<< Prev Question Next Question >>

Question 45/61

An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel.
Which DPD mode on FortiGate will meet the above requirement?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (61q)
Question 1: Which two policies must be configured to allow traffic on a ...
1 commentQuestion 2: Refer to the exhibit. (Exhibit) The exhibit shows the IPS se...
Question 3: Which statements about the firmware upgrade process on an ac...
Question 4: An administrator needs to configure VPN user access for mult...
Question 5: Which of the following are valid actions for FortiGuard cate...
Question 6: Which two statements are true about collector agent advanced...
Question 7: A team manager has decided that, while some members of the t...
Question 8: Which statement regarding the firewall policy authentication...
2 commentQuestion 9: FortiGate is configured as a policy-based next-generation fi...
Question 10: Refer to the exhibit. (Exhibit) A network administrator is t...
Question 11: FortiGuard categories can be overridden and defined in diffe...
1 commentQuestion 12: Refer to the exhibit, which contains a session diagnostic ou...
Question 13: Which three authentication timeout types are availability fo...
2 commentQuestion 14: Which statements are true regarding firewall policy NAT usin...
Question 15: In an explicit proxy setup, where is the authentication meth...
Question 16: Which three CLI commands can you use to troubleshoot Layer 3...
Question 17: View the exhibit. (Exhibit) A user behind the FortiGate is t...
Question 18: Refer to the FortiGuard connection debug output. (Exhibit) B...
Question 19: Which type of logs on FortiGate record information about tra...
Question 20: Which statement correctly describes NetAPI polling mode for ...
Question 21: Exhibit: (Exhibit) Refer to the exhibit to view the authenti...
Question 22: Which three pieces of information does FortiGate use to iden...
Question 23: Examine this output from a debug flow: (Exhibit) Why did the...
Question 24: Which security feature does FortiGate provide to protect ser...
Question 25: Which statement about the policy ID number of a firewall pol...
2 commentQuestion 26: What is the effect of enabling auto-negotiate on the phase 2...
1 commentQuestion 27: Refer to the exhibit. (Exhibit) The exhibit shows proxy poli...
Question 28: Which two VDOMs are the default VDOMs created when FortiGate...
Question 29: An administrator needs to increase network bandwidth and pro...
1 commentQuestion 30: In consolidated firewall policies, IPv4 and IPv6 policies ar...
Question 31: Refer to the exhibit. (Exhibit) The Root and To_Internet VDO...
Question 32: If the Services field is configured in a Virtual IP (VIP), w...
Question 33: Refer to the exhibit. (Exhibit) The global settings on a For...
Question 34: Refer to the exhibit. (Exhibit) Which contains a Performance...
Question 35: Which downstream FortiGate VDOM is used to join the Security...
Question 36: Which of the following SD-WAN load -balancing method use int...
Question 37: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 38: View the exhibit: (Exhibit) Which the FortiGate handle web p...
1 commentQuestion 39: Refer to the exhibit. (Exhibit) Which contains a network dia...
Question 40: An administrator has configured outgoing Interface any in a ...
Question 41: An administrator observes that the port1 interface cannot be...
Question 42: An administrator must disable RPF check to investigate an is...
Question 43: What devices form the core of the security fabric?...
Question 44: How does FortiGate act when using SSL VPN in web mode?...
Question 45: An administrator wants to configure Dead Peer Detection (DPD...
Question 46: Examine the two static routes shown in the exhibit, then ans...
Question 47: When browsing to an internal web server using a web-mode SSL...
Question 48: Which three methods are used by the collector agent for AD p...
Question 49: Refer to the exhibit. (Exhibit) In the network shown in the ...
Question 50: How do you format the FortiGate flash disk?...
1 commentQuestion 51: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 52: Which CLI command will display sessions both from client to ...
Question 53: Which of statement is true about SSL VPN web mode?...
Question 54: Which two statements about SSL VPN between two FortiGate dev...
Question 55: Refer to the exhibits. (Exhibit) The exhibits show the SSL a...
Question 56: An administrator has a requirement to keep an application se...
Question 57: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 58: Refer to the exhibit. (Exhibit) Given the security fabric to...
2 commentQuestion 59: Refer to the exhibit. (Exhibit) Based on the raw log, which ...
Question 60: What types of traffic and attacks can be blocked by a web ap...
Question 61: Refer to the exhibit. (Exhibit) The exhibits show a network ...