Which of the following conditions roust be met in order for a web browser to trust a web server certificate signed by a third-party CA?

Which of the following conditions roust be met in order for a web browser to trust a web server certificate signed by a third-party CA?A . The web-server certificate DM be installed on the browserB . The public key of the web server certificate must be installed on die browserC...

November 25, 2019 No Comments READ MORE +

Which of the following will be highlighted based oil the input criteria?

View the following exhibit, which shows the firewall policies and the object uses in the firewall policies. The administrator is using the Policy Lookup feature and has entered the search create shown in the following exhibit. Which of the following will be highlighted based oil the input criteria?A . Policy...

November 25, 2019 1 Comment READ MORE +

What is a possible reason for this?

Examine the IPS sensor configuration and forward traffic logs shown in the exhibit; then, answer the question below. An administrator has configured the WINDOS_SERVERS IPS sensor in an attempt to determine whether the influx of HTTPS traffic is an attack attempt or not. After applying the IPS sensor, FortiGate is...

November 25, 2019 No Comments READ MORE +

The CA issued this certificate to which entity?

View the certificate shown to the exhibit, and then answer the following question: The CA issued this certificate to which entity?A . A root CAB . A personC . A bridge CAD . A subordinate CAView AnswerAnswer: B

November 25, 2019 No Comments READ MORE +

Which statements about antivirus scanning mode are true? (Choose two.)

Which statements about antivirus scanning mode are true? (Choose two.)A . In proxy-based inspection mode antivirus buffers the whole file for scarring before sending it to the client.B . In flow-based inspection mode, you can use the CLI to configure antivirus profiles to use protocol option profiles.C . In proxy-based...

November 25, 2019 1 Comment READ MORE +

What information is flushed when the chunk-size value is changed in the config dlp settings?

What information is flushed when the chunk-size value is changed in the config dlp settings?A . The database for DLP document fingerprintingB . The supported file types in the DLP filtersC . The archived files and messagesD . The file name patterns in the DLP filtersView AnswerAnswer: A

November 24, 2019 1 Comment READ MORE +

When using WPAD DNS method, winch FQDN format do browsers use to query the DNS server?

When using WPAD DNS method, winch FQDN format do browsers use to query the DNS server? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A

November 24, 2019 1 Comment READ MORE +

Which of the following statements correctly describes FortiGates route lookup behavior when searching for a suitable gateway? (Choose two)

Which of the following statements correctly describes FortiGates route lookup behavior when searching for a suitable gateway? (Choose two)A . Lookup is done on the trust packet from the session originatorB . Lookup is done on the last packet sent from the re spenderC . Lookup is done on every...

November 23, 2019 No Comments READ MORE +

Why is FortiGate not blocking the test file over FTP download?

Refer to the following exhibit. Why is FortiGate not blocking the test file over FTP download?A . Deep-inspection must be enabled for FortiGate to fully scan FTP traffic.B . FortiGate needs to be operating in flow-based inspection mode in order to scan FTP traffic.C . The FortiSandbox signature database is...

November 23, 2019 No Comments READ MORE +

What does the configuration do?

An administrator has configured the following settings: What does the configuration do? (Choose two.)A . Reduces the amount of logs generated by denied traffic.B . Enforces device detection on all interfaces for 30 minutes.C . Blocks denied users for 30 minutes.D . Creates a session for traffic being denied.View AnswerAnswer:...

November 22, 2019 No Comments READ MORE +