What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)

What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)A . Traffic to botnetserversB . Traffic to inappropriate web sitesC . Server information disclosure attacksD . Credit card data leaksE . SQL injection attacksView AnswerAnswer: A,C,E

March 21, 2021 No Comments READ MORE +

Based on the administrator profile settings, what permissions must the administrator set to run the diagnose firewall auth list CLI command on FortiGate?

Refer to the exhibit. Based on the administrator profile settings, what permissions must the administrator set to run the diagnose firewall auth list CLI command on FortiGate?A . Custom permission for NetworkB . Read/Write permission for Log & ReportC . CLI diagnostics commands permissionD . Read/Write permission for FirewallView AnswerAnswer:...

March 21, 2021 No Comments READ MORE +

Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)

Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)A . Log downloads from the GUI are limited to the current filter viewB . Log backups from the CLI cannot be restored to another FortiGate.C . Log backups...

March 21, 2021 No Comments READ MORE +

Which scanning technique on FortiGate can be enabled only on the CLI?

Which scanning technique on FortiGate can be enabled only on the CLI?A . Heuristics scanB . Trojan scanC . Antivirus scanD . Ransomware scanView AnswerAnswer: C Explanation: Reference: https://docs.fortinet.com/document/fortigate/6.0.0/handbook/567568/enabling-scanning

March 21, 2021 2 Comments READ MORE +

Based on the raw logs shown in the exhibit, which statement is correct?

Refer to the web filter raw logs. Based on the raw logs shown in the exhibit, which statement is correct?A . Social networking web filter category is configured with the action set to authenticate.B . The action on firewall policy ID 1 is set to warning.C . Access to the...

March 21, 2021 No Comments READ MORE +

Which three pieces of Information will be Included in me sniffer output?

An administrator is running the following sniffer command: diagnose aniffer packer any "host 192.168.2.12" 5 Which three pieces of Information will be Included in me sniffer output? {Choose three.)A . Interface nameB . Packet payloadC . Ethernet headerD . IP headerE . Application headerView AnswerAnswer: B,C,E

March 20, 2021 No Comments READ MORE +

Which CLI command will display sessions both from client to the proxy and from the proxy to the servers?

Which CLI command will display sessions both from client to the proxy and from the proxy to the servers?A . diagnose wad session listB . diagnose wad session list | grep hook-pre&&hook-outC . diagnose wad session list | grep hook=pre&&hook=outD . diagnose wad session list | grep "hook=pre"&"hook=out"View AnswerAnswer: D

March 20, 2021 No Comments READ MORE +

Which of the following statements correctly describes FortiGates route lookup behavior when searching for a suitable gateway? (Choose two)

Which of the following statements correctly describes FortiGates route lookup behavior when searching for a suitable gateway? (Choose two)A . Lookup is done on the first packet from the session originatorB . Lookup is done on the last packet sent from the responderC . Lookup is done on every packet,...

March 19, 2021 No Comments READ MORE +

Which two statements are true about the FGCP protocol? (Choose two.)

Which two statements are true about the FGCP protocol? (Choose two.)A . Not used when FortiGate is in Transparent modeB . Elects the primary FortiGate deviceC . Runs only over the heartbeat linksD . Is used to discover FortiGate devices in different HA groupsView AnswerAnswer: C,D

March 19, 2021 No Comments READ MORE +

Which statement is correct if well-known viruses are not being blocked?

Refer to the exhibit to view the firewall policy. Which statement is correct if well-known viruses are not being blocked?A . The firewall policy does not apply deep content inspection.B . The firewall policy must be configured in proxy-based inspection mode.C . The action on the firewall policy must be...

March 19, 2021 No Comments READ MORE +