<< Prev Question Next Question >>

Question 2/24

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.
Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate?
(Choose three.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (24q)
Question 1: Which three strategies are valid SD-WAN rule strategies for ...
Question 2: When FortiGate performs SSL/SSH full inspection, you can dec...
Question 3: The HTTP inspection process in web filtering follows a speci...
Question 4: Which three methods are used by the collector agent for AD p...
Question 5: Refer to the exhibits. (Exhibit) The exhibits show a diagram...
Question 6: Which method allows management access to the FortiGate CLI w...
Question 7: Refer to the exhibit. (Exhibit) The exhibit shows the FortiG...
Question 8: Which two features of IPsec IKEv1 authentication are support...
Question 9: Refer to the exhibits. (Exhibit) The exhibits show the appli...
Question 10: Refer to the exhibit. (Exhibit) Which statement about this f...
Question 11: Refer to the exhibit showing a FortiGuard connection debug o...
Question 12: Which two statements about equal-cost multi-path (ECMP) conf...
Question 13: What are two features of collector agent advanced mode? (Cho...
Question 14: An administrator configured a FortiGate to act as a collecto...
Question 15: Refer to the exhibits. (Exhibit) The exhibits show a diagram...
Question 16: Which two statements are true regarding FortiGate HA configu...
Question 17: Refer to the exhibits, which show the firewall policy and an...
Question 18: An administrator configures FortiGuard servers as DNS server...
Question 19: A network administrator is configuring an IPsec VPN tunnel f...
Question 20: A network administrator has configured an SSL/SSH inspection...
Question 21: Which three strategies are valid SD-WAN rule strategies for ...
Question 22: Which two features of IPsec IKEv1 authentication are support...
Question 23: Which two statements describe how the RPF check is used? (Ch...
Question 24: What is the primary FortiGate election process when the HA o...