Which of the following statement about the output is true?

Examine the exhibit, which shows the partial output of an IKE real-time debug. Which of the following statement about the output is true?A . The VPN is configured to use pre-shared key authentication.B . Extended authentication (XAuth) was successfulC . Remote is the host name of the remote lPsec peer.D...

May 5, 2021 No Comments READ MORE +

What information will be included in the sniffer output?

An administrator is running the following sniffer command : diagnose sniffer packet any"host 10.0.2.10" 3 What information will be included in the sniffer output? (Choose three.)A . IP headerB . Ethernet headerC . Packet payloadD . Application headerE . Interface nameView AnswerAnswer: ABC

May 5, 2021 No Comments READ MORE +

Which statement best describes what occurs during this scenario?

An administrator has configured a dialup IPsec VPN with XAuth. Which statement best describes what occurs during this scenario?A . Phase 1 negotiations will skip preshared key exchange.B . Only digital certificates will be accepted as an authentication method in phase 1.C . Dialup clients must provide a username and...

May 5, 2021 No Comments READ MORE +

How does FortiGate verify the login credentials of a remote LDAP user?

How does FortiGate verify the login credentials of a remote LDAP user?A . FortiGate regenerates the algorithm based on the login credentials and compares it to the algorithm stored on the LDAP serverB . FortiGate sends the user-entered credentials to the LDAP server for authenticationC . FortiGate queries the LDAP...

May 3, 2021 No Comments READ MORE +

A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added to the physical interface. Which statements about the VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different subnets.

A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added to the physical interface. Which statements about the VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different subnets.A . The two VLAN sub interfaces can...

May 3, 2021 No Comments READ MORE +

Which statements about a One-to-One IP pool are true? (Choose two. )

Which statements about a One-to-One IP pool are true? (Choose two. )A . It is used for destination NAC . It allows the fixed mapping of an internal address range to an external address range.D . It does not use port address translation.E . ID It allows the configuration of...

May 3, 2021 No Comments READ MORE +

Which of the following statements are true when using WPAD with the DHCP discovery method? (Choose two.)

Which of the following statements are true when using WPAD with the DHCP discovery method? (Choose two.)A . If the DHCP method fails, browsers will try the DNS method.B . The browser needs to be preconfigured with the DHCP server's IP addressC . The browser sends a DHCPONFORM request to...

May 2, 2021 No Comments READ MORE +

Which configuration objects can be selected for the Source field of a firewall policy? (Choose two.)

Which configuration objects can be selected for the Source field of a firewall policy? (Choose two.)A . Firewall serviceB . User or user groupC . IP PoolD . FQDN addressView AnswerAnswer: BD

May 2, 2021 No Comments READ MORE +

What is the cause of the problem?

An administrator has configured two VLAN interfaces : A DHCP server is connected to the VLAN 10 interface , A DHCP Client is connected to the VLAN5 interface. However , the DHCP client cannot get a dynamic IP address from the DHCP server. What is the cause of the problem?A...

May 1, 2021 No Comments READ MORE +

What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?

What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?A . It limits the scope of application control to the browser-based technology category onlyB . It limits the scope of application control to scan application traffic based on application...

May 1, 2021 No Comments READ MORE +