A. 192. 168. 1.0/24
B. 192. 168.0.0/24
C. 192. 168.2.0/24
D. 192. 168.3.0/24
A. Web filter in flow-based inspection
B. Antivirus in flow-based inspection
C. DNS filter
D. Web application firewall
E. Application control
A. auth-on-demand
B. soft-timeout
C. idle-timeout
D. new-session
E. hard-timeout
A.
B. Enable Dead Peer Detection.
C. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.
D. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.
Which statement describes a characteristic of automation stitches?
A. They can have one or more triggers.
B. They can be run only on devices in the Security Fabric.
C. They can run multiple actions simultaneously.
D. They can be created on any device in the fabric.
A. VLAN interface
B. Software Switch interface
C. Aggregate interface
D. Redundant interface
A. Antivirus in flow-based inspection
B. Web filter in flow-based inspection
C. Application control
D. DNS filter
E. Web application firewall
Which timeout setting can be responsible for deleting SSL VPN associated sessions?
A. SSL VPN idle-timeout
B. SSL VPN http-request-body-timeout
C. SSL VPN login-timeout
D. SSL VPN dtls-hello-timeout
A. Fabric Connectors
B. Automation Stitches
C. Security Rating
D. Logical Topology
Reference: https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/286973/fortinetsecurity-fabric
A. System event logs
B. Forward traffic logs
C. Local traffic logs
D. Security logs
A. IP address
B. Once Internet Service is selected, no other object can be added
C. User or User Group
D. FQDN address
Which three statements explain a flow-based antivirus profile? (Choose three.)
A. Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.
B. If a virus is detected, the last packet is delivered to the client.
C. The IPS engine handles the process as a standalone.
D. FortiGate buffers the whole file but transmits to the client at the same time.
E. Flow-based inspection optimizes performance compared to proxy-based inspection.
Page 3 out of 14 Pages |
Previous |