<< Prev Question Next Question >>

Question 5/24

Refer to the exhibits.



The exhibits show a diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device.
Two PCs, PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.
Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (24q)
Question 1: Which three strategies are valid SD-WAN rule strategies for ...
Question 2: When FortiGate performs SSL/SSH full inspection, you can dec...
Question 3: The HTTP inspection process in web filtering follows a speci...
Question 4: Which three methods are used by the collector agent for AD p...
Question 5: Refer to the exhibits. (Exhibit) The exhibits show a diagram...
Question 6: Which method allows management access to the FortiGate CLI w...
Question 7: Refer to the exhibit. (Exhibit) The exhibit shows the FortiG...
Question 8: Which two features of IPsec IKEv1 authentication are support...
Question 9: Refer to the exhibits. (Exhibit) The exhibits show the appli...
Question 10: Refer to the exhibit. (Exhibit) Which statement about this f...
Question 11: Refer to the exhibit showing a FortiGuard connection debug o...
Question 12: Which two statements about equal-cost multi-path (ECMP) conf...
Question 13: What are two features of collector agent advanced mode? (Cho...
Question 14: An administrator configured a FortiGate to act as a collecto...
Question 15: Refer to the exhibits. (Exhibit) The exhibits show a diagram...
Question 16: Which two statements are true regarding FortiGate HA configu...
Question 17: Refer to the exhibits, which show the firewall policy and an...
Question 18: An administrator configures FortiGuard servers as DNS server...
Question 19: A network administrator is configuring an IPsec VPN tunnel f...
Question 20: A network administrator has configured an SSL/SSH inspection...
Question 21: Which three strategies are valid SD-WAN rule strategies for ...
Question 22: Which two features of IPsec IKEv1 authentication are support...
Question 23: Which two statements describe how the RPF check is used? (Ch...
Question 24: What is the primary FortiGate election process when the HA o...