Which of the following steps is required to prevent a user from being presented with a web browser warning whe
SSL content inspection is enabled on the FortiGate unit. Which of the following steps is
required to prevent a user from being presented with a web browser warning when
accessing an SSL-encrypted website?
Which of the following statements describes the method of creating a policy to block access to an FTP site?
Which of the following statements describes the method of creating a policy to block access
to an FTP site?
which of the following items?
UTM features can be applied to which of the following items?
How are UTM features applied to traffic?
Each UTM feature has configurable UTM objects such as sensors, profiles or lists that
define how the feature will function. How are UTM features applied to traffic?
which of the following statements describes the action taken on traffic flowing between these interfaces?
If no firewall policy is specified between two FortiGate interfaces and zones are not used,
which of the following statements describes the action taken on traffic flowing between
these interfaces?
which of the following?
File blocking rules are applied before which of the following?
Which of the following pieces of information can be included in the Destination Address field of a firewall po
Which of the following pieces of information can be included in the Destination Address field
of a firewall policy?
which of the following types of network traffic?
DLP archiving gives the ability to store session transaction data on a FortiAnalyzer unit for
which of the following types of network traffic? (Select all that apply.)
What action must be taken for one of these profiles to become active?
FortiGate units are preconfigured with four default protection profiles. These protection
profiles are used to control the type of content inspection to be performed. What action must
be taken for one of these profiles to become active?
Which policies must be created for this communication?
A FortiGate 60 unit is configured for your small office. The DMZ interface is connected to a
network containing a web server and email server. The Internal interface is connected to a
network containing 10 user workstations and the WAN1 interface is connected to your ISP.
You want to configure firewall policies so that your users can send and receive email
messages to the email server on the DMZ network. You also want the email server to be
able to retrieve email messages from an email server hosted by your ISP using the POP3
protocol. Which policies must be created for this communication? (Select all that apply.)