Which of the following correctly describes the cause for the dropped packets?
Examine the exhibit below; then answer the question following it. In this scenario. The FortiGate unit in Ottawa has the following routing table: s* 0.0.0.0/0 [10/0] via 172.20.170.254, port2 c 172.20.167.0/24 is directly connected, port1 c 172.20.170.0/24 is directly connected, port2 Sniffer tests show that packets sent from the source...
In which order are firewall policies processed on a FortiGate unit?
In which order are firewall policies processed on a FortiGate unit?A . From top to bottom, according with their sequence number. B. From top to bottom, according with their policy ID number. C. Based on best match. D. Based on the priority value.View AnswerAnswer: A
Regarding the use of web-only mode SSL VPN, which statement is correct?
Regarding the use of web-only mode SSL VPN, which statement is correct?A . It support SSL version 3 only. B. It requires a Fortinet-supplied plug-in on the web client. C. It requires the user to have a web browser that suppports 64-bit cipher length. D. The JAVA run-time environment must...
When an administrator attempts to manage FortiGate from an IP address that is not a trusted host, what happens?
When an administrator attempts to manage FortiGate from an IP address that is not a trusted host, what happens?A . FortiGate will still subject that person's traffic to firewall policies; it will not bypass them. B. FortiGate will drop the packets and not respond. C. FortiGate responds with a block...
Data leak prevention archiving gives the ability to store files and message data onto a FortiAnalyzer unit for which of the following types of network traffic? (Choose three.)
Data leak prevention archiving gives the ability to store files and message data onto a FortiAnalyzer unit for which of the following types of network traffic? (Choose three.)A . POP3 B. SNMP C. IPsec D. SMTP E. HTTPView AnswerAnswer: ADE
What is valid reason for using session based authentication instead of IP based authentication in a FortiGate web proxy solution?
What is valid reason for using session based authentication instead of IP based authentication in a FortiGate web proxy solution?A . Users are required to manually enter their credentials each time they connect to a different web site. B. Proxy users are authenticated via FSSO. C. There are multiple users...
Which two methods are supported by the web proxy auto-discovery protocol (WPAD) to automatically learn the URL where a PAC file is located? (Choose two.)
Which two methods are supported by the web proxy auto-discovery protocol (WPAD) to automatically learn the URL where a PAC file is located? (Choose two.)A . DHCP B. BOOTP C. DNS D. IPv6 autoconfiguration.View AnswerAnswer: AC
Which UTM feature sends a UDP query to FortiGuard servers each time FortiGate scans a packet (unless the response is locally cached)?
Which UTM feature sends a UDP query to FortiGuard servers each time FortiGate scans a packet (unless the response is locally cached)?A . Antivirus B. VPN C. IPS D. Web FilteringView AnswerAnswer: D
When the first host sends a DHCP request, what IP will the DHCP offer?
You have configured the DHCP server on a FortiGate's port1 interface (or internal, depending on the model) to offer IPs in a range of 192.168.1.65-192.168.1.253. When the first host sends a DHCP request, what IP will the DHCP offer?A . 192.168.1.99 B. 192.168.1.253 C. 192.168.1.65 D. 192.168.1.66View AnswerAnswer: C
Can you restore it to a FortiWiFi 60D?
A backup file begins with this line: #config-version=FGVM64-5.02-FW-build589-140613: opmode=0: vdom=0:user=admin #conf_file_ver=3881503152630288414 #buildno=0589 #global_vdom=1 Can you restore it to a FortiWiFi 60D?A . Yes B. Yes, but only if you replace the "#conf_file_ver" line so that it contains the serial number of that specific FortiWiFi 60D. C. Yes, but only if...