<< Prev Question Next Question >>

Question 55/70

FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy. Which two other security profiles can you apply to the security policy? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (70q)
Question 1: Which timeout setting can be responsible for deleting SSL VP...
Question 2: An administrator does not want to report the logon events of...
Question 3: Refer to the exhibits. The exhibits show a network diagram a...
Question 4: Refer to the exhibits. The exhibits show the firewall polici...
Question 5: Refer to the exhibit. (Exhibit) The Root and To_Internet VDO...
Question 6: Which two statements are correct about a software switch on ...
Question 7: Which statement is correct regarding the use of application ...
Question 8: Which three options are the remote log storage options you c...
Question 9: Which two settings can be separately configured per VDOM on ...
Question 10: If Internet Service is already selected as Source in a firew...
Question 11: Which two statements are true when FortiGate is in transpare...
Question 12: Which two statements about FortiGate FSSO agentless polling ...
Question 13: Which three statements are true regarding session-based auth...
Question 14: An administrator configures FortiGuard servers as DNS server...
Question 15: Refer to the exhibit showing a debug flow output. (Exhibit) ...
Question 16: What are two benefits of flow-based inspection compared to p...
Question 17: An employee needs to connect to the office through a high-la...
Question 18: Refer to the exhibit. (Exhibit) The exhibit contains the con...
Question 19: Refer to the exhibit. (Exhibit) Based on the raw log, which ...
Question 20: If the Issuer and Subject values are the same in a digital c...
Question 21: Which of the following are valid actions for FortiGuard cate...
Question 22: Examine this FortiGate configuration: (Exhibit) How does the...
Question 23: On FortiGate, which type of logs record information about tr...
Question 24: Which statement about the IP authentication header (AH) used...
Question 25: An administrator wants to simplify remote access without ask...
Question 26: Which statement about video filtering on FortiGate is true?...
Question 27: Refer to the exhibit. Refer to the web filter raw logs. (Exh...
Question 28: An organization requires remote users to send external appli...
Question 29: An administrator has configured the following settings: (Exh...
Question 30: Which of the following SD-WAN load balancing method use inte...
Question 31: Which statement correctly describes NetAPI polling mode for ...
Question 32: Which two statements are correct regarding FortiGate FSSO ag...
Question 33: What are two characteristics of FortiGate HA cluster virtual...
Question 34: Refer to the exhibit. (Exhibit) Which contains a session dia...
Question 35: Refer to the exhibit, which contains a session diagnostic ou...
Question 36: Refer to the exhibit to view the application control profile...
Question 37: What inspection mode does FortiGate use if it is configured ...
Question 38: Refer to the exhibit. Refer to the FortiGuard connection deb...
Question 39: An administrator is configuring an Ipsec between site A and ...
Question 40: Refer to the exhibits to view the firewall policy (Exhibit A...
Question 41: Which of statement is true about SSL VPN web mode?...
Question 42: An administrator is configuring an IPsec VPN between site A ...
Question 43: Which three security features require the intrusion preventi...
Question 44: An administrator wants to configure Dead Peer Detection (DPD...
Question 45: A network administrator is troubleshooting an IPsec tunnel b...
Question 46: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 47: Which three criteria can a FortiGate use to look for a match...
Question 48: Refer to the exhibit. An administrator added a configuration...
Question 49: An administrator has a requirement to keep an application se...
Question 50: Which of the following statements about central NAT are true...
Question 51: Which two statements are true about the RPF check? (Choose t...
Question 52: Which two configuration settings are synchronized when Forti...
Question 53: Refer to the exhibit. The exhibit shows a diagram of a Forti...
Question 54: Which feature in the Security Fabric takes one or more actio...
Question 55: FortiGate is configured as a policy-based next-generation fi...
Question 56: Refer to the exhibit. (Exhibit) Given the interfaces shown i...
Question 57: Refer to the exhibit. (Exhibit) Review the Intrusion Prevent...
Question 58: An administrator is running the following sniffer command: W...
Question 59: Refer to the exhibits. Exhibit A shows a network diagram. Ex...
Question 60: The IPS engine is used by which three security features? (Ch...
Question 61: Refer to the exhibit. (Exhibit) Which contains a session lis...
Question 62: Which statements best describe auto discovery VPN (ADVPN). (...
Question 63: Which three authentication timeout types are availability fo...
Question 64: Refer to the exhibit. (Exhibit) The global settings on a For...
Question 65: How does FortiGate act when using SSL VPN in web mode?...
Question 66: In consolidated firewall policies, IPv4 and IPv6 policies ar...
Question 67: What is the effect of enabling auto-negotiate on the phase 2...
Question 68: Which two statements describe how the RPF check is used? (Ch...
Question 69: Which statement about video filtering on FortiGate is true?...
Question 70: What are two functions of the ZTNA rule? (Choose two.)...