Which of the following is not a feature of a standalone BIG-IP ASM System?
A. Attack signatures
B. Multiple pool members
C. Positive security model
D. Real-time traffic policy builder
E. Pre-defined security policy templates
Which of the following is not a feature of a standalone BIG-IP ASM System?
A. Attack signatures
B. Multiple pool members
C. Positive security model
D. Real-time traffic policy builder
E. Pre-defined security policy templates