Where must the proxy address be used?
An administrator wants to block HTTP uploads Examine the exhibit, which contains the proxy address created for that purpose. Where must the proxy address be used?A . As the source in a firewall policyB . As the source in a proxy policyC . As the destination in a firewall policyD...
What does this raw log indicate?
View the exhibit. What does this raw log indicate? (Choose two.)A . FortiGate blocked the trafficB . type indicates that a security event was recordedC . 10.0.1.20 is the IP address for lavito tk.D . policyid indicates that traffic went through the IPS firewall policyView AnswerAnswer: AB
Which of the following will be highlighted based on the input criteria?
Refer to the exhibit. The exhibits show the firewall policies and the objects used in the firewall policies. The administrator is using the Policy Lookup feature and has entered the search criteria shown in the exhibit. Which of the following will be highlighted based on the input criteria?A . Policy...
Which of the following statements about policy-based IPsec tunnels are true? (Choose two. )
Which of the following statements about policy-based IPsec tunnels are true? (Choose two. )A . They can be configured in both NAT/Route and transparent operation modes.B . They support L2TP-over-IPsec.C . They require two firewall policies, one for each directions of traffic flow.D . They support GRE-over-IPsec.View AnswerAnswer: AB
Which of the following conditions are required for establishing an IP Sec VPN between two FortiGate devices? (Choose two)
Which of the following conditions are required for establishing an IP Sec VPN between two FortiGate devices? (Choose two)A . If XAuth is enabled as a server in one peer, it must be enabled as a client in the other peerB . If the VPN is configured as route-based, there...
What is a possible reason for this?
Examine the IPS sensor configuration shown in the exhibit, and then answer the question below. An administrator has configured the WinDOS_SERVERS IPS sensor in an attempt to determine whether the influx of HTTPS traffic is an attack attempt or not. After applying the IPS sensor, FortiGate is still not generating...
Which users and user groups are allowed access to the network through captive portal?
Which users and user groups are allowed access to the network through captive portal? A . Users and groups defined in the firewall policy.B . Only individual users - not groups - defined in the captive portal configurationC . Groups defined in the captive portal configurationD . All usersView AnswerAnswer:...
Which of the following SD-WAN-load balancing method use interface weight value to distribute traffic?
Which of the following SD-WAN-load balancing method use interface weight value to distribute traffic?A . Source IPB . SpilloverC . VolumeD . SessionView AnswerAnswer: C,D
Based on this output, which statements are correct? (Choose two.)
Based on this output, which statements are correct? (Choose two.) A . The all V DOM is not synchronized between the primary and secondary FortiGate devicesB . The root V DOM is not synchronized between the primary and secondary FortiGate devicesC . The global configuration is synchronized between the primary...
Which is the correct description of a hash result as it relates to digital certificates?
Which is the correct description of a hash result as it relates to digital certificates?A . A unique value used to verify the input data.B . An output value that is used to identify the person or deduce that authored the input data.C . An obfuscation used to mask the...