<< Prev Question Next Question >>

Question 34/50

FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy.
Which two other security profiles can you apply to the security policy? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (50q)
Question 1: Refer to the exhibits. (Exhibit) Exhibit A shows system perf...
Question 2: Which two policies must be configured to allow traffic on a ...
Question 3: Which three options are the remote log storage options you c...
Question 4: An administrator observes that the port1 interface cannot be...
Question 5: Which two statements are correct about SLA targets? (Choose ...
Question 6: Which of the following are purposes of NAT traversal in IPse...
Question 7: Which two statements are true when FortiGate is in transpare...
Question 8: Refer to the exhibit. (Exhibit) Review the Intrusion Prevent...
Question 9: Refer to the exhibit showing a debug flow output. (Exhibit) ...
Question 10: Which two attributes are required on a certificate so it can...
Question 11: Which two protocols are used to enable administrator access ...
1 commentQuestion 12: Which CLI command will display sessions both from client to ...
Question 13: Which two VDOMs are the default VDOMs created when FortiGate...
Question 14: Refer to the exhibits. (Exhibit) The SSL VPN connection fail...
Question 15: Which CLI command allows administrators to troubleshoot Laye...
Question 16: An administrator has configured a route-based IPsec VPN betw...
Question 17: Examine this PAC file configuration. (Exhibit) Which of the ...
Question 18: The HTTP inspection process in web filtering follows a speci...
Question 19: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 20: Which two settings can be separately configured per VDOM on ...
Question 21: An administrator is running the following sniffer command: (...
Question 22: An administrator has configured the following settings: (Exh...
Question 23: If the Services field is configured in a Virtual IP (VIP), w...
Question 24: Which security feature does FortiGate provide to protect ser...
1 commentQuestion 25: How do you format the FortiGate flash disk?...
1 commentQuestion 26: Refer to the web filter raw logs. (Exhibit) Based on the raw...
1 commentQuestion 27: What is the limitation of using a URL list and application c...
1 commentQuestion 28: Refer to the exhibit, which contains a session diagnostic ou...
Question 29: Which of the following conditions must be met in order for a...
Question 30: How does FortiGate act when using SSL VPN in web mode?...
Question 31: An administrator is configuring an Ipsec between site A and ...
Question 32: Which of the following statements about backing up logs from...
Question 33: You have enabled logging on your FortiGate device for Event ...
Question 34: FortiGate is configured as a policy-based next-generation fi...
1 commentQuestion 35: Refer to the exhibit. (Exhibit) The Root and To_Internet VDO...
Question 36: A network administrator wants to set up redundant IPsec VPN ...
Question 37: A network administrator has enabled full SSL inspection and ...
1 commentQuestion 38: Which two types of traffic are managed only by the managemen...
Question 39: Which certificate value can FortiGate use to determine the r...
Question 40: An administrator Is configuring an IPsec VPN between site A ...
Question 41: An administrator needs to configure VPN user access for mult...
Question 42: Refer to the exhibit. (Exhibit) Which contains a session lis...
Question 43: A network administrator is configuring a new IPsec VPN tunne...
2 commentQuestion 44: Which statements about the firmware upgrade process on an ac...
Question 45: Refer to the exhibits. (Exhibit) The exhibits show the SSL a...
Question 46: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
1 commentQuestion 47: Examine the following web filtering log. (Exhibit) Which sta...
Question 48: What devices form the core of the security fabric?...
1 commentQuestion 49: Refer to the exhibit. (Exhibit) Given the security fabric to...
Question 50: Refer to the exhibit. (Exhibit) Which contains a Performance...