<< Prev Question Next Question >>

Question 19/39

Which configuration objects can be selected for the Source field of a firewall policy? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (39q)
Question 1: To complete the final step of a Security Fabric configuratio...
Question 2: Refer to the exhibit. (Exhibit) The exhibit shows a CLI outp...
Question 3: Which of the following statements about central NAT are true...
Question 4: Refer to the exhibits to view the firewall policy (Exhibit A...
Question 5: Which of the following services can be inspected by the DLP ...
Question 6: Refer to the exhibit. (Exhibit) The exhibit contains the con...
Question 7: Refer to the exhibits. (Exhibit) The exhibits show the SSL a...
Question 8: An administrator has configured a route-based IPsec VPN betw...
Question 9: If the Servicesfield is configured in a Virtual IP (VIP), wh...
Question 10: What information is flushed when the chunk-size value is cha...
Question 11: Which statements about the firmware upgrade process on an ac...
Question 12: Refer to the exhibit showing a debug flow output. (Exhibit) ...
Question 13: Which statement regarding the firewall policy authentication...
Question 14: Which three statements about security associations (SA) in I...
Question 15: Refer to the exhibit. Based on the administrator profile set...
Question 16: Refer to the exhibit. (Exhibit) Which contains a Performance...
Question 17: Refer to the exhibit. (Exhibit) Review the Intrusion Prevent...
Question 18: Which two attributes are required on a certificate so it can...
Question 19: Which configuration objects can be selected for the Source f...
Question 20: Which of the following SD-WAN load balancing method use inte...
Question 21: An administrator Is configuring an IPsec VPN between site A ...
Question 22: An administrator has configured a strict RPF check on FortiG...
Question 23: An administrator has configured the following settings: (Exh...
Question 24: How do you format the FortiGate flash disk?...
Question 25: Examine the exhibit, which contains a virtual IP and firewal...
Question 26: Which three authentication timeout types are availability fo...
Question 27: Which three statements about a flow-based antivirus profile ...
Question 28: Which two statements are correct regarding FortiGate FSSO ag...
Question 29: View the exhibit. Which the FortiGate handle web proxy traff...
Question 30: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 31: Examine the following web filtering log. (Exhibit) Which sta...
Question 32: Which of the following statements are best practices for tro...
Question 33: Refer to the exhibit. (Exhibit) The Root and To_Internet VDO...
Question 34: A network administrator is configuring a new IPsec VPN tunne...
Question 35: Refer to the exhibit. (Exhibit) The global settings on a For...
Question 36: Examine the IPS sensor and DoS policy configuration shown in...
Question 37: Which two protocol options are available on the CLI but not ...
Question 38: Which statements about antivirus scanning mode are true? (Ch...
Question 39: Examine this FortiGate configuration: (Exhibit) Examine the ...