What three FortiGate components are tested during the hardware test? (Choose three.)
What three FortiGate components are tested during the hardware test? (Choose three.)A . CPUB . Administrative accessC . HA heartbeatD . Hard diskE . Network interfacesView AnswerAnswer: ADE
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server?
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server?A . srv_proxy.<local-domain>/wpad.datB . srv_tcp.wpad.<local-domain>C . wpad.<local-domain>D . proxy.<local-domain>.wpadView AnswerAnswer: C
When configuring the root FortiGate to communicate with a downstream FortiGate, which two settings must you configure?
Refer to the exhibit. You are configuring the root FortiGate to implement the Security Fabric. You are configuring port10 to communicate with a downstream FortiGate. The exhibit shows the default Edit Interface. When configuring the root FortiGate to communicate with a downstream FortiGate, which two settings must you configure? (Choose...
Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?
Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?A . FG-traffic VDOMB . Root VDOMC . Customer VDOMD . Global VDOMView AnswerAnswer: B Explanation: Reference: https://docs.fortinet.com/document/fortigate/6.2.0/new-features/287377/split-task-vdom-support
Which DNS method must you use?
An administrator wants to configure a FortiGate as a DNS server. FotiGate must use a DNS database first, and then relay all irresolvable queries to an external DNS server. Which DNS method must you use?A . RecursiveB . Non-recursiveC . Forward to primary and secondary DNSD . Forward to system...
Which configuration option is the most effective way to support this request?
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not. Which configuration option is the most effective way to support this request?A . Implement web filter authentication for the specified website.B . Implement a web...
Which topology should you use to satisfy all of the requirements?
Consider a new IPsec deployment with the following criteria: - All satellite offices must connect to the two HQ sites. - The satellite offices do not need to communicate directly with other satellite offices. - Backup VPN is not required. - The design should minimize the number of tunnels being...
Which step must the administrator take to successfully achieve this configuration?
An administrator needs to create an SSL-VPN connection for accessing an internal server using the bookmark, Port Forward. Which step must the administrator take to successfully achieve this configuration?A . Configure an SSL VPN realm for clients to use the Port Forward bookmark.B . Configure the client application to forward...
Why is the site www.bing.com being blocked?
Examine the exhibit, which shows the output of a web filtering real time debug. Why is the site www.bing.com being blocked?A . The web site www.bing.comis categorized by FortiGuard as Malicious Websites.B . The user has not authenticated with the FortiGate yet.C . The web server IP address 204.79.197.200is categorized...
Which two statements about virtual domains (VDOMs) are true? (Choose two.)
Which two statements about virtual domains (VDOMs) are true? (Choose two.)A . Transparent mode and NAT mode VDOMs cannot be combined on the same FortiGate.B . Each VDOM can be configured with different system hostnames.C . Different VLAN subinterfaces of the same physical interface can be assigned to different VDOMs.D...