How can you block or allow to Twitter using a firewall policy?
How can you block or allow to Twitter using a firewall policy?A . Configure the Destination field as Internet Service objects for Twitter.B . Configure the Action field as Learn and select Twitter.C . Configure the Service field as Internet Service objects for Twitter.D . Configure the Source field as...
In a high availability (HA) cluster operating in active-active mode, which of the following correctly describes the path taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?
In a high availability (HA) cluster operating in active-active mode, which of the following correctly describes the path taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?A . Client > primary FortiGate> secondary FortiGate> primary FortiGate> web server.B . Client > secondary FortiGate>...
When configuring the root FortiGate to communicate with a downstream FortiGate, which settings are required to be configured?
You are configuring the root FortiGate to implement the security fabric. You are configuring port10 to communicate with a downstream FortiGate. V iew the default Edit Interface in the exhibit below: When configuring the root FortiGate to communicate with a downstream FortiGate, which settings are required to be configured? (Choose...
What information is flushed when the chunk-size value is changed in the config dlp settings?
What information is flushed when the chunk-size value is changed in the config dlp settings?A . The database for DLP document fingerprintingB . The supported file types in the DLP filtersC . The archived files and messagesD . The file name patterns in the DLP filtersView AnswerAnswer: A Explanation: https://help.fortinet.com/cli/fos50hlp/56/Content/FortiOS/fortiOS-cli-ref-56/config/dlp/settings.htm
Which topology should be used to satisfy all of the requirements?
You have tasked to design a new IPsec deployment with the following criteria: Which topology should be used to satisfy all of the requirements?A . Partial meshB . Hub-and-spokeC . Fully meshedD . RedundantView AnswerAnswer: B
Which action can be applied to each filter in the application control profile?
Which action can be applied to each filter in the application control profile?A . Block, monitor, warning, and quarantineB . Allow, monitor, block and learnC . Allow, block, authenticate, and warningD . Allow, monitor, block, and quarantineView AnswerAnswer: D
Based on this output, which statements are correct?
View the exhibit. Based on this output, which statements are correct? (Choose two.)A . The all VDOM is not synchronized between the primary and secondary FortiGate devices.B . The root VDOM is not synchronized between the primary and secondary FortiGate devices.C . The global configuration is synchronized between the primary...
Which statements about antivirus scanning mode are true? (Choose two.)
Which statements about antivirus scanning mode are true? (Choose two.)A . In proxy-based inspection mode antivirus buffers the whole file for scarring before sending it to the client.B . In flow-based inspection mode, you can use the CLI to configure antivirus profiles to use protocol option profiles.C . In proxy-based...
Which of the following route attributes must be equal for static routes to be eligible for equal cost multipath (ECMP) routing? (Choose two.)
Which of the following route attributes must be equal for static routes to be eligible for equal cost multipath (ECMP) routing? (Choose two.)A . PriorityB . MetricC . DistanceD . CostView AnswerAnswer: A C
Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)
Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)A . Log downloads from the GUI are limited to the current filter viewB . Log backups from the CLI cannot be restored to another FortiGate.C . Log backups...