Which of the following statements about NTLM authentication are correct? (Choose two.)
Which of the following statements about NTLM authentication are correct? (Choose two.)A . It is useful when users login to DCs that are not monitored by a collector agentB . It takes over as the primary authentication method when configured alongside FS SD . Multidomain environments require DC agents on...
When detecting attacks, which anomaly, signature, or filter wil FortiGate evaluate first?
Examine the IPS sensor and DoS policy configuration shown in the exhibit, then answer the question below. When detecting attacks, which anomaly, signature, or filter wil FortiGate evaluate first?A . SMTB . Login.Brute ForceC . IMAD . Login.brute.ForceE . ip_src_sessionF . Location: server Protocol: SMTPView AnswerAnswer: B
An administrator wants to create a policy-based IPsec VPN tunnel between two FortiGate devices which configuration steps must be performed on both devices to support this scenario? (Choose three)
An administrator wants to create a policy-based IPsec VPN tunnel between two FortiGate devices which configuration steps must be performed on both devices to support this scenario? (Choose three)A . Define the phase 1 parameters, without enabling IPsec interface modeB . Define the phase 2 parametersC . Set the phase...
The FSSO Collector Agent set to advanced access mode for the Windows Active Directory uses which of the following?
The FSSO Collector Agent set to advanced access mode for the Windows Active Directory uses which of the following?A . LDAP conventionB . NTLM conventionC . Windows convention - NetBiosUsernameD . RSSO conventionView AnswerAnswer: A
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?A . remote user's public IPaddressB . The public IP address of the FortiGate device.C . The remote user's virtual lP address.D . The internal IP...
Which configuration objects can be selected for the Source field of a firewall policy? (Choose two.)
Which configuration objects can be selected for the Source field of a firewall policy? (Choose two.)A . Firewall serviceB . User or user groupC . IP PoolD . FQDN addressView AnswerAnswer: BC
Which users and user groups are allowed access to the network through captive portal?
Which users and user groups are allowed access to the network through captive portal? A . Users and groups defined in the firewall policy.B . Only individual users - not groups - defined in the captive portal configurationC . Groups defined in the captive portal configurationD . All usersView AnswerAnswer:...
What is required in the SSL VPN configuration to meet these requirements?
A company needs to provide SSL VPN access to two user groups. The company also needs to display different welcome messages on the SSL VPN login screen for both user groups. What is required in the SSL VPN configuration to meet these requirements?A . Different SSL VPN realms for each...
How does FortiGate select the central SNAT policy that is applied to a TCP session?
How does FortiGate select the central SNAT policy that is applied to a TCP session?A . It selects the SNAT policy specified in the configuration of the outgoing interface ,B . It selects the first matching central SNAT policy, reviewing from top to bottom.C . It selects the central SNAT...
What is the cause of the problem?
An administrator has configured two VLAN interfaces : A DHCP server is connected to the VLAN 10 interface , A DHCP Client is connected to the VLAN5 interface. However , the DHCP client cannot get a dynamic IP address from the DHCP server. What is the cause of the problem?A...