Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Fortinet FCP_FWB_AD-7.4 Dumps Questions Answers

FCP - FortiWeb 7.4 Administrator Questions and Answers

Question 1

Which command will enable debugging for the FortiWeb user tracking feature?

Options:

A.

debug enable user-tracking7

B.

diagnose debug application user-cracking 7

C.

debug application user-cracking 7

D.

diagnose debug enable user-cracking 7

Buy Now
Question 2

Refer to the exhibits.

What will happen when a client attempts a mousedown cross-site scripting (XSS) attack against the site and FortiWeb is enforcing the highlighted signature?

Options:

A.

The connection will be stripped of the mousedown JavaScript code.

B.

The connection will be blocked as an XSS attack.

C.

FortiWeb will report the new mousedown attack to FortiGuard.

D.

The connection will be allowed.

Question 3

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers.

When an attack occurs, FortiWeb blocks traffic based on the192.0.2.1source IP address, which belongs to FortiADC. This setup is breaking all connectivity and genuine clients are not able to access the servers.

What can the administrator do to avoid this problem? (Choose two.)

Options:

A.

Enable and configure the Preserve Client IP setting on the client.

B.

No special configuration is required; connectivity will be re-established for all clients after the set timeout.

C.

Place FortiWeb in front of FortiADC.

D.

Enable and configure the Use X-Forwarded-For setting on FortiWeb.

Question 4

A customer wants to be able to index your websites for search and advertisement purposes.

What is the easiest way to allow this on a FortiWeb?

Options:

A.

Add the indexer IP address to the trusted IP list on the FortiWeb.

B.

Add the indexer IP address tothe FortiGuard "Known Search Engines" category.

C.

Create a firewall rule to bypass the FortiWeb entirely for the indexer IP address.

D.

Do not allow any external sites to index your websites.

Question 5

Which Layer 7 routing method does FortiWeb support?

Options:

A.

URL policy routing

B.

OSPF

C.

BGP

D.

HTTPcontent routing

Question 6

Refer to the exhibit.

A FortiWeb device is deployed upstream of a device performing source network address translation (SNAT) or load balancing.

What configuration must you perform on FortiWeb to preserve the original IP address of the client?

Options:

A.

Enable and configure the Preserve Client IP setting.

B.

Use a transparent operatingmode on FortiWeb.

C.

Enable and configure the Add X-Forwarded-For setting.

D.

Turn off NAT on the FortiWeb.

Question 7

What is the difference between an API gateway protection schema and a machine learning (ML) API protection schema?

Options:

A.

An API gateway protection schema does not allow authentication.

B.

An API gateway protection schema handles response bodies.

C.

An API gateway protection schema supports data types other than string.

D.

An API gateway protection schema cannot change without administrator intervention.

Question 8

In SAML deployments, which server contains user authentication credentials (username/password)?

Options:

A.

Identity provider

B.

Service provider

C.

User database

D.

Authentication client

Question 9

When is it possible to use a self-signed certificate, rather than one purchased from a commercial certificate authority?

Options:

A.

If you are an enterprise whose employees use only mobile devices

B.

If you are a small business or home office

C.

If you are an enterprise whose computers all trust the active directory or CA server that signed the certificate

D.

If you are an enterprise whose resources do not need security or https connections

Question 10

Refer to the exhibit.

What can you conclude from this support vector machine (SVM) plot of a potential bot connection?

Options:

A.

The connection is normal and within the expected averages.

B.

The connection uses too much bandwidth.

C.

The connection uses an excessive amount of TCP connections, but is harmless.

D.

The connection is possibly a bot.