Enjoy 15% Discount With Coupon 15off

Monthly Archives - May 2021

Which statements about the firmware upgrade process on an active-active HA cluster are true? (Choose two.)

Which statements about the firmware upgrade process on an active-active HA cluster are true? (Choose two.)A . The firmware image must be manually uploaded to each FortiGate.B . Only secondary FortiGate devices are rebooted.C . Uninterruptable upgrade is enabled by default.D . Traffic load balancing is temporally disabled while upgrading...

Read more...

What can the System Administrator do to trouble shoot this issue?

When a Sales Representative creates a lead, a workflow rule should be triggered to immediately send a welcome email to the lead. Some representative report that their leads never received this email, even when the email address is correct. What can the System Administrator do to trouble shoot this issue?A...

Read more...

Which permission should be granted to a user with Administrator permission and with no access to the encrypted VM console?

Which permission should be granted to a user with Administrator permission and with no access to the encrypted VM console?A . New role with no Cryptographic OperationsB . Administrator role and Read Only RoleC . Administrator roleD . No Cryptography Administrator roleView AnswerAnswer: D Explanation: https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.security.doc/GUID-17568345-E59E-43A8-A811-92F8BE9C7719.html#GUID-17568345-E59E-43A8-A811-92F8BE9C7719

Read more...

What can you use a custom end-user personalization configuration for? Note: There are 3 correct answers to this question.

What can you use a custom end-user personalization configuration for? Note: There are 3 correct answers to this question.A . To assign it to the standard access requestB . To assign it to an access request templateC . To restrict a user's ability to approve their own requestsD . To...

Read more...

Which two other security profiles can you apply to the security policy?

FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy. Which two other security profiles can you apply to the security policy? (Choose two.)A . Antivirus scanningB . File filterC . DNS filterD . Intrusion preventionView AnswerAnswer: A,D

Read more...