Which two types of traffic are managed only by the management VDOM? (Choose two.)

Which two types of traffic are managed only by the management VDOM? (Choose two.)A . FortiGuard web filter queriesB . PKIC . Traffic shapingD . DNSView AnswerAnswer: A,D Explanation: "NTP, FortiGuard updated/queries, SNMP, DNS Filtering, Log settings and other mgmt related services". B is wrong because PKI stands for Public...

April 24, 2025 No Comments READ MORE +

What is the most likely reason for this situation?

Refer to the exhibit. FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt. What is the most likely reason for this situation?A . No matching user account exists for this user.B . The user is using a...

April 24, 2025 No Comments READ MORE +

Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?

Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?A . FG-traffic VDOMB . Root VDOMC . Customer VDOMD . Global VDOMView AnswerAnswer: B Explanation: If you enable split-task VDOM mode on the upstream FGT device, it can allow downstream...

April 23, 2025 No Comments READ MORE +

Which subnet must the administrator configure for the local quick mode selector for site B?

An administrator is configuring an IPsec VPN between site A and site B. The Remote Gateway setting in both sites has been configured as Static IP Address. For site A, the local quick mode selector is 192.168.1.0/24 and the remote quick mode selector is 192.168.2.0/24. Which subnet must the administrator...

April 22, 2025 No Comments READ MORE +

Which statement best describes the role of a DC agent in an FSSO DC agent mode solution?

Which statement best describes the role of a DC agent in an FSSO DC agent mode solution?A . It captures the login and logoff events and forwards them to the collector agent.B . It captures the login events and forwards them to the collector agent.C . It captures the login...

April 22, 2025 No Comments READ MORE +

Which two items must they configure on their FortiGate to accomplish this?

An administrator wants to monitor their network for any probing attempts aimed to exploit existing vulnerabilities in their servers. Which two items must they configure on their FortiGate to accomplish this? (Choose two.)A . A web application firewall profile to check protocol constraintsB . A DoS policy, and log all...

April 22, 2025 No Comments READ MORE +

Which additional load balancing method is supported in equal cost multipath (ECMP) load balancing when SD-WAN is enabled?

Which additional load balancing method is supported in equal cost multipath (ECMP) load balancing when SD-WAN is enabled?A . Volume basedB . Source-destination IP basedC . Source IP basedD . Weight basedView AnswerAnswer: A Explanation: Volume load balancing method is supported in equal cost multipath (ECMP) load balancing when SD-WAN...

April 20, 2025 No Comments READ MORE +

What is eXtended Authentication (XAuth)?

What is eXtended Authentication (XAuth)?A . It is an IPsec extension that forces remote VPN users to authenticate using their local ID.B . It is an IPsec extension that forces remote VPN users to authenticate using their credentials (username and password).C . It is an IPsec extension that authenticates remote...

April 18, 2025 No Comments READ MORE +

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.) A. The keyUsage extension must be set to keyCertSign. B. The CA extension must be set to TRUE. C. The issuer must be a public CA. D. The...

April 17, 2025 No Comments READ MORE +

Which are two benefits of using SD-WAN? (Choose two.)

Which are two benefits of using SD-WAN? (Choose two.)A . FortiGate performs per-packet distribution across multiple SD-WAN members.B . WAN is used effectively.C . Application steering is available.D . Firewall policies are not required.View AnswerAnswer: B,C Explanation: The two benefits of using SD-WAN are: B. WAN is used effectively. SD-WAN...

April 13, 2025 No Comments READ MORE +