<< Prev Question Next Question >>

Question 32/60

If FortiSandbox connects to FortiGuard through a web proxy server, which FortiSandbox interface must have access to the proxy server?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (60q)
Question 1: What statement is true for the self-service portal? (Choose ...
Question 2: A device that is 802.1X non-compliant must be connected to t...
Question 3: If a corporate policy mandates IBE encryption for all outgoi...
Question 4: Which of the following statements about virtual tunneling fo...
Question 5: Which protocols can a FortiSandbox inspect when is deployed ...
Question 6: What is one requirement for your network when deploying Fort...
Question 7: Which three methods are available to perform backups of the ...
Question 8: Which statements are true about the FortiAuthenticator CLI? ...
Question 9: When FortiMail is operating is transparent mode, SMTP sessio...
Question 10: (Exhibit) Based on the exhibit, which are true? (Choose two....
Question 11: Which FortiGate process sends files to FortiSandbox for insp...
Question 12: Access delivery rules provide which two of the following fun...
1 commentQuestion 13: Which of these is a security feature specific to FortiADC gl...
Question 14: Which configuration elements must be in place for the FortiA...
Question 15: The Windows licenses in a FortiSandbox could be locked becau...
Question 16: Once defined, an antivirus profile can be activated from whi...
Question 17: Which is true regarding Microsoft Office on FortiSandbox?...
Question 18: Which behavior does not exist for certificate revocation lis...
Question 19: What is the maximum number of sites (or peers) supported in ...
Question 20: Which CLI command on FortiAuthenticator is not used for trou...
Question 21: What information does a scan job report include? (Choose two...
Question 22: Which is not a supported captive portal authentication metho...
Question 23: Which devices can receive logs from FortiSandbox? (Choose tw...
Question 24: In transparent mode, when choosing between using the built-i...
Question 25: Why is it recommended to choose the FortiMail operation mode...
Question 26: If the corporate email policy dictates that SMTP over SSL/TL...
Question 27: Which methods can be used to submit files to FortiSandbox fo...
Question 28: An administrator is running the following sniffer in a Forti...
Question 29: Once an antispam profile has been configured, how is it put ...
Question 30: Which statements are true about the RADIUS service on FortiA...
Question 31: In a server mode config-only cluster, where is the mail data...
Question 32: If FortiSandbox connects to FortiGuard through a web proxy s...
Question 33: Which Fortinet Single Sign-on (FSSO) user identity discovery...
Question 34: For the case of outbound link load balancing, which upstream...
Question 35: Which protocols are supported for archiving scan job reports...
Question 36: What mechanism does FortiGate use to avoid sending a file th...
Question 37: Which FortiADC features can be used to harden the device and...
Question 38: Which FortiADC log severity level corresponds to Log Severit...
Question 39: RADIUS authentication with FortiAuthenticator is not working...
Question 40: Which two types of digital certificates can you create in Fo...
Question 41: What is a primary motivating factor for choosing FortiMail t...
Question 42: Which of the following features are available in all FortiAD...
Question 43: Which of these is an OATH-based standard to generate one-tim...
Question 44: On FortiMail which type of profile is used to configure when...
Question 45: Two FortiADC devices (ADC-1 and ADC-2) form an HA cluster. T...
Question 46: Which protocols can FortiSandbox use to connect to a network...
Question 47: You want to allow guests to authenticate to your network thr...
1 commentQuestion 48: Which of the following statements about layer 2 load balanci...
Question 49: If the FortiMail administrator wished to identify emails whi...
Question 50: Which threats can a FortiSandbox inspect when it is deployed...
Question 51: Two FortiADC devices from an HA cluster. What information ca...
Question 52: You are a FortiAuthenticator administrator for a large organ...
Question 53: The sender validation techniques SPF and DKIM rely on data p...
Question 54: Which of the following statements best describe what a SYN c...
Question 55: Which statements are true for the EAP-TTLS authentication me...
Question 56: What actions can a FortiADC take for HTTP traffic that is co...
Question 57: When FortiMail is operating in server mode, the DNS MX recor...
Question 58: FortiGate is configured to send suspicious files to a FortiS...
Question 59: Which configuration object in FortiMail would be used to att...
Question 60: An administrator wants to implement load balancing persisten...