Which of the following will be highlighted based on the input criteria?
Refer to the exhibit. The exhibits show the firewall policies and the objects used in the firewall policies. The administrator is using the Policy Lookup feature and has entered the search criteria shown in the exhibit. Which of the following will be highlighted based on the input criteria?A . Policy...
Given the network diagram shown in the exhibit, which two static routes will satisfy this requirement on FGT1?
Refer to the exhibit. A firewall administrator must configure equal cost multipath (ECMP) routing on FGT1 to ensure both port1 and port3 links are used, at the same time, for all traffic destined for 172.20.2.0/24. Given the network diagram shown in the exhibit, which two static routes will satisfy this...
What can be the reasons for that?
An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.)A . The interface has been configured for one-arm snifferB . The interface is a member of a virtual wire pairC . The operation mode is transparent.D ....
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)A . Services defined in the firewall policy.B . Incoming and outgoing interfacesC . Highest to lowest priority defined in the firewall policy.D . Lowest to highest policy ID number.View AnswerAnswer: AB
Which of the following statements about NTLM authentication are correct? (Choose two.)
Which of the following statements about NTLM authentication are correct? (Choose two.)A . It is useful when users login to DCs that are not monitored by a collector agentB . It takes over as the primary authentication method when configured alongside FS SD . Multidomain environments require DC agents on...
Which condition must be met in order for a web browser to trust a web server certificate signed by a third-party CA?
Which condition must be met in order for a web browser to trust a web server certificate signed by a third-party CA?A . The private key of the CA certificate that is signed the browser certificate must be installed on the browser.B . The CA certificate that signed the web...
Which two statements about the output are correct?
Refer to the exhibit. The exhibit shows the output from a debug flow. Which two statements about the output are correct? (Choose two.)A . The packet was allowed by the firewall policy with the ID 00007fc0.B . The source IP address of the packet was translated to 10.0.1.10.C . FortiGate...
Which two options must be included in the FortiGate configuration to route and allow connections from the client workstation to the web server?
Refer to the exhibit. The exhibit shows network configurations. VDOM1 is operating in transparent mode. VDOM2 is operating in NAT mode. There is an inter-VDOM link between both VDOMs. A client workstation with the IP address 10.0.1.10/24is connected to port2. A web server with the IP address 10.200.1.2/24is connected to...
Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?
Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices?A . FG-traffic VDOMB . Root VDOMC . Customer VDOMD . Global VDOMView AnswerAnswer: B Explanation: Reference: https://docs.fortinet.com/document/fortigate/6.2.0/new-features/287377/split-task-vdom-support
Which step must the administrator take to successfully achieve this configuration?
An administrator needs to create an SSL-VPN connection for accessing an internal server using the bookmark, Port Forward. Which step must the administrator take to successfully achieve this configuration?A . Configure an SSL VPN realm for clients to use the Port Forward bookmark.B . Configure the client application to forward...