Which type of storage is typically designed to span multiple sets of hardware and has a flat repository?
Which type of storage is typically designed to span multiple sets of hardware and has a flat repository?A . ObjectB . FileC . EphemeralD . BlockView AnswerAnswer: A
Which of the following services can be inspected by the DLP profile? (Choose three.)
Which of the following services can be inspected by the DLP profile? (Choose three.)A . NFSB . FTPC . IMAPD . CIFSE . HTTP-POSTView AnswerAnswer: BCE
Which two statements about virtual domains (VDOMs) are true? (Choose two.)
Which two statements about virtual domains (VDOMs) are true? (Choose two.)A . Transparent mode and NAT mode VDOMs cannot be combined on the same FortiGate.B . Each VDOM can be configured with different system hostnames.C . Different VLAN subinterfaces of the same physical interface can be assigned to different VDOMs.D...
Which command should an administrator run to check the status of vRealize Automation services?
Which command should an administrator run to check the status of vRealize Automation services?A . kubectl cluster-info -n preludeB . vracli statusC . kubectl -n prelude get podsD . vracli org-oauth-appsView AnswerAnswer: B Explanation: Reference: https://docs.vmware.com/en/VMware-Validated-Design/6.0/sddc-operational-verification/GUID040957F2-F4F0-46CE-857B-A0BAF03355EB.html
Which formula expression should the Admin set up on the price condition for this uplift price rule?
When quoting any subscription product, a user at Universal Containers must choose the payment frequency between Monthly or Annually. When frequency is Monthly, Universal Containers wants to apply an automatic uplift of 10% to the price of the subscription service. The Admin decides to use a price rule to implement...
What three FortiGate components are tested during the hardware test? (Choose three.)
What three FortiGate components are tested during the hardware test? (Choose three.)A . CPUB . Administrative accessC . HA heartbeatD . Hard diskE . Network interfacesView AnswerAnswer: ADE
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email? A . DeliveryB . ReconnaissanceC . Command and ControlD . ExploitationView AnswerAnswer: D
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?A . remote user’s public IP addressB . The public IP address of the FortiGate device.C . The remote user’s virtual IP address.D . The internal...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
Which of the following statements are correct about Search & Reporting App? (Choose three.)
Which of the following statements are correct about Search & Reporting App? (Choose three.)A . Can be accessed by Apps > Search & Reporting.B . Provides default interface for searching and analyzing logs.C . Enables the user to create knowledge object, reports, alerts and dashboards.D . It only gives us...