Which statement is correct regarding the inspection of some of the services available by web applications embedded in third-party websites?

Which statement is correct regarding the inspection of some of the services available by web applications embedded in third-party websites?A . The security actions applied on the web applications will also be explicitly applied on the third-party websites.B . The application signature database inspects traffic only from the original web...

April 13, 2022 No Comments READ MORE +

What setting on the collector agent is required to achieve this?

An administrator does not want to report the logon events of service accounts to FortiGate. What setting on the collector agent is required to achieve this?A . Add the support of NTLM authentication.B . Add user accounts to Active Directory (AD).C . Add user accounts to the FortiGate group fitter.D...

April 11, 2022 No Comments READ MORE +

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?A . The collector agent uses a Windows API to query DCs for user logins.B . NetAPI polling can increase bandwidth usage in large networks.C . The collector agent must search security event logs.D . The NetSession Enum function...

April 11, 2022 No Comments READ MORE +

Given the interfaces shown in the exhibit, which two statements are true?

Refer to the exhibit. Given the interfaces shown in the exhibit, which two statements are true? (Choose two.)A . Traffic between port2 and port2-vlan1 is allowed by default.B . port1-vlan10 and port2-vlan10 are part of the same broadcast domain.C . port1 is a native VLAE . port1-vlan and port2-vlan1 can...

April 11, 2022 No Comments READ MORE +

Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)

Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)A . SSHB . HTTPSC . FTMD . FortiTelemetryView AnswerAnswer: A,B Explanation: Reference: https://docs.fortinet.com/document/fortigate/6.4.0/hardening-your-fortigate/995103/buildingsecurity-into-fortios

April 11, 2022 No Comments READ MORE +

How does FortiGate act when using SSL VPN in web mode?

How does FortiGate act when using SSL VPN in web mode?A . FortiGate acts as an FDS server.B . FortiGate acts as an HTTP reverse proxy.C . FortiGate acts as DNS server.D . FortiGate acts as router.View AnswerAnswer: B Explanation: Reference: https://pub.kb.fortinet.com/ksmcontent/Fortinet-Public/current/Fortigate_v4.0MR3/fortigate-sslvpn-40-mr3.pdf

April 10, 2022 No Comments READ MORE +

Which interface will be selected as an outgoing interface?

Refer to the exhibit. Exhibit A. Exhibit B. The exhibit contains the configuration for an SD-WAN Performance SLA, as well as the output of diagnose sys virtual-wan-link health-check. Which interface will be selected as an outgoing interface? A. port2 B. port4 C. port3 D. port1View AnswerAnswer: D Explanation: Port 1...

April 10, 2022 No Comments READ MORE +

When configuring a firewall virtual wire pair policy, which following statement is true?

When configuring a firewall virtual wire pair policy, which following statement is true?A . Any number of virtual wire pairs can be included, as long as the policy traffic direction is the same.B . Only a single virtual wire pair can be included in each policy.C . Any number of...

April 9, 2022 1 Comment READ MORE +

Which DPD mode on FortiGate will meet the above requirement?

An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel. Which DPD mode on FortiGate will meet the above requirement?A . DisabledB . On DemandC . EnabledD...

April 9, 2022 No Comments READ MORE +

Which two key configuration changes are needed on FortiGate to meet the design requirements?

A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes. * All traffic must be routed through the primary tunnel when both tunnels are up * The secondary tunnel must be used only if the primary tunnel goes...

April 9, 2022 No Comments READ MORE +