Exam4Training

Fortinet NSE6_FWB-6.4 Fortinet NSE 6 – FortiWeb 6.4 Online Training

Question #1

Which two statements about running a vulnerability scan are true? (Choose two.)

  • A . You should run the vulnerability scan during a maintenance window.
  • B . You should run the vulnerability scan in a test environment.
  • C . Vulnerability scanning increases the load on FortiWeb, so it should be avoided.
  • D . You should run the vulnerability scan on a live website to get accurate results.

Reveal Solution Hide Solution

Correct Answer: A, B
A, B

Explanation:

Should the Vulnerability Scanner allow it, SVMS will set the scan schedule (or schedules) to run in a maintenance window. SVMS will advise Client of the scanner’s ability to complete the scan(s) within the maintenance window.

Vulnerabilities on live web sites. Instead, duplicate the web site and its database in a test environment.

Reference:

https://www.trustwave.com/media/17427/trustwave_mss_managed-3rd-party-vulnerability-scanning.pdf

https://help.fortinet.com/fweb/552/Content/FortiWeb/fortiweb-admin/vulnerability_scans.htm

Question #2

FortiWeb offers the same load balancing algorithms as FortiGate.

Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)

  • A . Round robin
  • B . HTTP session-based round robin
  • C . HTTP user-based round robin
  • D . HTTP content routes

Reveal Solution Hide Solution

Correct Answer: A, D
A, D

Explanation:

Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-guide/399384/defining-your-web-servers

http://fortinet.globalgate.com.ar/pdfs/FortiWeb/FortiWeb_DS.pdf

Question #3

Which would be a reason to implement HTTP rewriting?

  • A . The original page has moved to a new URL
  • B . To replace a vulnerable function in the requested URL
  • C . To send the request to secure channel
  • D . The original page has moved to a new IP address

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Create a new URL rewriting rule.

Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-guide/961303/rewriting-redirecting

Question #4

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers .

What must the administrator do to avoid this problem? (Choose two.)

  • A . Enable the Use X-Forwarded-For setting on FortiWeb.
  • B . No Special configuration is required; connectivity will be re-established after the set timeout.
  • C . Place FortiWeb in front of FortiADC.
  • D . Enable the Add X-Forwarded-For setting on FortiWeb.

Reveal Solution Hide Solution

Correct Answer: A, C
A, C

Explanation:

Configure your load balancer to insert or append to an X-Forwarded-For:, X-Real-IP:, or other HTTP X-header. Also configure FortiWeb to find the original attacker’s or client’s IP address in that HTTP header

Reference: https://help.fortinet.com/fweb/560/Content/FortiWeb/fortiweb-admin/planning_topology.htm

Question #5

Which statement about local user accounts is true?

  • A . They are best suited for large environments with many users.
  • B . They cannot be used for site publishing.
  • C . They must be assigned, regardless of any other authentication.
  • D . They can be used for SSO.

Reveal Solution Hide Solution

Correct Answer: B
Question #6

Refer to the exhibit.

Based on the configuration, what would happen if this FortiWeb were to lose power? (Choose two.)

  • A . Traffic that passes between port5 and port6 will be inspected.
  • B . Traffic will be interrupted between port3 and port4.
  • C . All traffic will be interrupted.
  • D . Traffic will pass between port5 and port6 uninspected.

Reveal Solution Hide Solution

Correct Answer: B, D
B, D

Explanation:

Reference: https://docs.fortinet.com/document/fortiweb/6.3.10/administration-guide/33485/fail-to-wire-for-power-loss-reboots

Question #7

Refer to the exhibit.

FortiWeb is configured to block traffic from Japan to your web application server. However, in the logs, the administrator is seeing traffic allowed from one particular IP address which is geo-located in Japan.

What can the administrator do to solve this problem? (Choose two.)

  • A . Manually update the geo-location IP addresses for Japan.
  • B . If the IP address is configured as a geo reputation exception, remove it.
  • C . Configure the IP address as a blacklisted IP address.
  • D . If the IP address is configured as an IP reputation exception, remove it.

Reveal Solution Hide Solution

Correct Answer: B, C
Question #8

Which algorithm is used to build mathematical models for bot detection?

  • A . HCM
  • B . SVN
  • C . SVM
  • D . HMM

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model

Reference: https://docs.fortinet.com/document/fortiweb/6.3.7/administration-guide/193258/machine-learning

Question #9

A client is trying to start a session from a page that would normally be accessible only after the client has logged in.

When a start page rule detects the invalid session access, what can FortiWeb do? (Choose three.)

  • A . Display an access policy message, then allow the client to continue
  • B . Redirect the client to the login page
  • C . Allow the page access, but log the violation
  • D . Prompt the client to authenticate
  • E . Reply with a 403 Forbidden HTTP error

Reveal Solution Hide Solution

Correct Answer: B, C, E
B, C, E

Explanation:

Reference: https://help.fortinet.com/fweb/607/Content/FortiWeb/fortiweb-admin/specify_urls_to_initiate.htm

Question #10

Refer to the exhibit.

Many legitimate users are being identified as bots. FortiWeb bot detection has been configured with the settings shown in the exhibit. The FortiWeb administrator has already verified that the current model is accurate.

What can the administrator do to fix this problem, making sure that real bots are not allowed through FortiWeb?

  • A . Change Model Type to Strict
  • B . Change Action under Action Settings to Alert
  • C . Disable Dynamically Update Model
  • D . Enable Bot Confirmation

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Bot Confirmation

If the number of anomalies from a user has reached the Anomaly Count, the system executes Bot Confirmation before taking actions.

The Bot Confirmation is to confirm if the user is indeed a bot. The system sends RBE (Real Browser Enforcement) JavaScript or CAPTCHA to the client to double check if it’s a real bot.

Reference: https://docs.fortinet.com/document/fortiweb/6.3.1/administration-guide/600188/configuring-bot-detection-profiles

Question #11

What can an administrator do if a client has been incorrectly period blocked?

  • A . Nothing, it is not possible to override a period block.
  • B . Manually release the ID address from the temporary blacklist.
  • C . Force a new IP address to the client.
  • D . Disconnect the client from the network.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Block Period

Enter the number of seconds that you want to block the requests. The valid range is 1C3,600 seconds. The default value is 60 seconds.

This option only takes effect when you choose Period Block in Action.

Note: That’s a temporary blacklist so you can manually release them from the blacklist.

Reference: https://docs.fortinet.com/document/fortiweb/6.3.1/administration-guide/600188/configuring-bot-detection-profiles

Question #12

Which regex expression is the correct format for redirecting the URL http://www.example.com?

  • A . www.example.com
  • B . www.example.com
  • C . wwwexamplecom
  • D . www/.example/.com

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://learn.akamai.com/en-us/webhelp/edge-redirector/edge-redirector-guide/GUID-0C22DFC2-DCC4-42AF-BDB2-9537FBEE03FD.html

Question #13

When FortiWeb triggers a redirect action, which two HTTP codes does it send to the client to inform the browser of the new URL? (Choose two.)

  • A . 403
  • B . 302
  • C . 301
  • D . 404

Reveal Solution Hide Solution

Correct Answer: B, C
B, C

Explanation:

Reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/302

Question #14

True transparent proxy mode is best suited for use in which type of environment?

  • A . New networks where infrastructure is not yet defined
  • B . Flexible environments where you can easily change the IP addressing scheme
  • C . Small office to home office environments
  • D . Environments where you cannot change the IP addressing scheme

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

"Because blocking is not guaranteed to succeed in offline mode, this mode is best used during the evaluation and planning phase, early in implementation. Reverse proxy is the most popular operating mode. It can rewrite URLs, offload TLS, load balance, and apply NAT. For very large MSSP, true transparent mode has a significant advantage. You can drop it in without changing any schemes of limited IPv4 spaceCin transparent mode, you don’t need to give IP addresses to the network interfaces on FortiWeb."

Question #15

Review the following configuration:

What is the expected result of this configuration setting?

  • A . When machine learning (ML) is in its collecting phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
  • B . When machine learning (ML) is in its running phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
  • C . When machine learning (ML) is in its collecting phase, FortiWeb will not accept any samples from any source IP addresses.
  • D . When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples from the same source IP address.

Reveal Solution Hide Solution

Correct Answer: A
Question #16

Which two statements about the anti-defacement feature on FortiWeb are true? (Choose two.)

  • A . Anti-defacement can redirect users to a backup web server, if it detects a change.
  • B . Anti-defacement downloads a copy of your website to RAM, in order to restore a clean image, if it detects defacement.
  • C . FortiWeb will only check to see if there are changes on the web server; it will not download the whole file each time.
  • D . Anti-defacement does not make a backup copy of your databases.

Reveal Solution Hide Solution

Correct Answer: C, D
C, D

Explanation:

Anti-defacement backs up web pages only, not databases.

If it detects any file changes, the FortiWeb appliance will download a new backup revision.

Reference: https://help.fortinet.com/fweb/551/Content/FortiWeb/fortiweb-admin/anti_defacement.htm

Question #17

What must you do with your FortiWeb logs to ensure PCI DSS compliance?

  • A . Store in an off-site location
  • B . Erase them every two weeks
  • C . Enable masking of sensitive data
  • D . Compress them into a .zip file format

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://docplayer.net/8466775-Fortiweb-web-application-firewall-ensuring-compliance-for-pci-dss-requirement-6-6-solution-guide.html

Question #18

What role does FortiWeb play in ensuring PCI DSS compliance?

  • A . It provides the ability to securely process cash transactions.
  • B . It provides the required SQL server protection.
  • C . It provides the WAF required by PCI.
  • D . It provides credit card processing capabilities.

Reveal Solution Hide Solution

Correct Answer: C
Question #19

Refer to the exhibit.

There is only one administrator account configured on FortiWeb .

What must an administrator do to restrict any brute force attacks that attempt to gain access to the FortiWeb management GUI?

  • A . Delete the built-in administrator user and create a new one.
  • B . Configure IPv4 Trusted Host # 3 with a specific IP address.
  • C . The configuration changes must be made on the upstream device.
  • D . Change the Access Profile to Read_Only.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://docs.fortinet.com/document/fortiweb/6.1.1/administration-guide/397469/preventing-brute-force-logins

Question #20

What key factor must be considered when setting brute force rate limiting and blocking?

  • A . A single client contacting multiple resources
  • B . Multiple clients sharing a single Internet connection
  • C . Multiple clients from geographically diverse locations
  • D . Multiple clients connecting to multiple resources

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

https://training.fortinet.com/course/view.php?id=3363 What is one key factor that you must consider when setting brute force rate limiting and blocking? Multiple clients sharing a single Internet connection

Exit mobile version