<< Prev Question Next Question >>

Question 60/61

What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (61q)
Question 1: Which two policies must be configured to allow traffic on a ...
1 commentQuestion 2: Refer to the exhibit. (Exhibit) The exhibit shows the IPS se...
Question 3: Which statements about the firmware upgrade process on an ac...
Question 4: An administrator needs to configure VPN user access for mult...
Question 5: Which of the following are valid actions for FortiGuard cate...
Question 6: Which two statements are true about collector agent advanced...
Question 7: A team manager has decided that, while some members of the t...
Question 8: Which statement regarding the firewall policy authentication...
2 commentQuestion 9: FortiGate is configured as a policy-based next-generation fi...
Question 10: Refer to the exhibit. (Exhibit) A network administrator is t...
Question 11: FortiGuard categories can be overridden and defined in diffe...
1 commentQuestion 12: Refer to the exhibit, which contains a session diagnostic ou...
Question 13: Which three authentication timeout types are availability fo...
2 commentQuestion 14: Which statements are true regarding firewall policy NAT usin...
Question 15: In an explicit proxy setup, where is the authentication meth...
Question 16: Which three CLI commands can you use to troubleshoot Layer 3...
Question 17: View the exhibit. (Exhibit) A user behind the FortiGate is t...
Question 18: Refer to the FortiGuard connection debug output. (Exhibit) B...
Question 19: Which type of logs on FortiGate record information about tra...
Question 20: Which statement correctly describes NetAPI polling mode for ...
Question 21: Exhibit: (Exhibit) Refer to the exhibit to view the authenti...
Question 22: Which three pieces of information does FortiGate use to iden...
Question 23: Examine this output from a debug flow: (Exhibit) Why did the...
Question 24: Which security feature does FortiGate provide to protect ser...
Question 25: Which statement about the policy ID number of a firewall pol...
2 commentQuestion 26: What is the effect of enabling auto-negotiate on the phase 2...
1 commentQuestion 27: Refer to the exhibit. (Exhibit) The exhibit shows proxy poli...
Question 28: Which two VDOMs are the default VDOMs created when FortiGate...
Question 29: An administrator needs to increase network bandwidth and pro...
1 commentQuestion 30: In consolidated firewall policies, IPv4 and IPv6 policies ar...
Question 31: Refer to the exhibit. (Exhibit) The Root and To_Internet VDO...
Question 32: If the Services field is configured in a Virtual IP (VIP), w...
Question 33: Refer to the exhibit. (Exhibit) The global settings on a For...
Question 34: Refer to the exhibit. (Exhibit) Which contains a Performance...
Question 35: Which downstream FortiGate VDOM is used to join the Security...
Question 36: Which of the following SD-WAN load -balancing method use int...
Question 37: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 38: View the exhibit: (Exhibit) Which the FortiGate handle web p...
1 commentQuestion 39: Refer to the exhibit. (Exhibit) Which contains a network dia...
Question 40: An administrator has configured outgoing Interface any in a ...
Question 41: An administrator observes that the port1 interface cannot be...
Question 42: An administrator must disable RPF check to investigate an is...
Question 43: What devices form the core of the security fabric?...
Question 44: How does FortiGate act when using SSL VPN in web mode?...
Question 45: An administrator wants to configure Dead Peer Detection (DPD...
Question 46: Examine the two static routes shown in the exhibit, then ans...
Question 47: When browsing to an internal web server using a web-mode SSL...
Question 48: Which three methods are used by the collector agent for AD p...
Question 49: Refer to the exhibit. (Exhibit) In the network shown in the ...
Question 50: How do you format the FortiGate flash disk?...
1 commentQuestion 51: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 52: Which CLI command will display sessions both from client to ...
Question 53: Which of statement is true about SSL VPN web mode?...
Question 54: Which two statements about SSL VPN between two FortiGate dev...
Question 55: Refer to the exhibits. (Exhibit) The exhibits show the SSL a...
Question 56: An administrator has a requirement to keep an application se...
Question 57: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 58: Refer to the exhibit. (Exhibit) Given the security fabric to...
2 commentQuestion 59: Refer to the exhibit. (Exhibit) Based on the raw log, which ...
Question 60: What types of traffic and attacks can be blocked by a web ap...
Question 61: Refer to the exhibit. (Exhibit) The exhibits show a network ...