What must you configure to enable proxy-based TCP session failover?

What must you configure to enable proxy-based TCP session failover?A . You must configure ha-configuration-sync under configure system ha.B . You do not need to configure anything because all TCP sessions are automatically failed over.C . You must configure session-pickup-enable under configure system ha.D . You must configure session-pickup-connectionless enable...

May 18, 2025 No Comments READ MORE +

Which three pieces of information are included in the sniffer output?

Refer to the exhibit. An administrator is running a sniffer command as shown in the exhibit. Which three pieces of information are included in the sniffer output? (Choose three.)A . Interface nameB . Ethernet headerC . IP headerD . Application headerE . Packet payloadView AnswerAnswer: A,C,E Explanation: Packet Capture Verbosity...

May 17, 2025 No Comments READ MORE +

Which three options are the remote log storage options you can configure on FortiGate? (Choose three.)

Which three options are the remote log storage options you can configure on FortiGate? (Choose three.) A. FortiSIEM B. FortiCloud C. FortiCache D. FortiSandbox E. FortiAnalyzerView AnswerAnswer: A,B,E Explanation: The three remote log storage options you can configure on FortiGate are: A. FortiSIEM FortiSIEM is a comprehensive security information and...

May 15, 2025 No Comments READ MORE +

What are two reasons for the failed virus detection by FortiGate?

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and does not block the file,...

May 15, 2025 No Comments READ MORE +

What are the two results of this configuration?

An administrator has configured the following settings: config system settings set ses-denied-traffic enable end config system global set block-session-timer 30 end What are the two results of this configuration? (Choose two.)A . Device detection on all interfaces is enforced for 30 seconds.B . Denied users are blocked for 30 seconds.C...

May 14, 2025 No Comments READ MORE +

Based on the information shown in the exhibit, what configuration change must the administrator make to fix the connectivity issue?

Refer to the exhibit. The exhibit shows a diagram of a FortiGate device connected to the network, the firewall policy and VIP configuration on the FortiGate device, and the routing table on the ISP router. When the administrator tries to access the web server public address (203.0.113.2) from the internet,...

May 13, 2025 No Comments READ MORE +

What are two functions of ZTNA? (Choose two.)

What are two functions of ZTNA? (Choose two.) A. ZTNA manages access through the client only. B. ZTNA manages access for remote users only. C. ZTNA provides a security posture check. D. ZTNA provides role-based access.View AnswerAnswer: C,D Explanation: C. ZTNA provides a security posture check. D. ZTNA provides role-based...

May 13, 2025 No Comments READ MORE +

Which two settings must you configure when FortiGate is being deployed as a root FortiGate in a Security Fabric topology? (Choose two.)

Which two settings must you configure when FortiGate is being deployed as a root FortiGate in a Security Fabric topology? (Choose two.)A . FortiManager IP addressB . FortiAnalyzer IP addressC . Pre-authorize downstream FortiGate devicesD . Fabric nameView AnswerAnswer: B,D Explanation: The correct choices for settings to configure when FortiGate...

May 12, 2025 No Comments READ MORE +

Which two configuration settings are global settings? (Choose two.)

Which two configuration settings are global settings? (Choose two.)A . User & Device settingsB . Firewall policiesC . HA settingsD . FortiGuard settingsView AnswerAnswer: C,D Explanation: The two configuration settings that are global settings are: C. HA settings - High Availability settings are typically configured globally to manage failover and...

May 11, 2025 No Comments READ MORE +

Which two IP pool types enable you to identify user connections without having to log user traffic? (Choose two.)

Which two IP pool types enable you to identify user connections without having to log user traffic? (Choose two.) A. Fixed port range B. Port block allocation C. One-to-one D. OverloadView AnswerAnswer: A,B Explanation: A. Fixed port range With a fixed port range IP pool, each user is assigned an...

May 10, 2025 No Comments READ MORE +