<< Prev Question Next Question >>

Question 33/50

FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy.
Which two other security profiles can you apply to the security policy? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (50q)
Question 1: Examine the IPS sensor configuration shown in the exhibit, a...
Question 2: Which two configuration settings are synchronized when Forti...
Question 3: Which two policies must be configured to allow traffic on a ...
Question 4: Refer to the exhibit showing a debug flow output. (Exhibit) ...
Question 5: View the exhibit. (Exhibit) A user behind the FortiGate is t...
Question 6: Which two actions can you perform only from the root FortiGa...
Question 7: Examine the two static routes shown in the exhibit, then ans...
Question 8: Which statements about the firmware upgrade process on an ac...
Question 9: Which two attributes are required on a certificate so it can...
Question 10: An administrator observes that the port1 interface cannot be...
Question 11: Which type of logs on FortiGate record information about tra...
Question 12: Refer to the exhibit. (Exhibit) Based on the raw log, which ...
Question 13: An administrator has configured the following settings: (Exh...
Question 14: Which statements best describe auto discovery VPN (ADVPN). (...
Question 15: An administrator needs to increase network bandwidth and pro...
Question 16: Refer to the web filter raw logs. (Exhibit) Based on the raw...
Question 17: An administrator has configured outgoing Interface any in a ...
Question 18: Which of the following are valid actions for FortiGuard cate...
Question 19: If the Services field is configured in a Virtual IP (VIP), w...
Question 20: Refer to the exhibits. (Exhibit) The exhibits show the SSL a...
Question 21: View the exhibit. (Exhibit) Which of the following statement...
1 commentQuestion 22: How do you format the FortiGate flash disk?...
Question 23: Which two VDOMs are the default VDOMs created when FortiGate...
Question 24: What is the primary FortiGate election process when the HA o...
Question 25: Which of the following statements correctly describes FortiG...
Question 26: Refer to the exhibit to view the firewall policy. (Exhibit) ...
Question 27: Which three criteria can a FortiGate use to look for a match...
Question 28: Refer to the exhibit to view the application control profile...
Question 29: Which security feature does FortiGate provide to protect ser...
Question 30: Refer to the exhibits. (Exhibit) The SSL VPN connection fail...
Question 31: An organization's employee needs to connect to the office th...
Question 32: Which three statements are true regarding session-based auth...
Question 33: FortiGate is configured as a policy-based next-generation fi...
Question 34: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 35: Examine the exhibit, which contains a virtual IP and firewal...
Question 36: Why does FortiGate keep TCP sessions in the session table fo...
Question 37: Examine the IPS sensor and DoS policy configuration shown in...
Question 38: View the exhibit: (Exhibit) Which the FortiGate handle web p...
Question 39: Which of the following statements about backing up logs from...
Question 40: What is the limitation of using a URL list and application c...
Question 41: Which of the following are purposes of NAT traversal in IPse...
Question 42: An administrator is running the following sniffer command: (...
Question 43: When a firewall policy is created, which attribute is added ...
Question 44: Refer to the exhibit. (Exhibit) Which contains a Performance...
Question 45: Refer to the exhibit. (Exhibit) In the network shown in the ...
Question 46: Which Security rating scorecard helps identify configuration...
Question 47: A network administrator wants to set up redundant IPsec VPN ...
Question 48: Which two statements are true about collector agent standard...
Question 49: Which two protocols are used to enable administrator access ...
Question 50: Refer to the exhibit. (Exhibit) A network administrator is t...