Which statement best describes the role of a DC agent in an FSSO DC agent mode solution?
Which statement best describes the role of a DC agent in an FSSO DC agent mode solution?A . It captures the login and logoff events and forwards them to the collector agent.B . It captures the login events and forwards them to the collector agent.C . It captures the login...
Which two items must they configure on their FortiGate to accomplish this?
An administrator wants to monitor their network for any probing attempts aimed to exploit existing vulnerabilities in their servers. Which two items must they configure on their FortiGate to accomplish this? (Choose two.)A . A web application firewall profile to check protocol constraintsB . A DoS policy, and log all...
Which additional load balancing method is supported in equal cost multipath (ECMP) load balancing when SD-WAN is enabled?
Which additional load balancing method is supported in equal cost multipath (ECMP) load balancing when SD-WAN is enabled?A . Volume basedB . Source-destination IP basedC . Source IP basedD . Weight basedView AnswerAnswer: A Explanation: Volume load balancing method is supported in equal cost multipath (ECMP) load balancing when SD-WAN...
What is eXtended Authentication (XAuth)?
What is eXtended Authentication (XAuth)?A . It is an IPsec extension that forces remote VPN users to authenticate using their local ID.B . It is an IPsec extension that forces remote VPN users to authenticate using their credentials (username and password).C . It is an IPsec extension that authenticates remote...
Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)
Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.) A. The keyUsage extension must be set to keyCertSign. B. The CA extension must be set to TRUE. C. The issuer must be a public CA. D. The...
Which are two benefits of using SD-WAN? (Choose two.)
Which are two benefits of using SD-WAN? (Choose two.)A . FortiGate performs per-packet distribution across multiple SD-WAN members.B . WAN is used effectively.C . Application steering is available.D . Firewall policies are not required.View AnswerAnswer: B,C Explanation: The two benefits of using SD-WAN are: B. WAN is used effectively. SD-WAN...
Which two statements are true?
Refer to the exhibit. The exhibit displays the output of the CLI command: diagnose sys ha dump-by vcluster. Which two statements are true? (Choose two.)A . FortiGate SN FGVM010000065036 HA uptime has been reset.B . FortiGate devices are not in sync because one device is down.C . FortiGate SN FGVM010000064692...
In this scenario, what are two requirements for the VLAN ID?
FortiGate is operating in NAT mode and is configured with two virtual LAN (VLAN) subinterfaces added to the same physical interface. In this scenario, what are two requirements for the VLAN ID? (Choose two.)A . The two VLAN subinterfaces can have the same VLAN ID, only if they have IP...
Which two security profiles are handled by the IPS engine?
Examine the exhibit, which shows a firewall policy configured with multiple security profiles. Which two security profiles are handled by the IPS engine? (Choose two.)A . Web FilterB . IPSC . AntiVirusD . Application ControlView AnswerAnswer: B,D Explanation: When the FortiGate is set for proxy inspection mode, the IPS engine...
Which two key configuration changes must the administrator make on FortiGate to meet the requirements?
A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes. All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In...