What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?

What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?A . It limits the scope of application control to the browser-based technology category onlyB . It limits the scope of application control to scan application traffic based on application...

December 3, 2020 No Comments READ MORE +

Which topology should you use to satisfy all of the requirements?

Consider a new IPsec deployment with the following criteria: - All satellite offices must connect to the two HQ sites. - The satellite offices do not need to communicate directly with other satellite offices. - Backup VPN is not required. - The design should minimize the number of tunnels being...

December 3, 2020 No Comments READ MORE +

By default, when logging to disk, when does FortiGate delete logs?

By default, when logging to disk, when does FortiGate delete logs?A . 30 daysB . 1 yearC . NeverD . 7 daysView AnswerAnswer: D

December 3, 2020 No Comments READ MORE +

Which statement best describes what occurs during this scenario?

An administrator has configured a dialup IPsec VPN with XAuth. Which statement best describes what occurs during this scenario?A . Phase 1 negotiations will skip preshared key exchange.B . Only digital certificates will be accepted as an authentication method in phase 1.C . Dialup clients must provide a username and...

December 3, 2020 No Comments READ MORE +

Which of the following statements about policy-based IPsec tunnels are true? (Choose two. )

Which of the following statements about policy-based IPsec tunnels are true? (Choose two. )A . They can be configured in both NAT/Route and transparent operation modes.B . They support L2TP-over-IPsec.C . They require two firewall policies, one for each directions of traffic flow.D . They support GRE-over-IPsec.View AnswerAnswer: AB

December 2, 2020 No Comments READ MORE +

How does FortiGate verify the login credentials of a remote LDAP user?

How does FortiGate verify the login credentials of a remote LDAP user?A . FortiGate regenerates the algorithm based on the login credentials and compares it to the algorithm stored on the LDAP serverB . FortiGate sends the user-entered credentials to the LDAP server for authenticationC . FortiGate queries the LDAP...

December 2, 2020 No Comments READ MORE +

Based on the input criteria, which of the following will be highlighted?

Refer to the exhibit. The exhibits show the firewall policies and the objects used in the firewall policies. The administrator is using the Policy Lookup feature and has entered the search criteria shown in the exhibit. Based on the input criteria, which of the following will be highlighted?A . The...

December 2, 2020 No Comments READ MORE +

Which DNS method must you use?

An administrator wants to configure a FortiGate as a DNS server. FotiGate must use a DNS database first, and then relay all irresolvable queries to an external DNS server. Which DNS method must you use?A . RecursiveB . Non-recursiveC . Forward to primary and secondary DNSD . Forward to system...

December 2, 2020 No Comments READ MORE +

Which two FortiGate configuration tasks will create a route in the policy route table? (Choose two.)

Which two FortiGate configuration tasks will create a route in the policy route table? (Choose two.)A . Creating an SD-WAN route for individual member interfacesB . Creating an SD-WAN rule to route traffic based on link latencyC . Creating a static route with a named address objectD . Creating a...

December 2, 2020 No Comments READ MORE +

In this scenario, which statement about the VLAN IDs is true?

A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) subinterfaces added to the physical interface. In this scenario, which statement about the VLAN IDs is true?A . The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in...

December 1, 2020 No Comments READ MORE +