The FSSO collector agent set to advanced access mode for the Windows Active Directory uses which convention?
The FSSO collector agent set to advanced access mode for the Windows Active Directory uses which convention?A . LDAPB . WindowsC . RSSOD . NTLMView AnswerAnswer: A
Which two static routes are not maintained in the routing table? (Choose two.)
Which two static routes are not maintained in the routing table? (Choose two.)A . Dynamic routesB . Policy routesC . Named Address routesD . ISDB routesView AnswerAnswer: CD Explanation: Reference: https://help.fortinet.com/fadc/4-8-0/olh/Content/FortiADC/handbook/routing_static.htm
On a FortiGate with a hard disk, how frequently can you upload logs to FortiAnalyzer or FortiManager? (Choose two.)
On a FortiGate with a hard disk, how frequently can you upload logs to FortiAnalyzer or FortiManager? (Choose two.)A . On-demandB . HourlyC . Every 5 minutesD . In real timeView AnswerAnswer: CD
In an HA cluster operating in active-active mode, which path is taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?
In an HA cluster operating in active-active mode, which path is taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?A . Client > secondary FortiGate > primary FortiGate > web serverB . Client > primary FortiGate > secondary FortiGate > primary FortiGate >...
What will happen to unauthenticated users when an active authentication policy is followed by a fall through policy without authentication?
Examine the FortiGate configuration: What will happen to unauthenticated users when an active authentication policy is followed by a fall through policy without authentication?A . The user must log in again to authenticate.B . The user will be denied access to resources without authentication.C . The user will not be...
Which two statements about antivirus scanning mode are true? (Choose two.)
Which two statements about antivirus scanning mode are true? (Choose two.)A . In proxy-based inspection mode, antivirus buffers the whole file for scanning, before sending it to the client.B . In full scan flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.C . In...
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)A . Services defined in the firewall policy.B . Incoming and outgoing interfacesC . Highest to lowest priority defined in the firewall policy.D . Lowest to highest policy ID number.View AnswerAnswer: AB
Which two statements about NTLM authentication are correct? (Choose two.)
Which two statements about NTLM authentication are correct? (Choose two.)A . It requires DC agents on every domain controller when used in multidomain environments.B . It is useful when users log in to DCs that are not monitored by a collector agent.C . It requires NTLM-enabled web browsers.D . It...
Given the partial output of an IKE real-time debug shown in the exhibit, which statement about the output is true?
Refer to the exhibit. Given the partial output of an IKE real-time debug shown in the exhibit, which statement about the output is true?A . The VPN is configured to use pre-shared key authentication.B . Extended authentication (XAuth) was successful.C . Remoteis the host name of the remote IPsec peer.D...
Given the network diagram shown in the exhibit, which two static routes will satisfy this requirement on FGT1?
Refer to the exhibit. A firewall administrator must configure equal cost multipath (ECMP) routing on FGT1 to ensure both port1 and port3 links are used, at the same time, for all traffic destined for 172.20.2.0/24. Given the network diagram shown in the exhibit, which two static routes will satisfy this...