To complete the final step of a Security Fabric configuration, an administrator must authorize all the devices on which device?
To complete the final step of a Security Fabric configuration, an administrator must authorize all the devices on which device?A . FortiManagerB . Root FortiGateC . FortiAnalyzerD . Downstream FortiGateView AnswerAnswer: C Explanation: The correct answer is C. FortiAnalyzer. Explanation: In a Security Fabric configuration, after the devices are added...
Which three statements explain a flow-based antivirus profile? (Choose three.)
Which three statements explain a flow-based antivirus profile? (Choose three.) A. Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection. B. If a virus is detected, the last packet is delivered to the client. C. The IPS engine handles the process as a standalone. D. FortiGate...
Which two static routes are required in the FortiGate configuration, to route traffic between both subnets through an inter-VDOM link?
View the exhibit. Both VDOMs are operating in NAT/route mode. The subnet 10.0.1.0/24 is connected to VDOM1. The subnet 10.0.2.0/24 is connected to VDOM2. There is an inter-VDOM link between VDOM1 and VDOM2. Also, necessary firewall policies are configured in VDOM1 and VDOM2. Which two static routes are required in...
Which two statements about SSL VPN between two FortiGate devices are true? (Choose two.)
Which two statements about SSL VPN between two FortiGate devices are true? (Choose two.) A. The client FortiGate requires a client certificate signed by the CA on the server FortiGate. B. The client FortiGate requires a manually added route to remote subnets. C. The client FortiGate uses the SSL VPN...
What is the common feature shared between IPv4 and SD-WAN ECMP algorithms?
What is the common feature shared between IPv4 and SD-WAN ECMP algorithms?A . Both can be enabled at the same time.B . Both support volume algorithms.C . Both control ECMP algorithms.D . Both use the same physical interface load balancing settings.View AnswerAnswer: C Explanation: The correct answer is: C. Both...
Which two statements about the application control profile mode are true? (Choose two.)
Which two statements about the application control profile mode are true? (Choose two.) A. It uses flow-based scanning techniques, regardless of the inspection mode used. B. It cannot be used in conjunction with IPS scanning. C. It can be selected in either flow-based or proxy-based firewall policy. D. It can...