What files are sent to FortiSandbox for inspection in flow-based inspection mode?

What files are sent to FortiSandbox for inspection in flow-based inspection mode?A . All suspicious files that do not have their hash value in the FortiGuard antivirus signature database.B . All suspicious files that are above the defined oversize limit value in the protocol options.C . All suspicious files that...

July 13, 2020 No Comments READ MORE +

Why does FortiGate keep TCP sessions in the session table for some seconds even after both sides (client and server) have terminated the session?

Why does FortiGate keep TCP sessions in the session table for some seconds even after both sides (client and server) have terminated the session?A . To remove the NAT operation.B . To generate logsC . To finish any inspection operations.D . To allow for out-of-order packets that could arrive after...

July 12, 2020 No Comments READ MORE +

Which security profile’s configuration does not change when you enable policy-based inspection?

NGFW mode allows policy-based configuration for most inspection rules. Which security profile’s configuration does not change when you enable policy-based inspection?A . Web filteringB . AntivirusC . Web proxyD . Application controlView AnswerAnswer: B

July 12, 2020 No Comments READ MORE +

Which statements best describe auto discovery VPN (ADVPN). (Choose two.)

Which statements best describe auto discovery VPN (ADVPN). (Choose two.)A . It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.B . ADVPN is only supported with IKEv2.C . Tunnels are negotiated dynamically between spokes.D . Every spoke requires a static tunnel...

July 11, 2020 No Comments READ MORE +

What can be the reasons for that?

An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.)A . The interface has been configured for one-arm sniffer.B . The interface is a member of a virtual wire pair.C . The operation mode is transparent.D ....

July 11, 2020 No Comments READ MORE +

Which of the following SD-WAN load Cbalancing method use interface weight value to distribute traffic? (Choose two.)

Which of the following SD-WAN load Cbalancing method use interface weight value to distribute traffic? (Choose two.)A . Source IPB . SpilloverC . VolumeD . SessionView AnswerAnswer: C D

July 11, 2020 No Comments READ MORE +

Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)

Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)A . Log downloads from the GUI are limited to the current filter viewB . Log backups from the CLI cannot be restored to another FortiGate.C . Log backups...

July 11, 2020 No Comments READ MORE +

Which of the following statements are true when using WPAD with the DHCP discovery method? (Choose two.)

Which of the following statements are true when using WPAD with the DHCP discovery method? (Choose two.)A . If the DHCP method fails, browsers will try the DNS method.B . The browser needs to be preconfigured with the DHCP server’s IP address.C . The browser sends a DHCPONFORM request to...

July 11, 2020 No Comments READ MORE +

Which statements about the output are correct?

Examine this output from a debug flow: Which statements about the output are correct? (Choose two.)A . FortiGate received a TCP SYN/ACK packet.B . The source IP address of the packet was translated to 10.0.1.10.C . FortiGate routed the packet through port 3.D . The packet was allowed by the...

July 10, 2020 No Comments READ MORE +

What settings must you configure to ensure FortiGate generates logs for web filter activity on a firewall policy called Full Access? (Choose two.)

What settings must you configure to ensure FortiGate generates logs for web filter activity on a firewall policy called Full Access? (Choose two.)A . Enable Event Logging.B . Enable a web filter security profile on the Full Access firewall policy.C . Enable Log Allowed Traffic on the Full Access firewall...

July 10, 2020 No Comments READ MORE +