Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection? (Choose two.)
Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection? (Choose two.)A . SP3B . CP8C . NP4D . NP6View AnswerAnswer: A,B
Under what circumstance would you enable LEARN as the Action on a firewall policy?
Under what circumstance would you enable LEARN as the Action on a firewall policy?A . You want FortiGate to compile security feature activity from various security-related logs, such as virus and attack logs.B . You want FortiGate to monitor a specific security profile in a firewall policy, and provide recommendations...
How can a browser trust a web-server certificate signed by a third party CA?
How can a browser trust a web-server certificate signed by a third party CA?A . The browser must have the CA certificate that signed the web-server certificate installed.B . The browser must have the web-server certificate installed.C . The browser must have the private key of CA certificate that signed...
Which of the following statements about NTLM authentication are correct? (Choose two.)
Which of the following statements about NTLM authentication are correct? (Choose two.)A . It is useful when users log in to DCs that are not monitored by a collector agent.B . It takes over as the primary authentication method when configured alongside FSSD . Multi-domain environments require DC agents on...
Which statement about the above configuration is true?
An administrator has enabled proxy-based antivirus scanning and configured the following settings: Which statement about the above configuration is true?A . Files bigger than 10 MB are not scanned for viruses and will be blocked.B . FortiGate scans only the first 10 MB of any file.C . Files bigger than...
Which of the following statements are true when using Web Proxy Auto-discovery Protocol (WPAD) with the DHCP discovery method? (Choose two.)
Which of the following statements are true when using Web Proxy Auto-discovery Protocol (WPAD) with the DHCP discovery method? (Choose two.)A . The browser sends a DHCPINFORM request to the DHCP server.B . The browser will need to be preconfigured with the DHCP server’s IP address.C . The DHCP server...
Which statement about the FortiGuard services for the FortiGate is true?
Which statement about the FortiGuard services for the FortiGate is true?A . Antivirus signatures are downloaded locally on the FortiGate.B . FortiGate downloads IPS updates using UDP port 53 or 8888.C . FortiAnalyzer can be configured as a local FDN to provide antivirus and IPS updates.D . The web filtering...
Which statements are correct based on this output?
Which statements are correct based on this output? (Choose two.)A . The global configuration is synchronized between the primary and secondary FortiGate.B . The all VDOM is not synchronized between the primary and secondary FortiGate.C . The root VDOM is not synchronized between the primary and secondary FortiGate.D . The...
What statements about the configuration are correct?
A FortiGate interface is configured with the following commands: What statements about the configuration are correct? (Choose two.)A . IPv6 clients connected to port1 can use SLAAC to generate their IPv6 addresses.B . FortiGate can provide DNS settings to IPv6 clients.C . FortiGate can send IPv6 router advertisements (RAs.)D ....
How do you configure inline SSL inspection on a firewall policy? (Choose two.)
How do you configure inline SSL inspection on a firewall policy? (Choose two.)A . Enable one or more flow-based security profiles on the firewall policy.B . Enable the SSL/SSH Inspection profile on the firewall policy.C . Execute the inline ssl inspection CLI command.D . Enable one or more proxy-based security...