What must you configure to enable proxy-based TCP session failover?
What must you configure to enable proxy-based TCP session failover?A . You must configure ha-configuration-sync under configure system ha.B . You do not need to configure anything because all TCP sessions are automatically failed over.C . You must configure session-pickup-enable under configure system ha.D . You must configure session-pickup-connectionless enable...
Which three pieces of information are included in the sniffer output?
Refer to the exhibit. An administrator is running a sniffer command as shown in the exhibit. Which three pieces of information are included in the sniffer output? (Choose three.)A . Interface nameB . Ethernet headerC . IP headerD . Application headerE . Packet payloadView AnswerAnswer: A,C,E Explanation: Packet Capture Verbosity...
Which three options are the remote log storage options you can configure on FortiGate? (Choose three.)
Which three options are the remote log storage options you can configure on FortiGate? (Choose three.) A. FortiSIEM B. FortiCloud C. FortiCache D. FortiSandbox E. FortiAnalyzerView AnswerAnswer: A,B,E Explanation: The three remote log storage options you can configure on FortiGate are: A. FortiSIEM FortiSIEM is a comprehensive security information and...
What are two reasons for the failed virus detection by FortiGate?
A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and does not block the file,...
What are the two results of this configuration?
An administrator has configured the following settings: config system settings set ses-denied-traffic enable end config system global set block-session-timer 30 end What are the two results of this configuration? (Choose two.)A . Device detection on all interfaces is enforced for 30 seconds.B . Denied users are blocked for 30 seconds.C...
Based on the information shown in the exhibit, what configuration change must the administrator make to fix the connectivity issue?
Refer to the exhibit. The exhibit shows a diagram of a FortiGate device connected to the network, the firewall policy and VIP configuration on the FortiGate device, and the routing table on the ISP router. When the administrator tries to access the web server public address (203.0.113.2) from the internet,...
What are two functions of ZTNA? (Choose two.)
What are two functions of ZTNA? (Choose two.) A. ZTNA manages access through the client only. B. ZTNA manages access for remote users only. C. ZTNA provides a security posture check. D. ZTNA provides role-based access.View AnswerAnswer: C,D Explanation: C. ZTNA provides a security posture check. D. ZTNA provides role-based...
Which two settings must you configure when FortiGate is being deployed as a root FortiGate in a Security Fabric topology? (Choose two.)
Which two settings must you configure when FortiGate is being deployed as a root FortiGate in a Security Fabric topology? (Choose two.)A . FortiManager IP addressB . FortiAnalyzer IP addressC . Pre-authorize downstream FortiGate devicesD . Fabric nameView AnswerAnswer: B,D Explanation: The correct choices for settings to configure when FortiGate...
Which two configuration settings are global settings? (Choose two.)
Which two configuration settings are global settings? (Choose two.)A . User & Device settingsB . Firewall policiesC . HA settingsD . FortiGuard settingsView AnswerAnswer: C,D Explanation: The two configuration settings that are global settings are: C. HA settings - High Availability settings are typically configured globally to manage failover and...
Which two IP pool types enable you to identify user connections without having to log user traffic? (Choose two.)
Which two IP pool types enable you to identify user connections without having to log user traffic? (Choose two.) A. Fixed port range B. Port block allocation C. One-to-one D. OverloadView AnswerAnswer: A,B Explanation: A. Fixed port range With a fixed port range IP pool, each user is assigned an...