How can you block or allow to Twitter using a firewall policy?

How can you block or allow to Twitter using a firewall policy?A . Configure the Destination field as Internet Service objects for Twitter.B . Configure the Action field as Learn and select Twitter.C . Configure the Service field as Internet Service objects for Twitter.D . Configure the Source field as...

July 24, 2020 No Comments READ MORE +

A user behind the FortiGate is trying to go to http://www.addictinggames.com (Addicting Games). Based on this configuration, which statement is true?

View the exhibit. A user behind the FortiGate is trying to go to http://www.addictinggames.com (Addicting Games). Based on this configuration, which statement is true?A . Addicting.Games is allowed based on the Application Overrides configuration.B . Addicting.Games is blocked on the Filter Overrides configuration.C . Addicting.Games can be allowed only if...

July 24, 2020 No Comments READ MORE +

Which of the following statements are best practices to do so?

An administrator needs to strengthen the security for SSL VPN access. Which of the following statements are best practices to do so? (Choose three.)A . Configure split tunneling for content inspection.B . Configure host restrictions by IP or MAC address.C . Configure two-factor authentication using security certificates.D . Configure SSL...

July 24, 2020 No Comments READ MORE +

Which of the following statements are best practices to do so?

An administrator needs to strengthen the security for SSL VPN access. Which of the following statements are best practices to do so? (Choose three.)A . Configure split tunneling for content inspection.B . Configure host restrictions by IP or MAC address.C . Configure two-factor authentication using security certificates.D . Configure SSL...

July 24, 2020 No Comments READ MORE +

The CA issued this certificate to which entity?

View the certificate shown to the exhibit, and then answer the following question: The CA issued this certificate to which entity?A . A root CAB . A personC . A bridge CAD . A subordinate CAView AnswerAnswer: A

July 23, 2020 No Comments READ MORE +

Which of the following statements about virtual domains (VDOMs) are true? (Choose two.)

Which of the following statements about virtual domains (VDOMs) are true? (Choose two.)A . The root VDOM is the management VDOM by default.B . A FortiGate device has 64 VDOMs, created by default.C . Each VDOM maintains its own system time.D . Each VDOM maintains its own routing table.View AnswerAnswer:...

July 23, 2020 No Comments READ MORE +

When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first?

Examine the IPS sensor and DoS policy configuration shown in the exhibit, then answer the question below. When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first?A . SMTB . Login.Brute.ForceC . IMAD . Login.brute.ForceE . ip_src_sessionF . Location: server Protocol: SMTPView AnswerAnswer: C

July 23, 2020 No Comments READ MORE +

Which action can be applied to each filter in the application control profile?

Which action can be applied to each filter in the application control profile?A . Block, monitor, warning, and quarantineB . Allow, monitor, block and learnC . Allow, block, authenticate, and warningD . Allow, monitor, block, and quarantineView AnswerAnswer: D

July 23, 2020 No Comments READ MORE +

What files are sent to FortiSandbox for inspection in flow-based inspection mode?

What files are sent to FortiSandbox for inspection in flow-based inspection mode?A . All suspicious files that do not have their hash value in the FortiGuard antivirus signature database.B . All suspicious files that are above the defined oversize limit value in the protocol options.C . All suspicious files that...

July 23, 2020 No Comments READ MORE +

When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first?

Examine the IPS sensor and DoS policy configuration shown in the exhibit, then answer the question below. When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first?A . SMTB . Login.Brute.ForceC . IMAD . Login.brute.ForceE . ip_src_sessionF . Location: server Protocol: SMTPView AnswerAnswer: B

July 23, 2020 No Comments READ MORE +