Loading questions...
Updated
An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel.
Which DPD mode on FortiGate will meet the above requirement?
Refer to the exhibit.
In an explicit proxy setup, where is the authentication method and database configured?
Refer to the exhibit.
Which three statements about a flow-based antivirus profile are correct? (Choose three.)
Refer to the exhibit.
Which two protocol options are available on the CLI but not on the GUI when configuring an SD-WAN Performance SLA? (Choose two.)
Which two inspection modes can you use to configure a firewall policy on a profile-based next-generation firewall (NGFW)? (Choose two.)
Refer to the exhibit to view the authentication rule configuration.
Refer to the exhibit to view the application control profile.
Which three security features require the intrusion prevention system (IPS) engine to function? (Choose three.)
Refer to the exhibit -
Refer to the exhibit -
Which two statements are true about collector agent advanced mode? (Choose two.)
IPS Engine is used by which three security features? (Choose three.)
If Internet Service is already selected as Destination in a firewall policy, which other configuration objects can be selected to the Destination field of a firewall policy?
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
An administrator has a requirement to keep an application session from timing out on port 80.
What two changes can the administrator make to resolve the issue without affecting any existing services running through FortiGate? (Choose two.)
Which feature in the Security Fabric takes one or more actions based on event triggers?
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not.
Which configuration option is the most effective way to support this request?
In which two ways can RPF checking be disabled? (Choose two.)
Refer to the exhibit.
Create a free account to unlock all questions for this exam.
Log In / Sign UpWhich two statements are true when FortiGate is in transparent mode? (Choose two.)
What is the effect of enabling auto-negotiate on the phase 2 configuration of an IPsec tunnel?
Based on the administrator profile settings, what permissions must the administrator set to run the diagnose firewall auth list CLI command on
FortiGate?
Given the routing database shown in the exhibit, which two statements are correct? (Choose two.)
The exhibit shows a CLI output of firewall policies, proxy policies, and proxy addresses.
How does FortiGate process the traffic sent to http://www.fortinet.com?
In this scenario, which statement is true?
Based on the configuration, what will happen to Apple FaceTime?
In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output as shown in the exhibit.
What should the administrator do next to troubleshoot the problem?
The exhibit shows a FortiGate configuration.
How does FortiGate handle web proxy traffic coming from the IP address 10.2.1.200, that requires authorization?
Given the security fabric topology shown in the exhibit, which two statements are true? (Choose two.)