Which of the following will be highlighted based on the input criteria?

Refer to the exhibit. The exhibits show the firewall policies and the objects used in the firewall policies. The administrator is using the Policy Lookup feature and has entered the search criteria shown in the exhibit. Which of the following will be highlighted based on the input criteria?A . Policy...

December 16, 2020 No Comments READ MORE +

Given the network diagram shown in the exhibit, which two static routes will satisfy this requirement on FGT1?

Refer to the exhibit. A firewall administrator must configure equal cost multipath (ECMP) routing on FGT1 to ensure both port1 and port3 links are used, at the same time, for all traffic destined for 172.20.2.0/24. Given the network diagram shown in the exhibit, which two static routes will satisfy this...

December 16, 2020 No Comments READ MORE +

What can be the reasons for that?

An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.)A . The interface has been configured for one-arm snifferB . The interface is a member of a virtual wire pairC . The operation mode is transparent.D ....

December 16, 2020 No Comments READ MORE +

What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)

What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)A . Services defined in the firewall policy.B . Incoming and outgoing interfacesC . Highest to lowest priority defined in the firewall policy.D . Lowest to highest policy ID number.View AnswerAnswer: AB

December 15, 2020 No Comments READ MORE +

Which of the following statements about NTLM authentication are correct? (Choose two.)

Which of the following statements about NTLM authentication are correct? (Choose two.)A . It is useful when users login to DCs that are not monitored by a collector agentB . It takes over as the primary authentication method when configured alongside FS SD . Multidomain environments require DC agents on...

December 15, 2020 No Comments READ MORE +

Which condition must be met in order for a web browser to trust a web server certificate signed by a third-party CA?

Which condition must be met in order for a web browser to trust a web server certificate signed by a third-party CA?A . The private key of the CA certificate that is signed the browser certificate must be installed on the browser.B . The CA certificate that signed the web...

December 15, 2020 No Comments READ MORE +

Which two statements about the output are correct?

Refer to the exhibit. The exhibit shows the output from a debug flow. Which two statements about the output are correct? (Choose two.)A . The packet was allowed by the firewall policy with the ID 00007fc0.B . The source IP address of the packet was translated to 10.0.1.10.C . FortiGate...

December 15, 2020 No Comments READ MORE +

Which two options must be included in the FortiGate configuration to route and allow connections from the client workstation to the web server?

Refer to the exhibit. The exhibit shows network configurations. VDOM1 is operating in transparent mode. VDOM2 is operating in NAT mode. There is an inter-VDOM link between both VDOMs. A client workstation with the IP address 10.0.1.10/24is connected to port2. A web server with the IP address 10.200.1.2/24is connected to...

December 15, 2020 No Comments READ MORE +

Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?

Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?A . FG-traffic VDOMB . Root VDOMC . Customer VDOMD . Global VDOMView AnswerAnswer: B Explanation: Reference: https://docs.fortinet.com/document/fortigate/6.2.0/new-features/287377/split-task-vdom-support

December 14, 2020 No Comments READ MORE +

Which step must the administrator take to successfully achieve this configuration?

An administrator needs to create an SSL-VPN connection for accessing an internal server using the bookmark, Port Forward. Which step must the administrator take to successfully achieve this configuration?A . Configure an SSL VPN realm for clients to use the Port Forward bookmark.B . Configure the client application to forward...

December 14, 2020 No Comments READ MORE +