Which one of the following statements describes why the update is failing?
View the exhibit, which contains the output of a real-time debug, and then answer the question below. Which one of the following statements describes why the update is failing?A . The update should be using port 53 or port 8888, instead of port 443.B . FortiGate is unable to resolve...
Which two statements about the Security Fabric are true? (Choose two.)
Which two statements about the Security Fabric are true? (Choose two.)A . Only the root FortiGate collects network information and forwards it to FortiAnalyzer.B . Branch FortiGate devices must be configured first.C . FortiGate uses FortiTelemetry protocol to communicate with FortiAnalyzer.D . All FortiGate devices in the Security Fabric must...
What is the most resource-efficient method to block access to these sites?
An administrator must ensure that users cannot access sites containing malware and spyware, while also protecting them from phishing attempts. What is the most resource-efficient method to block access to these sites?A . Enable antivirus profiles to scan all web traffic and block downloads from these malicious sites.B . Configure...
Which statement about the designated router (DR) and backup designated router (BDR) in an OSPF multi-access network is true?
Which statement about the designated router (DR) and backup designated router (BDR) in an OSPF multi-access network is true?A . Only the DR receives link state information from non-DR routers.B . Non-DR and non-BDR routers form full adjacencies to DR only.C . Non-DR and non-BDR routers send link state updates...
What can the administrator do to fix this problem?
An administrator has configured two FortiGate devices for an HA cluster. While testing HA failover, the administrator notices that some of the switches in the network continue to send traffic to the former primary device. What can the administrator do to fix this problem?A . Configure remote link monitoring to...
Which one of the following statements about this FortiGate is correct?
View the exhibit, which contains the output of a debug command, and then answer the question below. Which one of the following statements about this FortiGate is correct?A . It is currently in system conserve mode because of high CPU usage.B . It is currently in proxy conserve mode because...
Which statement about administrative domains (ADOMs) on FortiManager is true?
Which statement about administrative domains (ADOMs) on FortiManager is true?A . The number of configurable ADOMs is based on the FortiManager FortiCare service contract.B . The ADOM feature can be enabled by any administrative user.C . FortiGate devices with multiple VDOMs must be assigned to the same ADOM on FortiManager.D...
Which statement is correct regarding this session?
View the exhibit, which contains a session entry, and then answer the question below. Which statement is correct regarding this session?A . This traffic is using the VIP and central NAT tables.B . This session was successfully authenticated.C . Further packets for this session will be blocked.D . This session...
Which statements are true regarding the output in the exhibit?
Examine the output of the ‘get router info bgp summary’ command shown in the exhibit; then answer the question below. Which statements are true regarding the output in the exhibit? (Choose two.)A . BGP state of the peer 10.125.0.60 is Established.B . BGP peer 10.200.3.1 has never been down since...
What source MAC address does the web server detect when a user accesses it?
Refer to the exhibits. The exhibits show a network diagram, the output from the command config system ha, and a firewall policy. What source MAC address does the web server detect when a user accesses it? A. The virtual MAC address of FortiGate B. B. The physical MAC address of...