How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires authorization?
Examine this FortiGate configuration: How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires authorization?A . It always authorizes the traffic without requiring authentication.B . It drops the traffic.C . It authenticates the traffic using the authentication scheme SCHEME2.D . It authenticates the traffic...
Which of the following statements are true?
Examine this PAC file configuration. Which of the following statements are true? (Choose two.)A . Browsers can be configured to retrieve this PAC file from the FortiGate.B . Any web request to the 172.25.120.0/24 subnet is allowed to bypass the proxy.C . All requests not made to Fortinet.com or the...
What does the configuration do?
An administrator has configured the following settings: What does the configuration do? (Choose two.)A . Reduces the amount of logs generated by denied traffic.B . Enforces device detection on all interfaces for 30 minutes.C . Blocks denied users for 30 minutes.D . Creates a session for traffic being denied.View AnswerAnswer:...
If the Issuer and Subject values are the same in a digital certificate, which type of entity was the certificate issued to?
If the Issuer and Subject values are the same in a digital certificate, which type of entity was the certificate issued to?A . A CRLB . A personC . A subordinate CAD . A root CAView AnswerAnswer: D
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?A . remote user’s public IP addressB . The public IP address of the FortiGate device.C . The remote user’s virtual IP address.D . The internal...
Which of the following conditions roust be met in order for a web browser to trust a web server certificate signed by a third-party CA?
Which of the following conditions roust be met in order for a web browser to trust a web server certificate signed by a third-party CA?A . The web-server certificate DM be installed on the browserB . The public key of the web server certificate must be installed on die browserC...
Which IP address will be used to source NAT the Internet traffic coming from a workstation with the IP address 10.0.1.10/24?
Examine the exhibit, which contains a virtual IP and firewall policy configuration. The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port2) interface has the IP address 10.0.1.254/24. The first firewall policy has NAT enabled on the outgoing interface address. The second firewall policy is configured with a...
When using WPAD DNS method, winch FQDN format do browsers use to query the DNS server?
When using WPAD DNS method, winch FQDN format do browsers use to query the DNS server? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C
What can be the reasons for that?
An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.)A . The interface has been configured for one-arm sniffer.B . The interface is a member of a virtual wire pair.C . The operation mode is transparent.D ....
What information is flushed when the chunk-size value is changed in the config dlp settings?
What information is flushed when the chunk-size value is changed in the config dlp settings?A . The database for DLP document fingerprintingB . The supported file types in the DLP filtersC . The archived files and messagesD . The file name patterns in the DLP filtersView AnswerAnswer: A