Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection? (Choose two.)

Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection? (Choose two.)A . SP3B . CP8C . NP4D . NP6View AnswerAnswer: A,B

October 27, 2018 No Comments READ MORE +

Under what circumstance would you enable LEARN as the Action on a firewall policy?

Under what circumstance would you enable LEARN as the Action on a firewall policy?A . You want FortiGate to compile security feature activity from various security-related logs, such as virus and attack logs.B . You want FortiGate to monitor a specific security profile in a firewall policy, and provide recommendations...

October 23, 2018 No Comments READ MORE +

How can a browser trust a web-server certificate signed by a third party CA?

How can a browser trust a web-server certificate signed by a third party CA?A . The browser must have the CA certificate that signed the web-server certificate installed.B . The browser must have the web-server certificate installed.C . The browser must have the private key of CA certificate that signed...

October 20, 2018 No Comments READ MORE +

Which of the following statements about NTLM authentication are correct? (Choose two.)

Which of the following statements about NTLM authentication are correct? (Choose two.)A . It is useful when users log in to DCs that are not monitored by a collector agent.B . It takes over as the primary authentication method when configured alongside FSSD . Multi-domain environments require DC agents on...

October 19, 2018 No Comments READ MORE +

Which statement about the above configuration is true?

An administrator has enabled proxy-based antivirus scanning and configured the following settings: Which statement about the above configuration is true?A . Files bigger than 10 MB are not scanned for viruses and will be blocked.B . FortiGate scans only the first 10 MB of any file.C . Files bigger than...

October 13, 2018 No Comments READ MORE +

Which of the following statements are true when using Web Proxy Auto-discovery Protocol (WPAD) with the DHCP discovery method? (Choose two.)

Which of the following statements are true when using Web Proxy Auto-discovery Protocol (WPAD) with the DHCP discovery method? (Choose two.)A . The browser sends a DHCPINFORM request to the DHCP server.B . The browser will need to be preconfigured with the DHCP server’s IP address.C . The DHCP server...

October 13, 2018 1 Comment READ MORE +

Which statement about the FortiGuard services for the FortiGate is true?

Which statement about the FortiGuard services for the FortiGate is true?A . Antivirus signatures are downloaded locally on the FortiGate.B . FortiGate downloads IPS updates using UDP port 53 or 8888.C . FortiAnalyzer can be configured as a local FDN to provide antivirus and IPS updates.D . The web filtering...

October 11, 2018 No Comments READ MORE +

Which statements are correct based on this output?

Which statements are correct based on this output? (Choose two.)A . The global configuration is synchronized between the primary and secondary FortiGate.B . The all VDOM is not synchronized between the primary and secondary FortiGate.C . The root VDOM is not synchronized between the primary and secondary FortiGate.D . The...

October 9, 2018 1 Comment READ MORE +

What statements about the configuration are correct?

A FortiGate interface is configured with the following commands: What statements about the configuration are correct? (Choose two.)A . IPv6 clients connected to port1 can use SLAAC to generate their IPv6 addresses.B . FortiGate can provide DNS settings to IPv6 clients.C . FortiGate can send IPv6 router advertisements (RAs.)D ....

October 9, 2018 No Comments READ MORE +

How do you configure inline SSL inspection on a firewall policy? (Choose two.)

How do you configure inline SSL inspection on a firewall policy? (Choose two.)A . Enable one or more flow-based security profiles on the firewall policy.B . Enable the SSL/SSH Inspection profile on the firewall policy.C . Execute the inline ssl inspection CLI command.D . Enable one or more proxy-based security...

October 8, 2018 No Comments READ MORE +