<< Prev Question Next Question >>

Question 24/98

An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel.
Which DPD mode on FortiGate will meet the above requirement?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (98q)
Question 1: Which two configuration settings are global settings? (Choos...
Question 2: Which two statements describe how the RPF check is used? (Ch...
Question 3: An administrator has configured the following settings: conf...
Question 4: Which two statements are true about collector agent advanced...
Question 5: Why does FortiGate keep TCP sessions in the session table fo...
Question 6: Refer to the exhibit. (Exhibit) Which statement about this f...
Question 7: Refer to the exhibit, which contains a radius server configu...
Question 8: View the exhibit. A user at 192.168.32.15 is trying to acces...
Question 9: Refer to the exhibit. (Exhibit) The global settings on a For...
Question 10: Refer to the exhibit, which contains a session list output. ...
Question 11: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 12: Refer to the exhibit. (Exhibit) An administrator is running ...
Question 13: Which of the following SD-WAN load -balancing method use int...
Question 14: Refer to the exhibit. (Exhibit) The exhibit shows a diagram ...
Question 15: Which two policies must be configured to allow traffic on a ...
Question 16: Which two statements about IPsec authentication on FortiGate...
Question 17: FortiGate is integrated with FortiAnalyzer and FortiManager....
Question 18: Refer to the exhibit to view the authentication rule configu...
Question 19: An administrator wants to monitor their network for any prob...
Question 20: Which two statements about advanced AD access mode for the F...
Question 21: Which two types of traffic are managed only by the managemen...
Question 22: Refer to the exhibits. (Exhibit) The exhibits show the appli...
Question 23: Refer to the exhibit. (Exhibit) The exhibit shows theFortiGu...
Question 24: An administrator wants to configure Dead Peer Detection (DPD...
Question 25: Refer to the exhibit, which shows an SD-WAN zone configurati...
Question 26: An administrator has configured central DNAT and virtual IPs...
Question 27: Refer to the exhibit. (Exhibit) Review the intrusion prevent...
Question 28: Refer to the web filter raw logs. (Exhibit) Based on the raw...
Question 29: When FortiGate performs SSL/SSH full inspection, you can dec...
Question 30: How do you format the FortiGate flash disk?...
Question 31: What is the effect of enabling auto-negotiate on the phase 2...
Question 32: Which two statements are true about the RPF check? (Choose t...
Question 33: Which three methods are used by the collector agent for AD p...
Question 34: Which two statements correctly describe the differences betw...
Question 35: Which are two benefits of using SD-WAN? (Choose two.)...
Question 36: What types of traffic and attacks can be blocked by a web ap...
Question 37: Refer to the FortiGuard connection debug output. (Exhibit) B...
Question 38: Refer to the exhibits. (Exhibit) The exhibits show a diagram...
Question 39: Refer to the exhibit. (Exhibit) The exhibit shows a FortiGat...
Question 40: View the exhibit. date=2022-06-14 time=14:45:16 logid=031701...
Question 41: FortiGuard categories can be overridden and defined in diffe...
Question 42: Refer to the exhibit. (Exhibit) Why did FortiGate drop the p...
Question 43: Which two features of IPsec IKEv1 authentication are support...
Question 44: Which CLI command allows administrators to troubleshoot Laye...
Question 45: An administrator wants to configure timeouts for users. Rega...
Question 46: Refer to the exhibit. (Exhibit) Which contains a network dia...
Question 47: What are two features of the NGFW profile-based mode? (Choos...
Question 48: An administrator must disable RPF check to investigate an is...
Question 49: Which of the following statements correctly describes FortiG...
Question 50: Which three settings and protocols can be used to provide se...
Question 51: Refer to the exhibits, which show the system performance out...
Question 52: Which security feature does FortiGate provide to protect ser...
Question 53: Refer to the exhibit. (Exhibit) In the network shown in the ...
Question 54: Refer to the exhibit. (Exhibit) Based on the ZTNA tag, the s...
Question 55: Examine the output from a debug flow: (Exhibit) Why did the ...
Question 56: An administrator needs to configure VPN user access for mult...
Question 57: Which scanning technique on FortiGate can be enabled only on...
Question 58: Which of the following statements is true regarding SSL VPN ...
Question 59: Which two protocols are used to enable administrator access ...
Question 60: On FortiGate, which type of logs record information about tr...
Question 61: The HTTP inspection process in web filtering follows a speci...
Question 62: Which two settings are required for SSL VPN to function betw...
Question 63: Which two statements about the application control profile m...
Question 64: An administrator needs to create a tunnel mode SSL-VPN to ac...
Question 65: Which two statements are true when FortiGate is in transpare...
Question 66: An administrator is configuring an Ipsec between site A and ...
Question 67: Which two statements are true regarding FortiGate HA configu...
Question 68: Which two statements about antivirus scanning in a firewall ...
Question 69: Which two settings must you configure when FortiGate is bein...
Question 70: Which Security rating scorecard helps identify configuration...
Question 71: Which of statement is true about SSL VPN web mode?...
Question 72: Which of the following are purposes of NAT traversal in IPse...
Question 73: If the Issuer and Subject values are the same in a digital c...
Question 74: A network administrator is configuring an IPsec VPN tunnel f...
Question 75: Refer to the exhibits. Exhibit A. (Exhibit) Exhibit B. (Exhi...
Question 76: Which NAT method translates the source IP address in a packe...
Question 77: When browsing to an internal web server using a web-mode SSL...
Question 78: Refer to the exhibit. (Exhibit) A network administrator is t...
Question 79: Which of the following statements about backing up logs from...
Question 80: FortiGate is operating in NAT mode and is configured with tw...
Question 81: Refer to the exhibit. (Exhibit) FortiGate is configured for ...
Question 82: Which two settings can be separately configured per VDOM on ...
Question 83: The HTTP inspection process in web filtering follows a speci...
Question 84: Refer to the exhibit. (Exhibit) The exhibit shows proxy poli...
Question 85: Which statement about video filtering on FortiGate is true?...
Question 86: Which two statements are correct regarding FortiGate FSSO ag...
Question 87: Which three statements are true regarding session-based auth...
Question 88: Refer to the exhibits. (Exhibit) The exhibits show the firew...
Question 89: If the Services field is configured in a Virtual IP (VIP), w...
Question 90: What is eXtended Authentication (XAuth)?...
Question 91: Which two statements are correct about SLA targets? (Choose ...
Question 92: An administrator wants to block https://www.example.com/vide...
Question 93: Refer to the exhibit. (Exhibit) Which two statements are tru...
Question 94: Refer to the exhibit. (Exhibit) Review the Intrusion Prevent...
Question 95: Which downstream FortiGate VDOM is used to join the Security...
Question 96: Which statements best describe auto discovery VPN (ADVPN). (...
Question 97: An administrator has configured outgoing interface any in a ...
Question 98: Refer to the exhibit. (Exhibit) The Root and To_Internet VDO...