<< Prev Question Next Question >>

Question 14/60

Which configuration elements must be in place for the FortiADC global load balancing feature to discover from local FortiADC server load balancers the virtual servers that can be included in the GLB virtual server pools? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (60q)
Question 1: What statement is true for the self-service portal? (Choose ...
Question 2: A device that is 802.1X non-compliant must be connected to t...
Question 3: If a corporate policy mandates IBE encryption for all outgoi...
Question 4: Which of the following statements about virtual tunneling fo...
Question 5: Which protocols can a FortiSandbox inspect when is deployed ...
Question 6: What is one requirement for your network when deploying Fort...
Question 7: Which three methods are available to perform backups of the ...
Question 8: Which statements are true about the FortiAuthenticator CLI? ...
Question 9: When FortiMail is operating is transparent mode, SMTP sessio...
Question 10: (Exhibit) Based on the exhibit, which are true? (Choose two....
Question 11: Which FortiGate process sends files to FortiSandbox for insp...
Question 12: Access delivery rules provide which two of the following fun...
1 commentQuestion 13: Which of these is a security feature specific to FortiADC gl...
Question 14: Which configuration elements must be in place for the FortiA...
Question 15: The Windows licenses in a FortiSandbox could be locked becau...
Question 16: Once defined, an antivirus profile can be activated from whi...
Question 17: Which is true regarding Microsoft Office on FortiSandbox?...
Question 18: Which behavior does not exist for certificate revocation lis...
Question 19: What is the maximum number of sites (or peers) supported in ...
Question 20: Which CLI command on FortiAuthenticator is not used for trou...
Question 21: What information does a scan job report include? (Choose two...
Question 22: Which is not a supported captive portal authentication metho...
Question 23: Which devices can receive logs from FortiSandbox? (Choose tw...
Question 24: In transparent mode, when choosing between using the built-i...
Question 25: Why is it recommended to choose the FortiMail operation mode...
Question 26: If the corporate email policy dictates that SMTP over SSL/TL...
Question 27: Which methods can be used to submit files to FortiSandbox fo...
Question 28: An administrator is running the following sniffer in a Forti...
Question 29: Once an antispam profile has been configured, how is it put ...
Question 30: Which statements are true about the RADIUS service on FortiA...
Question 31: In a server mode config-only cluster, where is the mail data...
Question 32: If FortiSandbox connects to FortiGuard through a web proxy s...
Question 33: Which Fortinet Single Sign-on (FSSO) user identity discovery...
Question 34: For the case of outbound link load balancing, which upstream...
Question 35: Which protocols are supported for archiving scan job reports...
Question 36: What mechanism does FortiGate use to avoid sending a file th...
Question 37: Which FortiADC features can be used to harden the device and...
Question 38: Which FortiADC log severity level corresponds to Log Severit...
Question 39: RADIUS authentication with FortiAuthenticator is not working...
Question 40: Which two types of digital certificates can you create in Fo...
Question 41: What is a primary motivating factor for choosing FortiMail t...
Question 42: Which of the following features are available in all FortiAD...
Question 43: Which of these is an OATH-based standard to generate one-tim...
Question 44: On FortiMail which type of profile is used to configure when...
Question 45: Two FortiADC devices (ADC-1 and ADC-2) form an HA cluster. T...
Question 46: Which protocols can FortiSandbox use to connect to a network...
Question 47: You want to allow guests to authenticate to your network thr...
1 commentQuestion 48: Which of the following statements about layer 2 load balanci...
Question 49: If the FortiMail administrator wished to identify emails whi...
Question 50: Which threats can a FortiSandbox inspect when it is deployed...
Question 51: Two FortiADC devices from an HA cluster. What information ca...
Question 52: You are a FortiAuthenticator administrator for a large organ...
Question 53: The sender validation techniques SPF and DKIM rely on data p...
Question 54: Which of the following statements best describe what a SYN c...
Question 55: Which statements are true for the EAP-TTLS authentication me...
Question 56: What actions can a FortiADC take for HTTP traffic that is co...
Question 57: When FortiMail is operating in server mode, the DNS MX recor...
Question 58: FortiGate is configured to send suspicious files to a FortiS...
Question 59: Which configuration object in FortiMail would be used to att...
Question 60: An administrator wants to implement load balancing persisten...