If the issuer and Subject values are the same in a digital certificate, which type of entity was the certificate issued to?
If the issuer and Subject values are the same in a digital certificate, which type of entity was the certificate issued to?A . A CRLB . A personC . A subordinate CAD . A root CAView AnswerAnswer: D
How can you block or allow to Twitter using a firewall policy?
How can you block or allow to Twitter using a firewall policy?A . Configure the Destination field as Internet Service objects for TwitterB . Configure the Action field as Learn and select Twitter.C . Configure the Service field as Internet Service objects for TwitterD . Configure the source field as...
Which of the following services can be inspected by the DLP profile? (Choose three.)
Which of the following services can be inspected by the DLP profile? (Choose three.)A . NFSB . FTPC . IMAPD . CIFSE . HTTP-POSTView AnswerAnswer: BCE
How does FortiGate select the central SNAT policy that is applied to a TCP session?
How does FortiGate select the central SNAT policy that is applied to a TCP session?A . It selects the SNAT policy specified in the configuration of the outgoing interface ,B . It selects the first matching central SNAT policy, reviewing from top to bottom.C . It selects the central SNAT...
Which of the following statements are best practices to do so?
An administrator needs to strengthen the security for SSL VPN access. Which of the following statements are best practices to do so? (Choose three)A . Configure split tunneling for content inspection.B . Configure host restrictions by IP or MAC address.C . Configure two-factor authentication using security certificatesD . Configure SSL...
Which of the following is the expected FortiGate behavior regarding these two routes to the same destination?
Examine the two static routes shown in the exhibit, then answer the following question Which of the following is the expected FortiGate behavior regarding these two routes to the same destination?A . FortiGate will load balance all traffic across both routes.B . FortiGate will use the port1 route as the...
Which of the following statements are correct?
View the exhibit. Which of the following statements are correct? (Choose two.)A . This setup requires at least two firewall policies with the action set to lPsec.B . Dead peer detection must be disabled to support this type of IPsec setup.C . The Tunnel route is the primary route for...
Based on the configuration shown in the exhibit, what statements about application control behavior are true?
View the exhibit: Based on the configuration shown in the exhibit, what statements about application control behavior are true? (Choose two)A . Access to all unknown applications will be allowedB . Access to browser based Social.Media applications will be blockedC . Access to mobile social media applications will be blockedD...
An administrator is attempting to allow access to https://fortinet. com through a firewall policy that is configured with a webfilter and an SSL inspection profile configured for deep inspection which of the following are possible actions to eliminate the certificate error generated by deep inspection? (Choose Two)
An administrator is attempting to allow access to https://fortinet. com through a firewall policy that is configured with a webfilter and an SSL inspection profile configured for deep inspection which of the following are possible actions to eliminate the certificate error generated by deep inspection? (Choose Two)A . Implement firewall...
What information is flushed when the chunk-size value is changed in the config dip settings?
What information is flushed when the chunk-size value is changed in the config dip settings?A . The database for DLP document fingerprintingB . The supported file types in the DLP filtersC . The archived files and messagesD . The file name patterns in the DLP filtersView AnswerAnswer: A