Page 1 out of 12. Viewing questions 1-15 out of 172
Question 1
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
A.
It limits the scanning of application traffic to the DNS protocol only.
B.
It limits the scanning of application traffic to use parent signatures only.
C.
It limits the scanning of application traffic to the browser-based technology category only.
D.
It limits the scanning of application traffic to the application category only.
Answer:
C
User Votes:
A
50%
B 1 votes
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
If Internet Service is already selected as Destination in a firewall policy, which other configuration objects can be selected to the Destination field of a firewall policy? A User or User Group B. IP address C. No other object can be added D. FQDN address
In an explicit proxy setup, where is the authentication method and database configured?
A.
Proxy Policy
B.
Authentication Rule
C.
Firewall Policy
D.
Authentication scheme
Answer:
D
User Votes:
A
50%
B 2 votes
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?
A.
Root VDOM
B.
FG-traffic VDOM
C.
Customer VDOM
D.
Global VDOM
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Refer to the exhibit, which contains a radius server configuration.
An administrator added a configuration for a new RADIUS server. While configuring, the administrator selected the Include in every user group option. What will be the impact of using Include in every user group option in a RADIUS configuration?
A.
This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group.
B.
This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case, is FortiAuthenticator.
C.
This option places all users into every RADIUS user group, including groups that are used for the LDAP server on FortiGate.
D.
This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group.
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not Which configuration option is the most effective way to support this request?
A.
Implement a web filter category override for the specified website
B.
Implement a DNS filter for the specified website.
C.
Implement web filter quotas for the specified website
D.
Implement web filter authentication for the specified website.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
Which feature in the Security Fabric takes one or more actions based on event triggers?
An administrator has a requirement to keep an application session from timing out on port 80. What two changes can the administrator make to resolve the issue without affecting any existing services running through FortiGate? (Choose two.)
A.
Create a new firewall policy with the new HTTP service and place it above the existing HTTP policy.
B.
Create a new service object for HTTP service and set the session TTL to never
C.
Set the TTL value to never under config system-ttl
D.
Set the session TTL on the HTTP policy to maximum
Answer:
BC
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
In which two ways can RPF checking be disabled? (Choose two )
A.
Enable anti-replay in firewall policy.
B.
Disable the RPF check at the FortiGate interface level for the source check
C.
Enable asymmetric routing.
D.
Disable strict-arc-check under system settings.