Which part of the policy configuration must you change to resolve the issue?
Refer to the exhibits. The exhibits show the SSL and authentication policy (Exhibit A) and the security policy (Exhibit B) for Facebook. Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other...
Given the routing database shown in the exhibit, which two statements are correct?
Refer to the exhibit. Given the routing database shown in the exhibit, which two statements are correct? (Choose two.)A . The port3 default route has the highest distance.B . The port3 default route has the lowest metric.C . There will be eight routes active in the routing table.D . The...
Which two protocol options are available on the CLI but not on the GUI when configuring an SD-WAN Performance SLA? (Choose two.)
Which two protocol options are available on the CLI but not on the GUI when configuring an SD-WAN Performance SLA? (Choose two.)A . DNSB . pingC . udp-echoD . TWAMPView AnswerAnswer: C,D
Which two statements are true?
Refer to the exhibit. The exhibit displays the output of the CLI command: diagnose sys ha dump-by vcluster. Which two statements are true? (Choose two.)A . FortiGate SN FGVM010000065036 HA uptime has been reset.B . FortiGate devices are not in sync because one device is down.C . FortiGate SN FGVM010000064692...
What is the effect of enabling auto-negotiate on the phase 2 configuration of an IPsec tunnel?
What is the effect of enabling auto-negotiate on the phase 2 configuration of an IPsec tunnel?A . FortiGate automatically negotiates different local and remote addresses with the remote peer.B . FortiGate automatically negotiates a new security association after the existing security association expires.C . FortiGate automatically negotiates different encryption and...
Which configuration option is the most effective way to support this request?
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not. Which configuration option is the most effective way to support this request?A . Implement a web filter category override for the specified websiteB . Implement...
When configuring a firewall virtual wire pair policy, which following statement is true?
When configuring a firewall virtual wire pair policy, which following statement is true?A . Any number of virtual wire pairs can be included, as long as the policy traffic direction is the same.B . Only a single virtual wire pair can be included in each policy.C . Any number of...
Which two statements about the debug flow output are correct?
Refer to the exhibit showing a debug flow output. Which two statements about the debug flow output are correct? (Choose two.)A . The debug flow is of ICMP traffic.B . A firewall policy allowed the connection.C . A new traffic session is created.D . The default route is required to...
In which two ways can RPF checking be disabled? (Choose two )
In which two ways can RPF checking be disabled? (Choose two )A . Enable anti-replay in firewall policy.B . Disable the RPF check at the FortiGate interface level for the source checkC . Enable asymmetric routing.D . Disable strict-arc-check under system settings.View AnswerAnswer: B D
In an explicit proxy setup, where is the authentication method and database configured?
In an explicit proxy setup, where is the authentication method and database configured?A . Proxy PolicyB . Authentication RuleC . Firewall PolicyD . Authentication schemeView AnswerAnswer: B