can be assigned an individual signature.
A security policy can be assigned an individual signature.
Signup and view all the answers
The Generic Attack Signature Set is not applied to new security policies by default.
The Generic Attack Signature Set is not applied to new security policies by default.
Signup and view all the answers