Which of the following SD-WAN-load balancing method use interface weight value to distribute traffic?
Which of the following SD-WAN-load balancing method use interface weight value to distribute traffic?A . Source IPB . SpilloverC . VolumeD . SessionView AnswerAnswer: C,D
Which of the following is the expected FortiGate behavior regarding these two routes to the same destination?
Examine the two static routes shown in the exhibit, then answer the following question Which of the following is the expected FortiGate behavior regarding these two routes to the same destination?A . FortiGate will load balance all traffic across both routes.B . FortiGate will use the port1 route as the...
When configuring the root FortiGate to communicate with a downstream FortiGate, which two settings must you configure?
Refer to the exhibit. You are configuring the root FortiGate to implement the Security Fabric. You are configuring port10 to communicate with a downstream FortiGate. The exhibit shows the default Edit Interface. When configuring the root FortiGate to communicate with a downstream FortiGate, which two settings must you configure? (Choose...
Where must the proxy address be used?
An administrator wants to block HTTP uploads Examine the exhibit, which contains the proxy address created for that purpose. Where must the proxy address be used?A . As the source in a firewall policyB . As the source in a proxy policyC . As the destination in a firewall policyD...
In an HA cluster operating in active-active mode, which path is taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?
In an HA cluster operating in active-active mode, which path is taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?A . Client > secondary FortiGate > primary FortiGate > web serverB . Client > primary FortiGate > secondary FortiGate > primary FortiGate >...
Which of the following statement about the output is true?
Examine the exhibit, which shows the partial output of an IKE real-time debug. Which of the following statement about the output is true?A . The VPN is configured to use pre-shared key authentication.B . Extended authentication (XAuth) was successfulC . Remote is the host name of the remote lPsec peer.D...
Why is the administrator getting the error shown in the exhibit?
Why is the administrator getting the error shown in the exhibit? A . The administrator must first enter the command edit globalB . The administrator admin does not have the privileges required to configure global settings.C . The global settings cannot be configured from the root VDOM context.D . The...
Which of the following conditions are required for establishing an IP Sec VPN between two FortiGate devices? (Choose two)
Which of the following conditions are required for establishing an IP Sec VPN between two FortiGate devices? (Choose two)A . If XAuth is enabled as a server in one peer, it must be enabled as a client in the other peerB . If the VPN is configured as route-based, there...
Which two statements about NTLM authentication are correct? (Choose two.)
Which two statements about NTLM authentication are correct? (Choose two.)A . It requires DC agents on every domain controller when used in multidomain environments.B . It is useful when users log in to DCs that are not monitored by a collector agent.C . It requires NTLM-enabled web browsers.D . It...
Given the network diagram shown in the exhibit, which route is the best candidate route for FGT1 to route traffic from the workstation to the webserver?
Refer to the exhibit. Given the network diagram shown in the exhibit, which route is the best candidate route for FGT1 to route traffic from the workstation to the webserver?A . 172.16.32.0/24 is directly connected, port1B . 172.16.0.0/16 [50/0] via 10.4.200.2, port2 [5/0]C . 10.4.200.0/30 is directly connected, port2D ....