When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose two.)
When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose two.)
When implementing Data Guard in BIG-IP ASM, it scans for suspicious patterns in both all client requests and all server responses. Scanning all client requests allows the system to detect potentially harmful inputs before they reach the server, while scanning all server responses ensures that sensitive information is not leaked back to the client inappropriately.
they are correct...see here: https://techdocs.f5.com/kb/en-us/products/big-ip_asm/manuals/product/asm-implementations-11-5-0/9.html
These answers do not make sense, I think A and B are correct