List of questions
Related questions
Question 56 - 1Y0-241 discussion
To protect an environment against Hash DoS attacks, which two configurations can a Citrix Administrator use to block all post requests that are larger than 10,000 bytes? (Choose two.)
A.
> add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”)&&http.REQ.CONTENT_LENGTH.GT(10000)”> add rewrite policy drop_rewrite expr_hashdos_prevention DROP> bind rewrite global drop_rewrite 100 END –type REQ_OVERRIDE
B.
> add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”)&&http.REQ.CONTENT_LENGTH.GT(10000)”> add responder policy pol_resp_hashdos_prevention expr_hashdos_prevention DROP NOOP> bind responder global pol_resp_hashdos_prevention 70 END –type REQ_OVERRIDE
C.
> add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”) ||http.REQ.CONTENT_LENGTH.GT(10000)”> add responder policy pol_resp_hashdos_prevention expr_hashdos_prevention DROP NOOP> bind responder global pol_resp_hashdos_prevention 70 END –type REQ_OVERRIDE
D.
> add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”) ||http.REQ.CONTENT_LENGTH.GT(10000)”> add rewrite policy drop_rewrite expr_hashdos_prevention DROP> bind rewrite global drop_rewrite 70 END –type REQ_OVERRIDE
E.
> add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”) ||http.REQ.CONTENT_LENGTH.GT(10000)”> add responder policy pol_resp_hashdos_prevention expr_hashdos_prevention DROP NOOP> bind responder global pol_resp_hashdos_prevention 100 END –type REQ_OVERRIDE
F.
> add policy expression expr_hashdos_prevention “http.REQ.METHOD.EQ(\”POST\”) ||http.REQ.CONTENT_LENGTH.GT(10000)”> add rewrite policy drop_rewrite expr_hashdos_prevention DROP> bind rewrite global drop_rewrite 100 END –type REQ_OVERRIDE
Your answer:
0 comments
Sorted by
Leave a comment first