A. In proxy-based inspection mode, files bigger than the buffer size are scanned.
B.
C.
D.
A. 192. 168.3.0/24
B. 192. 168.2.0/24
C. 192. 168. 1.0/24
D. 192. 168.0.0/8
A. SSH
B. HTTPS
C. FTM
D. FortiTelemetry
Which statement about video filtering on FortiGate is true?
A. Video filtering FortiGuard categories are based on web filter FortiGuard categories.
B. It does not require a separate FortiGuard license.
C. Full SSL inspection is not required.
D. its available only on a proxy-based firewall policy.
What are two functions of the ZTNA rule? (Choose two.)
A. It redirects the client request to the access proxy.
B. It applies security profiles to protect traffic.
C. It defines the access proxy.
D. It enforces access control.
A. Static IP Address
B. Dialup User
C. Dynamic DNS
D. Pre-shared Key
A. The firmware image must be manually uploaded to each FortiGate.
B. Only secondary FortiGate devices are rebooted.
C. Uninterruptable upgrade is enabled by default.
D. Traffic load balancing is temporally disabled while upgrading the firmware.
A. The tunnel is up while the client is connected.
B. It supports a limited number of protocols.
C. The external network application sends data through the VPN.
D. It assigns a virtual IP address to the client.
An administrator wants to simplify remote access without asking users to provide user credentials. Which access control method provides this solution?
A. ZTNA IP/MAC filtering mode
B. ZTNA access proxy
C. SSL VPN
D. L2TP
A. The Services field prevents SNAT and DNAT from being combined in the same policy.
B. The Services field is used when you need to bundle several VIPs into VIP groups.
C. The Services field removes the requirement to create multiple VIPs for different services.
D. The Services field prevents multiple sources of traffic from using multiple services to connect to a single computer.
An organization requires remote users to send external application data running on their PCs and access FTP resources through an SSL/TLS connection.
A. SSL VPN bookmark
B. SSL VPN tunnel
C. Zero trust network access
D. SSL VPN quick connection
Which statement correctly describes the use of reliable logging on FortiGate?
A. Reliable logging is enabled by default in all configuration scenarios.
B. Reliable logging is required to encrypt the transmission of logs.
C. Reliable logging can be configured only using the CLI.
D. Reliable logging prevents the loss of logs when the local disk is full.
Page 4 out of 14 Pages |
Previous |