<< Prev Question Next Question >>

Question 19/81

Refer to the exhibits.
Exhibit A shows a topology for a FortiGate HA cluster that performs proxy-based inspection on traffic. Exhibit B shows the HA configuration and the partial output of the get system ha status command.


Based on the exhibits, which two statements about the traffic passing through the cluster are true? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (81q)
Question 1: What inspection mode does FortiGate use if it is configured ...
Question 2: Which statement is correct regarding the security fabric?...
Question 3: Which statement about the policy ID number of a firewall pol...
Question 4: Which three criteria can a FortiGate use to look for a match...
Question 5: If Internet Service is already selected as Destination in a ...
Question 6: Refer to the exhibit to view the firewall policy Why would t...
Question 7: Refer to the exhibit, which contains a static route configur...
Question 8: Refer to the exhibits. Exhibit A shows the application senso...
Question 9: Which statements about the firmware upgrade process on an ac...
Question 10: You have enabled logging on a FortiGate device for event log...
Question 11: Which of the following are valid actions for FortiGuard cate...
Question 12: Which three security features require the intrusion preventi...
Question 13: Which two types of traffic are managed only by the managemen...
Question 14: FortiGate is operating in NAT mode and is configured with tw...
Question 15: Refer to the exhibits. (Exhibit) Exhibit A shows system perf...
Question 16: Which statement describes a characteristic of automation sti...
Question 17: Which two statements ate true about the Security Fabric rati...
Question 18: An administrator configures FortiGuard servers as DNS server...
Question 19: Refer to the exhibits. Exhibit A shows a topology for a Fort...
Question 20: An administrator observes that the port1 interface cannot be...
Question 21: Which three options are the remote log storage options you c...
Question 22: If Internet Service is already selected as Source in a firew...
Question 23: Refer to the exhibit showing a debug flow output. (Exhibit) ...
Question 24: FortiGate is configured as a policy-based next-generation fi...
Question 25: Why does FortiGate Keep TCP sessions in the session table fo...
Question 26: What are two scanning techniques supported by FortiGate? (Ch...
Question 27: Refer to the exhibit. (Exhibit) Based on the raw log, which ...
Question 28: When a firewall policy is created, which attribute is added ...
Question 29: What is the primary FortiGate election process when the HA o...
Question 30: Which two configuration settings are synchronized when Forti...
Question 31: If the Issuer and Subject values are the same in a digital c...
Question 32: Refer to the exhibit. (Exhibit) The exhibit contains the con...
Question 33: Which two protocol options are available on the CLI but not ...
Question 34: Consider the topology: Application on a Windows machine &lt;...
Question 35: Which CLI command will display sessions both from client to ...
Question 36: The HTTP inspection process in web filtering follows a speci...
Question 37: A network administrator has enabled SSL certificate inspecti...
Question 38: An administrator is running the following sniffer command: W...
Question 39: An administrator must disable RPF check to investigate an is...
Question 40: What is the limitation of using a URL list and application c...
Question 41: A network administrator wants to set up redundant IPsec VPN ...
Question 42: Which of statement is true about SSL VPN web mode?...
Question 43: An employee needs to connect to the office through a high-la...
Question 44: Refer to the exhibit. (Exhibit) Given the routing database s...
Question 45: An administrator wants to simplify remote access without ask...
Question 46: Refer to the exhibit. (Exhibit) Based on the administrator p...
Question 47: Refer to the exhibits. The exhibits show the firewall polici...
Question 48: A network administrator is troubleshooting an IPsec tunnel b...
Question 49: Which two actions can you perform only from the root FortiGa...
Question 50: Examine the exhibit, which contains a virtual IP and firewal...
Question 51: Refer to the exhibit. Refer to the FortiGuard connection deb...
Question 52: Which two statements describe how the RPF check is used? (Ch...
Question 53: Which CLI command allows administrators to troubleshoot Laye...
Question 54: Refer to the exhibit. The exhibit shows a diagram of a Forti...
Question 55: Which engine handles application control traffic on the next...
Question 56: Refer to the exhibit, which contains a session diagnostic ou...
Question 57: Which of the following are valid actions for FortiGuard cate...
Question 58: Which three statements explain a flow-based antivirus profil...
Question 59: Which two types of traffic are managed only by the managemen...
Question 60: Refer to the exhibits. Exhibit A shows a network diagram. Ex...
Question 61: FortiGuard categories can be overridden and defined in diffe...
Question 62: Which three methods are used by the collector agent for AD p...
Question 63: Which statement about the deployment of the Security Fabric ...
Question 64: Refer to the exhibit showing a debug flow output. (Exhibit) ...
Question 65: Which two statements explain antivirus scanning modes? (Choo...
Question 66: Which two statements about FortiGate FSSO agentless polling ...
Question 67: Which CLI command will display sessions both from client to ...
Question 68: Which of the following statements about backing up logs from...
Question 69: What is the effect of enabling auto-negotiate on the phase 2...
Question 70: Refer to the exhibit. (Exhibit) The exhibit shows the IPS se...
Question 71: If the Services field is configured in a Virtual IP (VIP), w...
Question 72: What are two functions of ZTNA? (Choose two.)...
Question 73: Which two statements are correct about SLA targets? (Choose ...
Question 74: Refer to the exhibit. A network administrator is troubleshoo...
Question 75: Refer to the exhibit. (Exhibit) Given the security fabric to...
Question 76: Refer to the exhibits. (Exhibit) The exhibits show the SSL a...
Question 77: Which two statements are correct regarding FortiGate FSSO ag...
Question 78: Refer to the exhibits to view the firewall policy (Exhibit A...
Question 79: Which two attributes are required on a certificate so it can...
Question 80: Refer to the exhibit. (Exhibit) The Root and To_Internet VDO...
Question 81: Which statements best describe auto discovery VPN (ADVPN). (...