<< Prev Question Next Question >>

Question 244/252

Examine the exhibit shown below; then answer the question following it.

Which of the following statements best describes the green status indicators that appear next to the different FortiGuard Distribution Network services as illustrated in the exhibit?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (252q)
Question 1: Which of the following are valid FortiGate device interface ...
Question 2: Which of the following fields contained in the IP/TCP/UDP he...
Question 3: Which of the following settings can be configured per VDOM? ...
Question 4: You are the administrator in charge of a FortiGate acting as...
Question 5: What advantages are there in using a fully Meshed IPSec VPN ...
Question 6: Which best describe the mechanism of a TCP SYN flood?...
Question 7: Which of the following are valid components of the Fortinet ...
Question 8: An administrator sets up a new FTP server on TCP port 2121. ...
Question 9: Which of the following statements is true regarding the diff...
Question 10: Which antivirus inspection mode must be used to scan SMTP, F...
Question 11: If Open Shortest Path First (OSPF) has already been configur...
Question 12: Which IPsec mode includes the peer id information in the fir...
Question 13: Review the IPS sensor filter configuration shown in the exhi...
Question 14: How is the FortiGate password recovery process?...
Question 15: Which statements are true regarding local user authenticatio...
Question 16: Which of the following statements is correct regarding a For...
Question 17: When backing up the configuration file on a FortiGate unit, ...
Question 18: When viewing the Banned User monitor in Web Config, the admi...
Question 19: Which FSSO agents are required for a FSSO agent-based pollin...
Question 20: The FortiGate unit's GUI provides a link to update the firmw...
Question 21: Review the IPsec phase 1 configuration in the exhibit; then ...
Question 22: Encrypted backup files provide which of the following benefi...
Question 23: Which operating system vulnerability can you protect when se...
Question 24: Which of the following statements are true regarding DLP Fil...
Question 25: Which of the following describes the best custom signature f...
Question 26: Which of the following items does NOT support the Logging fe...
Question 27: What methods can be used to access the FortiGate CLI? (Choos...
Question 28: Which are two requirements for DC-agent mode FSSO to work pr...
Question 29: Which Fortinet products &amp; features could be considered p...
Question 30: Which header field can be used in a firewall policy for traf...
Question 31: The eicar test virus is put into a zip archive, which is giv...
Question 32: Which protocols can you use for secure administrative access...
Question 33: Which of the following statements best describes the role of...
1 commentQuestion 34: Which correctly define "Section View" and "Global View" for ...
Question 35: Which of the following statements are correct regarding the ...
Question 36: An administrator configures a VPN and selects the Enable IPS...
Question 37: Which of the following pieces of information can be included...
Question 38: The default administrator profile that is assigned to the de...
Question 39: An administrator is configuring a DLP rule for FTP traffic. ...
Question 40: Which firewall objects can be included in the Destination Ad...
Question 41: When creating administrative users which of the following co...
Question 42: Which of the following statements are correct concerning the...
Question 43: Files reported as "suspicious" were subject to which Antivir...
Question 44: An end user logs into the full-access SSL VPN portal and sel...
Question 45: Which of the following items is NOT a packet characteristic ...
Question 46: Which is an advantage of using SNMP v3 instead of SNMP v1/v2...
Question 47: Which statement describes what the CLI command diagnose debu...
Question 48: Examine the Exhibits shown below, then answer the question t...
Question 49: In a high availability cluster operating in active-active mo...
Question 50: Which statements about virtual domains (VDOMs) are true? (Ch...
Question 51: Which of the following statements are correct regarding virt...
Question 52: Which of the following spam filtering methods are supported ...
Question 53: Which statements are true regarding IPv6 anycast addresses? ...
Question 54: Which of the following antivirus and attack definition updat...
Question 55: To which remote device can the FortiGate send logs? (Choose ...
Question 56: Identify the statement which correctly describes the output ...
Question 57: In an IPSec gateway-to-gateway configuration, two FortiGate ...
Question 58: What logging options are supported on a FortiGate unit? (Cho...
Question 59: An administrator configures a FortiGate unit in Transparent ...
Question 60: The following diagnostic output is displayed in the CLI: (Ex...
Question 61: When browsing to an internal web server using a web-mode SSL...
Question 62: Which is NOT true about source matching with firewall polici...
Question 63: The FortiGate unit can be configured to allow authentication...
Question 64: Which of the following features could be used by an administ...
Question 65: Which of the following are possible actions for static URL f...
Question 66: An organization wishes to protect its SIP Server from call f...
Question 67: When the SSL proxy is NOT doing man-in-the-middle intercepti...
Question 68: Which of the following statements correctly describes the de...
Question 69: What functions can the IPv6 Neighbor Discovery protocol acco...
Question 70: Which of the following report templates must be used when sc...
Question 71: A FortiGate unit is configured with three Virtual Domains (V...
Question 72: When configuring a server load balanced virtual IP, which of...
Question 73: Review the IKE debug output for IPsec shown in the exhibit b...
Question 74: An administrator wants to create an IPsec VPN tunnel between...
Question 75: In which order are firewall policies processed on the FortiG...
Question 76: Bob wants to send Alice a file that is encrypted using publi...
Question 77: Which of the following FSSO agents are required for a DC age...
Question 78: A FortiGate is configured with the 1.1.1.1/24 address on the...
Question 79: A FortiGate is configured to receive push updates from the F...
Question 80: Examine the following output from the diagnose sys session l...
Question 81: Two FortiGate units with NP6 processors form an active-activ...
Question 82: For data leak prevention, which statement describes the diff...
Question 83: Which traffic can match a firewall policy's "Services" setti...
Question 84: Which of the following statements are true of the FortiGate ...
Question 85: An administrator has configured a FortiGate unit so that end...
Question 86: A DLP rule with an action of Exempt has been matched against...
Question 87: Which email filter is NOT available on a FortiGate device?...
Question 88: WAN optimization is configured in Active/Passive mode. When ...
Question 89: The FortiGate port1 is connected to the Internet. The FortiG...
Question 90: Which of the following DLP actions will always be performed ...
Question 91: You are the administrator in charge of a FortiGate unit whic...
Question 92: A network administrator connects his PC to the INTERNAL inte...
Question 93: Which of the following products is designed to manage multip...
Question 94: Which one of the following statements is correct about raw l...
Question 95: Examine the following log message for IPS and identify the v...
Question 96: Which of the following statements is not correct regarding v...
Question 97: The diag sys session list command is executed in the CLI. Th...
Question 98: Which tasks fall under the responsibility of the SSL proxy i...
Question 99: For traffic that does match any configured firewall policy, ...
Question 100: Regarding the header and body sections in raw log messages, ...
Question 101: A FortiGate unit is configured to receive push updates from ...
Question 102: Which statement is one disadvantage of using FSSO NetAPI pol...
Question 103: A FortiGate unit is configured with multiple VDOMs. An admin...
Question 104: In which process states is it impossible to interrupt/kill a...
Question 105: In NAT/Route mode when there is no matching firewall policy ...
Question 106: What capabilities can a FortiGate provide? (Choose three.)...
Question 107: An administrator is examining the attack logs and notices th...
Question 108: Which answer best describes what an "Unknown Application" is...
Question 109: An administrator wishes to generate a report showing Top Tra...
Question 110: Which statement is correct regarding virus scanning on a For...
Question 111: Which of the following statements are true about Man-in-the-...
Question 112: Which of the following is an advantage of using SNMP v3 inst...
Question 113: A firewall policy has been configured for the internal email...
Question 114: An administrator is examining the attack logs and notices th...
Question 115: Acme Web Hosting is replacing one of their firewalls with a ...
Question 116: A FortiAnalyzer device could use which security method to se...
Question 117: Which is one of the conditions that must be met for offloadi...
Question 118: How is traffic routed onto an SSL VPN tunnel from the FortiG...
Question 119: The transfer of encrypted files or the use of encrypted prot...
Question 120: Two FortiGate devices fail to form an HA cluster, the device...
Question 121: Which IPsec configuration mode can be used for implementing ...
Question 122: FSSO provides a single sign on solution to authenticate user...
Question 123: Which of the following statements is correct regarding the N...
Question 124: Which of the following email spam filtering features is NOT ...
Question 125: A FortiGate administrator configures a Virtual Domain (VDOM)...
Question 126: Which of the following statements is correct regarding the F...
Question 127: Examine the firewall configuration shown below; then answer ...
Question 128: Which are outputs for the command `diagnose hardware devicei...
Question 129: A client can create a secure connection to a FortiGate devic...
Question 130: The order of the firewall policies is important. Policies ca...
Question 131: What are valid options for handling DNS requests sent direct...
Question 132: Which statements are correct properties of a partial mesh VP...
Question 133: Based on the web filtering configuration illustrated in the ...
Question 134: In which order are firewall policies processed on a FortiGat...
Question 135: Which statement best describes the objective of the SYN prox...
Question 136: When creating FortiGate administrative users, which configur...
Question 137: Which statements are true regarding the factory default conf...
Question 138: Which IP packets can be hardware-accelerated by a NP6 proces...
Question 139: Which of the following cannot be used in conjunction with th...
Question 140: In the Tunnel Mode widget of the web portal, the administrat...
Question 141: What are the valid sub-types for a Firewall type policy? (Se...
Question 142: When firewall policy authentication is enabled, which protoc...
Question 143: With FSSO, a domain user could authenticate either against t...
Question 144: Which of the following IPsec configuration modes can be used...
Question 145: Which profile could IPS engine use on an interface that is i...
Question 146: Which of the following Fortinet products can receive updates...
Question 147: A network administrator needs to implement dynamic route red...
Question 148: When firewall policy authentication is enabled, only traffic...
Question 149: Which of the following statements is correct based on the fi...
Question 150: What are required to be the same for two FortiGate units to ...
Question 151: In order to load-share traffic using multiple static routes,...
Question 152: In HA, the option Reserve Management Port for Cluster Member...
Question 153: What is IPsec Perfect Forwarding Secrecy (PFS)?...
Question 154: Which statement is correct concerning creating a custom sign...
Question 155: In order to match an identity-based policy, the FortiGate un...
Question 156: Which of the following statements is correct regarding the a...
Question 157: A FortiGate is configured to receive push updates from the F...
Question 158: Which is true of FortiGate's session table?...
Question 159: The Host Check feature can be enabled on the FortiGate unit ...
Question 160: Which is the following statement are true regarding applicat...
Question 161: Which of the following methods does the FortiGate unit use t...
Question 162: Which of the following methods can be used to access the CLI...
Question 163: Which of the following statements describe some of the diffe...
Question 164: Which of the following statements are TRUE for Port Pairing ...
Question 165: The ordering of firewall policies is very important. Policie...
Question 166: A network administrator connects his PC to the INTERNAL inte...
Question 167: In Transparent Mode, forward-domain is an attribute of _____...
Question 168: Which of the following statements is correct about how the F...
Question 169: A FortiClient fails to establish a VPN tunnel with a FortiGa...
Question 170: What methods can be used to deliver the token code to a user...
Question 171: A new version of FortiOS firmware has just been released. Wh...
Question 172: Which statements are correct regarding an IPv6 over IPv4 IPs...
Question 173: The exhibit shows the Disconnect Cluster Member command in a...
Question 174: Which of the following products provides dedicated hardware ...
Question 175: Examine the exhibit; then answer the question below. (Exhibi...
Question 176: What advantages are there in using a hub-and-spoke IPSec VPN...
Question 177: Users may require access to a web site that is blocked by a ...
Question 178: Which of the following statements is correct about configuri...
Question 179: Which of the following options best defines what Diffie-Hell...
Question 180: Which of the following is true regarding Switch Port Mode?...
Question 181: Which of the following statements are correct regarding logg...
Question 182: What protocol cannot be used with the active authentication ...
Question 183: A FortiGate device is configure to perform an AV &amp; IPS s...
Question 184: A FortiGate unit can provide which of the following capabili...
Question 185: Which of the following statements are correct regarding URL ...
Question 186: Which of the following authentication types are supported by...
Question 187: Which of the following DLP actions will override any other a...
Question 188: An issue could potentially occur when clicking Connect to st...
Question 189: In the debug command output shown in the exhibit, which of t...
Question 190: Which of the following statements are true regarding Local U...
Question 191: SSL Proxy is used to decrypt the SSL-encrypted traffic. Afte...
Question 192: Review the CLI configuration below for an IPS sensor and ide...
Question 193: The exhibit shows two static routes to the same destinations...
Question 194: Two devices are in an HA cluster, the device hostnames are S...
Question 195: You wish to create a firewall policy that applies only to tr...
Question 196: An administrator wishes to generate a report showing Top Tra...
Question 197: What advantages are there in using a hub-and-spoke IPSec VPN...
Question 198: An administrator has formed a high availability cluster invo...
Question 199: Review the IPsec diagnostics output of the command diagnose ...
Question 200: Users may require access to a web site that is blocked by a ...
Question 201: A firewall policy has been configured such that traffic logg...
Question 202: Your Linux email server runs on a non-standard port number, ...
Question 203: Examine the following spanning tree configuration on a Forti...
Question 204: Which two statements are true regarding firewall policy disc...
Question 205: The following ban list entry is displayed through the CLI. (...
Question 206: Which antivirus and attack definition update options are sup...
Question 207: Which best describes the authentication timeout?...
Question 208: What are the ways FortiGate can monitor logs? (Choose three....
Question 209: Which of the following statements are true about PKI users c...
Question 210: In which of the following report templates would you configu...
Question 211: FILL BLANK The___________ CLI command is used on the FortiGa...
Question 212: Which of the following statements regarding the firewall pol...
Question 213: Which of the following statements are true about the SSL Pro...
Question 214: Which of the following Session TTL values will take preceden...
Question 215: An administrator logs into a FortiGate unit using an account...
Question 216: An Internet browser is using the WPAD DNS method to discover...
Question 217: Which statement regarding the firewall policy authentication...
Question 218: Caching improves performance by reducing FortiGate unit requ...
Question 219: Which of the following options can you use to update the vir...
Question 220: Review the configuration for FortiClient IPsec shown in the ...
Question 221: There are eight (8) log severity levels that indicate the im...
Question 222: When the SSL proxy inspects the server certificate for Web F...
Question 223: In a High Availability configuration operating in Active-Act...
Question 224: Which statements are true about offloading antivirus inspect...
Question 225: Which network protocols are supported for administrative acc...
Question 226: An administrator has configured a route-based site-to-site I...
Question 227: A portion of the device listing for a FortiAnalyzer unit is ...
Question 228: How can DLP file filters be configured to detect Office 2010...
Question 229: Review the exhibit of an explicit proxy policy configuration...
Question 230: What are the advantages of FSSO DC mode over polling mode?...
Question 231: Examine the following CLI configuration: config system sessi...
Question 232: What is longest length of time allowed on a FortiGate device...
Question 233: A FortiGate unit can create a secure connection to a client ...
Question 234: Under the System Information widget on the dashboard, which ...
Question 235: Review to the network topology in the exhibit. The workstati...
Question 236: What are the requirements for a cluster to maintain TCP conn...
Question 237: If Routing Information Protocol (RIP) version 1 or version 2...
Question 238: What are examples of correct syntax for the session table di...
Question 239: An intermittent connectivity issue is noticed between two de...
Question 240: Two-factor authentication is supported using the following m...
Question 241: What is the maximum number of FortiAnalyzer/FortiManager dev...
Question 242: A client can establish a secure connection to a corporate ne...
Question 243: Both the FortiGate and FortiAnalyzer units can notify admini...
Question 244: Examine the exhibit shown below; then answer the question fo...
Question 245: Which of the following are valid authentication user group t...
Question 246: Which of the following logging options are supported on a Fo...
Question 247: Which statement best describes what the FortiGate hardware a...
Question 248: Which of the following network protocols are supported for a...
Question 249: Which of the following items are considered to be advantages...
Question 250: When performing a log search on a FortiAnalyzer, it is gener...
Question 251: A FortiGate AntiVirus profile can be configured to scan for ...
Question 252: Which of the following must be configured on a FortiGate uni...