<< Prev Question Next Question >>

Question 56/60

A company needs to provide SSL VPN access to two user groups. The company also needs to display different welcome messages on the SSL VPN login screen for both user groups.
What is required in the SSL VPN configuration to meet these requirements?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (60q)
Question 1: View the exhibit. (Exhibit) What is the effect of the Discon...
3 commentQuestion 2: View the exhibit. (Exhibit) The client cannot connect to the...
1 commentQuestion 3: Which statement about the FortiGuard services for the FortiG...
Question 4: An administrator has configured a route-based IPsec VPN betw...
Question 5: Which statement about the firewall policy authentication tim...
3 commentQuestion 6: View the example routing table. (Exhibit) Which route will b...
Question 7: An administrator wants to configure a FortiGate as a DNS ser...
Question 8: How can a browser trust a web-server certificate signed by a...
2 commentQuestion 9: Which statements about high availability (HA) for FortiGates...
3 commentQuestion 10: What FortiGate feature can be used to allow IPv6 clients to ...
1 commentQuestion 11: Which statements about One-to-One IP pool are true? (Choose ...
Question 12: Which statements about an IPv6-over-IPv4 IPsec configuration...
Question 13: Which statement about data leak prevention (DLP) on a FortiG...
1 commentQuestion 14: Examine the routing database. (Exhibit) Which of the followi...
Question 15: Examine this output from the diagnose sys top command: (Exhi...
Question 16: Examine the exhibit, which contains a virtual IP and a firew...
Question 17: If traffic matches a DLP filter with the action set to Quara...
Question 18: An administrator has enabled proxy-based antivirus scanning ...
Question 19: When using WPAD DNS method, what is the FQDN format that bro...
2 commentQuestion 20: How does FortiGate select the central SNAT policy that is ap...
1 commentQuestion 21: An administrator has configured two VLAN interfaces: (Exhibi...
Question 22: View the exhibit. (Exhibit) A user behind the FortiGate is t...
Question 23: What methods can be used to deliver the token code to a user...
1 commentQuestion 24: Which traffic inspection features can be executed by a secur...
Question 25: View the exhibit. (Exhibit) This is a sniffer output of a te...
1 commentQuestion 26: An administrator has created a custom IPS signature. Where d...
Question 27: An administrator observes that the port1 interface cannot be...
Question 28: Which statements about antivirus scanning using flow-based f...
Question 29: What is FortiGate's behavior when local disk logging is disa...
Question 30: Which statements correctly describe transparent mode operati...
1 commentQuestion 31: Which statements about DNS filter profiles are true? (Choose...
Question 32: Which statements about application control are true? (Choose...
Question 33: View the exhibit. (Exhibit) When Role is set to Undefined, w...
Question 34: Which of the following statements about NTLM authentication ...
1 commentQuestion 35: Which of the following statements about advanced AD access m...
Question 36: An administrator needs to inspect all web traffic (including...
1 commentQuestion 37: Which of the following Fortinet hardware accelerators can be...
Question 38: When browsing to an internal web server using a web-mode SSL...
Question 39: View the exhibit. (Exhibit) When a user attempts to connect ...
Question 40: What information is flushed when the chunk-size value is cha...
Question 41: Which statements best describe auto discovery VPN (ADVPN). (...
Question 42: What are the purposes of NAT traversal in IPsec? (Choose two...
2 commentQuestion 43: An administrator needs to offload logging to FortiAnalyzer f...
1 commentQuestion 44: View the exhibit. (Exhibit) Which statements about the exhib...
2 commentQuestion 45: An administrator is using the FortiGate built-in sniffer to ...
1 commentQuestion 46: Which of the following statements about central NAT are true...
2 commentQuestion 47: Under what circumstance would you enable LEARN as the Action...
1 commentQuestion 48: How does FortiGate verify the login credentials of a remote ...
Question 49: An administrator needs to be able to view logs for applicati...
Question 50: You are tasked to architect a new IPsec deployment with the ...
1 commentQuestion 51: Which statements about IP-based explicit proxy authenticatio...
1 commentQuestion 52: Which configuration objects can be selected for the Source f...
Question 53: Which of the following statements describe WMI polling mode ...
Question 54: View the exhibit. (Exhibit) Which of the following statement...
Question 55: What step is required an SSL VPN to access to an internal se...
Question 56: A company needs to provide SSL VPN access to two user groups...
1 commentQuestion 57: Which of the following settings and protocols can be used to...
1 commentQuestion 58: A FortiGate interface is configured with the following comma...
1 commentQuestion 59: Which statement is true regarding the policy ID numbers of f...
2 commentQuestion 60: What traffic and attacks can be blocked by a web application...