To complete the final step of a Security Fabric configuration, an administrator must authorize all the devices on
which device?
An administrator is running the following sniffer command:
Which three pieces of Information will be Included in me sniffer output? {Choose three.)
An administrator needs to increase network bandwidth and provide redundancy.
What interface type must the administrator select to bind multiple FortiGate interfaces?
Examine the IPS sensor configuration shown in the exhibit, and then answer the question below.
An administrator has configured the WINDOWS_SERVERS IPS sensor in an attempt to determine
whether the influx of HTTPS traffic is an attack attempt or not. After applying the IPS sensor, FortiGate is still not generating any IPS logs for the HTTPS traffic.
What is a possible reason for this?
Which three CLI commands can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.)
Which Security rating scorecard helps identify configuration weakness and best practice violations in your network?
NGFW mode allows policy-based configuration for most inspection rules. Which security profile’s configuration does not change when you enable policy-based inspection?
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
If the Services field is configured in a Virtual IP (VIP), which statement is true when central NAT is used?
In which two ways can RPF checking be disabled? (Choose two )
Which of statement is true about SSL VPN web mode?
How do you format the FortiGate flash disk?
What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)
Which statement about the policy ID number of a firewall policy is true?
Refer to the exhibits to view the firewall policy (Exhibit A) and the antivirus profile (Exhibit B).
Which statement is correct if a user is unable to receive a block replacement message when downloading an infected file for the first time?
Which three statements about a flow-based antivirus profile are correct? (Choose three.)
Refer to the web filter raw logs.
Based on the raw logs shown in the exhibit, which statement is correct?
FortiGuard categories can be overridden and defined in different categories. To create a web rating override for example.com home page, the override must be configured using a specific syntax.
Which two syntaxes are correct to configure web rating for the home page? (Choose two.)
Which two settings can be separately configured per VDOM on a FortiGate device? (Choose two.)
Which statement is correct regarding the inspection of some of the services available by web applications embedded in third-party websites?
Which two inspection modes can you use to configure a firewall policy on a profile-based next-generation firewall (NGFW)? (Choose two.)
How does FortiGate act when using SSL VPN in web mode?
Refer to the exhibit.
The exhibit shows the IPS sensor configuration.
If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)
Refer to the exhibit.
An administrator has configured a performance SLA on FortiGate, which failed to generate any traffic.
Why is FortiGate not sending probes to 4.2.2.2 and 4.2.2.1 servers? (Choose two.)
Refer to the exhibit.
Which contains a session list output. Based on the information shown in the exhibit, which statement is true?