When configuring the root FortiGate to communicate with a downstream FortiGate, which settings are required to be configured?
You are configuring the root FortiGate to implement the security fabric. You are configuring port10 to communicate with a downstream FortiGate. View the default Edit Interface in the exhibit below: When configuring the root FortiGate to communicate with a downstream FortiGate, which settings are required to be configured? (Choose two.)A...
In a high availability (HA) cluster operating in active-active mode, which of the following correctly describes the path taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?
In a high availability (HA) cluster operating in active-active mode, which of the following correctly describes the path taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?A . Client > primary FortiGate> secondary FortiGate> primary FortiGate> web server.B . Client > secondary FortiGate>...
An administrator wants to create a policy-based IPsec VPN tunnel between two FortiGate devices Winch configuration steps must be performed on both devices to support this scenario? (Choose three.)
An administrator wants to create a policy-based IPsec VPN tunnel between two FortiGate devices Winch configuration steps must be performed on both devices to support this scenario? (Choose three.)A . Define the phase 1 parameters, without enabling IPsec interface modeB . Define the phase 2 parameters.C . Set the phase...
Why is the site www.bing.com being blocked?
Examine the exhibit, which shows the output of a web filtering real time debug. Why is the site www.bing.com being blocked?A . The web site www.bing.com is categorized by FortiGuard as Malicious Websites.B . The user has not authenticated with the FortiGate yet.C . The web server IP address 204.79.197.200...
Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)
Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)A . Log downloads from the GUI are limited to the current log filter viewB . Log backups from the CLI cannot be restored to another FortiGate.C . Log...
How do you format the FortiGate flash disk?
How do you format the FortiGate flash disk?A . Load a debug FortiOS image.B . Load the hardware test (HQIP) image.C . Execute the CLI command execute formatlogdisk.D . Select the format boot device option from the BIOS menu.View AnswerAnswer: D
Based on the diagnostic outputs above, how is the FortiGate handling the traffic for new sessions that require inspection?
Examine this FortiGate configuration: Examine the output of the following debug command: Based on the diagnostic outputs above, how is the FortiGate handling the traffic for new sessions that require inspection?A . It is allowed, but with no inspectionB . It is allowed and inspected as long as the inspection...
Which of the following statement about the output is true?
Examine the exhibit, which shows the partial output of an IKE real-time debug. Which of the following statement about the output is true?A . The VPN is configured to use pre-shared key authentication.B . Extended authentication (XAuth) was successful.C . Remote is the host name of the remote IPsec peer.D...
The FSSO Collector Agent set to advanced access mode for the Windows Active Directory uses which of the following?
The FSSO Collector Agent set to advanced access mode for the Windows Active Directory uses which of the following?A . LDAP conventionB . NTLM conventionC . Windows convention - NetBios: DomainUsemameD . RSSO conventionView AnswerAnswer: C
Which statements about antivirus scanning mode are true? (Choose two.)
Which statements about antivirus scanning mode are true? (Choose two.)A . In proxy-based inspection mode antivirus buffers the whole file for scarring before sending it to the client.B . In flow-based inspection mode, you can use the CLI to configure antivirus profiles to use protocol option profiles.C . In proxy-based...