Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)

Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)A . Log downloads from the GUI are limited to the current filter viewB . Log backups from the CLI cannot be restored to another FortiGate.C . Log backups...

May 25, 2021 No Comments READ MORE +

Based on the administrator profile settings, what permissions must the administrator set to run the diagnose firewall auth list CLI command on FortiGate?

Refer to the exhibit. Based on the administrator profile settings, what permissions must the administrator set to run the diagnose firewall auth list CLI command on FortiGate?A . Custom permission for NetworkB . Read/Write permission for Log & ReportC . CLI diagnostics commands permissionD . Read/Write permission for FirewallView AnswerAnswer:...

May 24, 2021 No Comments READ MORE +

If Internet Service is already selected as Source in a firewall policy, which other configuration objects can be added to the Source filed of a firewall policy?

If Internet Service is already selected as Source in a firewall policy, which other configuration objects can be added to the Source filed of a firewall policy?A . IP addressB . Once Internet Service is selected, no other object can be addedC . User or User GroupD . FQDN addressView...

May 24, 2021 No Comments READ MORE +

Which statement is correct if well-known viruses are not being blocked?

Refer to the exhibit to view the firewall policy. Which statement is correct if well-known viruses are not being blocked?A . The firewall policy does not apply deep content inspection.B . The firewall policy must be configured in proxy-based inspection mode.C . The action on the firewall policy must be...

May 24, 2021 No Comments READ MORE +

What should the user do to successfully connect to SSL VPN?

Refer to the exhibits. The SSL VPN connection fails when a user attempts to connect to it. What should the user do to successfully connect to SSL VPN?A . Change the SSL VPN port on the client.B . Change the Server IP address.C . Change the idle-timeout.D . Change the...

May 23, 2021 No Comments READ MORE +

Based on the output shown in the exhibit, which two statements are correct?

Refer to the FortiGuard connection debug output. Based on the output shown in the exhibit, which two statements are correct? (Choose two.)A . A local FortiManager is one of the servers FortiGate communicates with.B . One server was contacted to retrieve the contract information.C . There is at least one...

May 22, 2021 No Comments READ MORE +

Which CLI command will display sessions both from client to the proxy and from the proxy to the servers?

Which CLI command will display sessions both from client to the proxy and from the proxy to the servers?A . diagnose wad session listB . diagnose wad session list | grep hook-pre&&hook-outC . diagnose wad session list | grep hook=pre&&hook=outD . diagnose wad session list | grep "hook=pre"&"hook=out"View AnswerAnswer: D

May 22, 2021 No Comments READ MORE +

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)A . The subject field in the server certificateB . The serial number in the server certificateC . The server name indication (SNI) extension in the client...

May 21, 2021 No Comments READ MORE +

What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)

What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)A . Traffic to botnetserversB . Traffic to inappropriate web sitesC . Server information disclosure attacksD . Credit card data leaksE . SQL injection attacksView AnswerAnswer: CDE

May 21, 2021 No Comments READ MORE +

Which two statements are true about the FGCP protocol? (Choose two.)

Which two statements are true about the FGCP protocol? (Choose two.)A . Not used when FortiGate is in Transparent modeB . Elects the primary FortiGate deviceC . Runs only over the heartbeat linksD . Is used to discover FortiGate devices in different HA groupsView AnswerAnswer: BC

May 21, 2021 No Comments READ MORE +