Loading questions...
Updated
An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.
How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?
An administrator is extensively using VXLAN on FortiGate.
Which specialized acceleration hardware does FortiGate need to improve its performance?
Refer to the exhibit, which shows a partial enterprise network.
Refer to the exhibit, which shows the ADVPN network topology and partial BGP configuration.
Which two statements about IKEv2 are true if an administrator decides to implement IKEv2 in the VPN topology? (Choose two.)
An administrator must enable direct communication between multiple spokes in a company's network. Each spoke has more than one internet connection.
The requirement is for the spokes to connect directly without passing through the hub, and for the links to automatically switch to the best available connection.
How can this automatic detection and optimal link utilization between spokes be achieved?
What does the command set forward-domain <domain_ID> in a transparent VDOM interface do?
Refer to the exhibit, which shows a physical topology and a traffic log.
Refer to the exhibit, which contains a partial VPN configuration.
An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.
What two conclusions can the administrator draw? (Choose two.)
Create a free account to unlock all questions for this exam.
Log In / Sign UpA company that acquired multiple branches across different countries needs to install new FortiGate devices on each of those branches. However, the IT staff lacks sufficient knowledge to implement the initial configuration on the FortiGate devices.
Which three approaches can the company take to successfully deploy advanced initial configurations on remote branches? (Choose three.)
What is the initial step performed by FortiGate when handling the first packets of a session?
An administrator would like the area 0.0.0.0 to detect the external network.
What must the administrator configure?
Which two parameters must an administrator configure in the config neighbor range for spokes shown in the exhibit? (Choose two.)
The administrator is checking on FortiAnalyzer traffic from the device with IP address 10.1.10.1, located behind the FortiGate ISFW device.
The firewall policy in on the ISFW device does not have UTM enabled and the administrator is surprised to see a log with the action Malware, as shown in the exhibit.
What are the two reasons FortiAnalyzer would display this log? (Choose two.)
What can you conclude from this VPN IPsec phase 1 configuration?