Which statements about the exhibit are true?
View the exhibit. Which statements about the exhibit are true? (Choose two.)A . port1-VLAN10 and port2-VLAN10 can be assigned to different VDOMs.B . port1-VLAN1 is the native VLAN for the port1 physical interface.C . Traffic between port1-VLAN1 and port2-VLAN1 is allowed by default.D . Broadcast traffic received in port1-VLAN10 will...
When a user attempts to connect to an HTTPS site, what is the expected result with this configuration?
View the exhibit. When a user attempts to connect to an HTTPS site, what is the expected result with this configuration?A . The user is required to authenticate before accessing sites with untrusted SSL certificates.B . The user is presented with certificate warnings when connecting to sites that have untrusted...
An administrator needs to offload logging to FortiAnalyzer from a FortiGate with an internal hard drive. Which statements are true? (Choose two.)
An administrator needs to offload logging to FortiAnalyzer from a FortiGate with an internal hard drive. Which statements are true? (Choose two.)A . Logs must be stored on FortiGate first, before transmitting to FortiAnalyzerB . FortiGate uses port 8080 for log transmissionC . Log messages are transmitted as plain text...
How to configure Collector agent settings?
How to configure Collector agent settings?A . The dead entry timeout interval is used to age out entries with an unverified status.B . The workstation verify interval is used to periodically check if a workstation is still a domain member.C . The user group cache expiry is used to age...
Which statements about FortiGate inspection modes are true? (Choose two.)
Which statements about FortiGate inspection modes are true? (Choose two.)A . The default inspection mode is proxy based.B . Switching from proxy-based mode to flow-based, then back to proxy-based mode, will not result in the original configuration.C . Proxy-based inspection is not available in VDOMs operating in transparent mode.D ....
Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)A . Trusted hostB . HTTPSC . Trusted authenticationD . SSHE . FortiTelemetryView AnswerAnswer: A,B,D
Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)
Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)A . They support GRE-over-IPsec.B . They can be configured in both NAT/Route and transparent operation modes.C . They require two firewall policies: one for each direction of traffic flow.D . They support L2TP-over-IPsec.View AnswerAnswer: B,C
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)A . It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.B . ADVPN is only supported with IKEv2.C . Tunnels are negotiated dynamically between spokes.D . Every spoke requires a static tunnel...
Which traffic sessions can be offloaded to a NP6 processor? (Choose two.)
Which traffic sessions can be offloaded to a NP6 processor? (Choose two.)A . IPv6B . RIPC . GRED . NAT64View AnswerAnswer: A,D
An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to SSL VPN. How can this be achieved?
An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to SSL VPN. How can this be achieved?A . Disabling split tunnelingB . Configuring web bookmarksC . Assigning public IP addresses to SSL VPN clientsD . Using web-only modeView AnswerAnswer: A