Loading questions...
Updated
Refer to the exhibits.
An employee needs to connect to the office through a high-latency internet connection.
Which SSL VPN setting should the administrator adjust to prevent SSL VPN negotiation failure?
When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.
Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)
Refer to the exhibit, which shows the IPS sensor configuration.
Which statement is a characteristic of automation stitches?
What is the primary FortiGate election process when the HA override setting is disabled?
Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.)
Refer to the exhibit.
Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.
Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)
Which two statements describe how the RPF check is used? (Choose two.)
Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)
Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)
Which two statements are true regarding FortiGate HA configuration synchronization? (Choose two.)
What are two features of the NGFW profile-based mode? (Choose two.)
Refer to the exhibit to view the firewall policy.
Create a free account to unlock all questions for this exam.
Log In / Sign UpRefer to the exhibit.
Which two statements are true about the routing entries in this database table? (Choose two.)
A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.
All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.
Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)
The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details.
Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?
If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)
Which statement about this firewall policy list is true?
Based on the exhibit, which statement is true?
Why would the firewall policy not block a well-known virus, for example eicar?