Loading questions...
Updated
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server?
Examine the IPS sensor configuration shown in the exhibit, and then answer the question below.
What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)
Which statement about DLP on FortiGate is true?
Examine this PAC file configuration.
Which statements about the firmware upgrade process on an active-active HA cluster are true? (Choose two.)
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
An administrator needs to create an SSL-VPN connection for accessing an internal server using the bookmark Port Forward. What step is required for this configuration?
What FortiGate configuration is required to actively prompt users for credentials?
Which statements are true regarding firewall policy NAT using the outgoing interface IP address with fixed port disabled? (Choose two.)
Which statement is true regarding the policy ID number of a firewall policy?
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
The FSSO Collector Agent set to advanced access mode for the Windows Active Directory uses which of the following?
Examine the following web filtering log.
Which of the following SD-WAN load ""balancing method use interface weight value to distribute traffic? (Choose two.)
Which is a requirement for creating an inter-VDOM link between two VDOMs?
Which statement regarding the firewall policy authentication timeout is true?
How do you format the FortiGate flash disk?
Which of the following are valid actions for FortiGuard category based filter in a web filter profile ui proxy-based inspection mode? (Choose two.)
Examine the IPS sensor and DoS policy configuration shown in the exhibit, then answer the question below.
NGFW mode allows policy-based configured for most inspection rules. Which security profile's configuration does not change when you enable policy-based inspection?
An administrator wants to block HTTP uploads. Examine the exhibit, which contains the proxy address created for that purpose.
Which statement about the IP authentication header (AH) used by IPsec is true?
What files are sent to FortiSandbox for inspection in flow-based inspection mode?
View the exhibit.
Based on this output, which statements are correct? (Choose two.)
An administrator has configured the WINDOS_SERVERS IPS sensor in an attempt to determine whether the influx of HTTPS traffic is an attack attempt or not. After applying the IPS sensor, FortiGate is still not generating any IPS logs for the HTTPS traffic.
What is a possible reason for this?
Which of the following statements are true? (Choose two.)
Which statement about the log message is true?
When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first?
Where must the proxy address be used?