<< Prev Question Next Question >>

Question 104/180

Two FortiGate units with NP6 processors form an active-active cluster. The cluster is doing security profile (UTM) inspection over all the user traffic. What statements are true regarding the sessions that the master unit is offloading to the slave unit for inspection? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (180q)
Question 1: Which of the following statements correctly describes how a ...
Question 2: Which IPsec mode includes the peer id information in the fir...
Question 3: Review the IPsec phase 1 configuration in the exhibit; then ...
Question 4: Examine the following spanning tree configuration on a Forti...
Question 5: You are the administrator in charge of a FortiGate acting as...
Question 6: Which of the following logging options are supported on a Fo...
Question 7: Which of the following items does NOT support the Logging fe...
Question 8: Examine the exhibit; then answer the question below. (Exhibi...
Question 9: Which antivirus and attack definition update options are sup...
Question 10: An administrator has configured a FortiGate unit so that end...
Question 11: Examine the firewall configuration shown below; then answer ...
Question 12: Which of the following spam filtering methods are supported ...
Question 13: When the SSL proxy is NOT doing man-in-the-middle intercepti...
Question 14: An administrator has configured a route-based site-to-site I...
Question 15: Which one of the following statements is correct about raw l...
Question 16: Which protocol can an Internet browser use to download the P...
Question 17: In HA, the option Reserve Management Port for Cluster Member...
Question 18: Examine the exhibit shown below; then answer the question fo...
Question 19: Which statements are correct properties of a partial mesh VP...
Question 20: Which of the following are valid authentication user group t...
Question 21: What capabilities can a FortiGate provide? (Choose three.)...
Question 22: Which statement regarding the firewall policy authentication...
Question 23: Which of the following statements regarding the firewall pol...
Question 24: A FortiGate unit is configured to receive push updates from ...
Question 25: Two devices are in an HA cluster, the device hostnames are S...
Question 26: How is traffic routed onto an SSL VPN tunnel from the FortiG...
Question 27: Which of the following statements are correct concerning the...
Question 28: Which type of conserve mode writes a log message immediately...
Question 29: You are the administrator in charge of a FortiGate unit whic...
Question 30: Which statement concerning IPS is false?...
Question 31: You wish to create a firewall policy that applies only to tr...
Question 32: Which of the following is true regarding Switch Port Mode?...
Question 33: Which of the following is an advantage of using SNMP v3 inst...
Question 34: What information is synchronized between two FortiGate units...
Question 35: Which of the following options can you use to update the vir...
Question 36: The FortiGate unit's GUI provides a link to update the firmw...
Question 37: What configuration objects are automatically added when usin...
Question 38: How many packets are interchanged between both IPSec ends du...
Question 39: The default administrator profile that is assigned to the de...
Question 40: The command structure of the FortiGate CLI consists of comma...
Question 41: Which of the following statements are correct about the HA c...
Question 42: Which of the following items is NOT a packet characteristic ...
Question 43: A FortiAnalyzer device could use which security method to se...
Question 44: Which of the following statements best describes the proxy b...
Question 45: In an IPSec gateway-to-gateway configuration, two FortiGate ...
Question 46: Which statement describes what the CLI command diagnose debu...
Question 47: In which process states is it impossible to interrupt/kill a...
Question 48: Regarding the use of web-only mode SSL VPN, which statement ...
Question 49: Which is the following statement are true regarding applicat...
Question 50: Which IP packets can be hardware-accelerated by a NP6 proces...
Question 51: The exhibit shows the Disconnect Cluster Member command in a...
Question 52: How can DLP file filters be configured to detect Office 2010...
Question 53: An end user logs into the full-access SSL VPN portal and sel...
Question 54: Bob wants to send Alice a file that is encrypted using publi...
Question 55: Which of the following are valid FortiGate device interface ...
Question 56: Each UTM feature has configurable UTM objects such as sensor...
Question 57: What functions can the IPv6 Neighbor Discovery protocol acco...
Question 58: Which of the following actions that can be taken by the Data...
Question 59: Which of the following statements are characteristics of a F...
Question 60: Which statement best describes what SSL.root is?...
Question 61: Which statement is correct regarding virus scanning on a For...
Question 62: Which IPsec configuration mode can be used for implementing ...
Question 63: Which of the following statements are correct concerning lay...
Question 64: Examine the following output from the diagnose sys session l...
Question 65: What logging options are supported on a FortiGate unit? (Cho...
Question 66: Which network protocols are supported for administrative acc...
Question 67: If a FortiGate unit has a dmz interface IP address of 210.19...
Question 68: Which of the following statements are true of the FortiGate ...
Question 69: When firewall policy authentication is enabled, only traffic...
Question 70: Which of the following statements are true regarding Local U...
Question 71: Which of the following items represent the minimum configura...
Question 72: When creating FortiGate administrative users, which configur...
Question 73: Identify the statement which correctly describes the output ...
Question 74: Which of the following are operating mode supported in Forti...
Question 75: Which statements are true regarding the factory default conf...
Question 76: You have configured the DHCP server on a FortiGate's port1 i...
Question 77: Which statement is an advantage of using a hub and spoke IPs...
Question 78: Review the IPsec diagnostics output of the command diagnose ...
Question 79: In order to match an identity-based policy, the FortiGate un...
Question 80: Examine the following CLI configuration: config system sessi...
Question 81: The FortiGate port1 is connected to the Internet. The FortiG...
Question 82: Which of the following pieces of information can be included...
Question 83: Which of the following sequences describes the correct order...
Question 84: A FortiGate is configured to receive push updates from the F...
Question 85: A FortiGate unit can act as which of the following? (Select ...
Question 86: Review the configuration for FortiClient IPsec shown in the ...
Question 87: The ordering of firewall policies is very important. Policie...
Question 88: In a FSSO agentless polling mode solution, where must the co...
Question 89: Which of the following statements are correct regarding logg...
Question 90: For data leak prevention, which statement describes the diff...
Question 91: The order of the firewall policies is important. Policies ca...
Question 92: Which authentication methods does FortiGate support for fire...
Question 93: A client can create a secure connection to a FortiGate devic...
Question 94: Review the static route configuration for IPsec shown in the...
Question 95: Which of the following statements is correct regarding a For...
Question 96: Which are two requirements for DC-agent mode FSSO to work pr...
Question 97: Which statements are true about offloading antivirus inspect...
Question 98: When firewall policy authentication is enabled, which protoc...
Question 99: In which order are firewall policies processed on the FortiG...
Question 100: Users may require access to a web site that is blocked by a ...
Question 101: Users may require access to a web site that is blocked by a ...
Question 102: When browsing to an internal web server using a web-mode SSL...
Question 103: Which is an advantage of using SNMP v3 instead of SNMP v1/v2...
Question 104: Two FortiGate units with NP6 processors form an active-activ...
Question 105: Which tasks fall under the responsibility of the SSL proxy i...
Question 106: Which action is taken by the FortiGate device when a file ma...
Question 107: An administrator wants to create an IPsec VPN tunnel between...
Question 108: What are the valid sub-types for a Firewall type policy? (Se...
Question 109: Which of the following methods can be used to access the CLI...
Question 110: In a high availability cluster operating in active-active mo...
Question 111: Which of the following email spam filtering features is NOT ...
Question 112: If you enable the option "Generate Logs when Session Starts"...
Question 113: In NAT/Route mode when there is no matching firewall policy ...
Question 114: Which of the following network protocols are supported for a...
Question 115: FSSO provides a single sign on solution to authenticate user...
Question 116: What methods can be used to deliver the token code to a user...
Question 117: For traffic that does match any configured firewall policy, ...
Question 118: The Idle Timeout setting on a FortiGate unit applies to whic...
Question 119: The command structure of the CLI on a FortiGate unit consist...
Question 120: Which of the following FSSO modes must be used for Novell eD...
Question 121: Which header field can be used in a firewall policy for traf...
Question 122: Which of the following antivirus and attack definition updat...
Question 123: Which firewall objects can be included in the Destination Ad...
Question 124: An administrator has formed a high availability cluster invo...
Question 125: When creating administrative users which of the following co...
Question 126: Review the IPS sensor filter configuration shown in the exhi...
Question 127: Which statements are correct for port pairing and forwarding...
Question 128: An issue could potentially occur when clicking Connect to st...
Question 129: Which of the following statements is correct regarding a For...
Question 130: Examine the network topology diagram in the exhibit; the wor...
Question 131: Which of the following network protocols can be inspected by...
Question 132: Which of the following authentication types are supported by...
Question 133: Which of the following statements are true regarding the web...
Question 134: Regarding the header and body sections in raw log messages, ...
Question 135: What is the maximum number of FortiAnalyzer/FortiManager dev...
Question 136: Which statements are true regarding local user authenticatio...
Question 137: Which two statements are true regarding firewall policy disc...
Question 138: How is the FortiGate password recovery process?...
Question 139: When backing up the configuration file on a FortiGate unit, ...
Question 140: What is IPsec Perfect Forwarding Secrecy (PFS)?...
Question 141: Two-factor authentication is supported using the following m...
Question 142: Which statements are true regarding IPv6 anycast addresses? ...
Question 143: What are the requirements for a HA cluster to maintain TCP c...
Question 144: A firewall policy has been configured such that traffic logg...
Question 145: Which antivirus inspection mode must be used to scan SMTP, F...
Question 146: In which order are firewall policies processed on a FortiGat...
Question 147: Which is one of the conditions that must be met for offloadi...
Question 148: Which is NOT true about the settings for an IP pool type por...
Question 149: Which of the following methods can be used to access the CLI...
Question 150: Which of the following products is designed to manage multip...
Question 151: Which of the following are valid components of the Fortinet ...
Question 152: The FortiGate unit can be configured to allow authentication...
Question 153: Which of the following Fortinet products can receive updates...
Question 154: Which statement is one disadvantage of using FSSO NetAPI pol...
Question 155: Examine at the output below from the diagnose sys top comman...
Question 156: In transparent mode, forward-domain is an CLI setting associ...
Question 157: Which of the following products provides dedicated hardware ...
Question 158: An administrator configures a FortiGate unit in Transparent ...
Question 159: Which email filter is NOT available on a FortiGate device?...
Question 160: Review the IKE debug output for IPsec shown in the exhibit b...
Question 161: Examine the following log message attributes and select two ...
Question 162: Which of the following IPsec configuration modes can be used...
Question 163: A client can establish a secure connection to a corporate ne...
Question 164: Under the System Information widget on the dashboard, which ...
Question 165: What are valid options for handling DNS requests sent direct...
Question 166: Two FortiGate devices fail to form an HA cluster, the device...
Question 167: A FortiGate AntiVirus profile can be configured to scan for ...
Question 168: A FortiGate unit can provide which of the following capabili...
Question 169: A firewall policy has been configured for the internal email...
Question 170: Examine the following log message for IPS and identify the v...
Question 171: Because changing the operational mode to Transparent resets ...
Question 172: The exhibit shows a part output of the diagnostic command 'd...
Question 173: Review the IPsec diagnostics output of the command diagnose ...
Question 174: What methods can be used to access the FortiGate CLI? (Choos...
Question 175: What is required in a FortiGate configuration to have more t...
Question 176: Which of the following components are contained in all Forti...
Question 177: Caching improves performance by reducing FortiGate unit requ...
Question 178: A FortiGate device is configured with two VDOMs. The managem...
Question 179: Which part of an email message exchange is NOT inspected by ...
Question 180: Which statements are correct regarding an IPv6 over IPv4 IPs...