An administrator wants to monitor their network for any probing attempts aimed to exploit existing vulnerabilities in their servers. What must they configure on their FortiGate to accomplish this?

An administrator wants to monitor their network for any probing attempts aimed to exploit existing vulnerabilities in their servers. What must they configure on their FortiGate to accomplish this?

(Choose two.)

Response:
A . An application control profile and set all application signatures to monitor.
B . A DoS policy, and log all UDP and TCP scan attempts.
C . An IPS sensor to monitor all signatures applicable to the server.
D . A web application firewall profile to check protocol constraints.

Answer: BC

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments