Which of the following statements is correct regarding the antivirus scanning function on the FortiGate un
Which of the following statements is correct regarding the antivirus scanning function on the
FortiGate unit?
What is the correct behavior when the email attachment is detected as a virus by the FortiGate AntiVirus engin
A firewall policy has been configured for the internal email server to receive email from
external parties through SMTP. Exhibits A and B show the AntiVirus and Email Filter profiles
applied to this policy. What is the correct behavior when the email attachment is detected as
a virus by the FortiGate AntiVirus engine?
Which of the following describes the best custom signature for detecting the use of the word "Fortinet&qu
which of the following statements are correct?
An administrator is examining the attack logs and notices the following entry: type=ips
subtype=signature pri=alert vd=root serial=1995 attack_id=103022611 src=69.45.64.22
dst=192.168.1.100 src_port=80 dst_port=4887 src_int=wlan dst_int=internal
status=detected proto=6 service=4887/tcp user=N/A group=N/A msg=web_client:
IE.IFRAME.BufferOverflow.B Based on the information displayed in this entry, which of the
following statements are correct? (Select all that apply.)
which of the following statements is correct?
An administrator is examining the attack logs and notices the following entry:
device_id=FG100A3907508962 log_id=18432 subtype=anomaly type=ips
timestamp=1270017358 pri=alert itime=1270017893 severity=critical src=192.168.1.52
dst=64.64.64.64 src_int=internal serial=0 status=clear_session proto=6 service=http
vd=root count=1 src_port=35094 dst_port=80 attack_id=100663402 sensor=protect-servers
ref=http://www.fortinet.com/ids/VID100663402 msg=”anomaly: tcp_src_session, 2 >
threshold 1″ policyid=0 carrier_ep=N/A profile=N/A dst_int=N/A user=N/A group=N/A Based
solely upon this log message, which of the following statements is correct?
Which of the following items are considered to be advantages of using the application control features on the
Which of the following items are considered to be advantages of using the application
control features on the FortiGate unit? Application control allows an administor to:
Which of the following features could be used by an administrator to block FTP uploads while still allowing FT
Which of the following features could be used by an administrator to block FTP uploads
while still allowing FTP downloads?
Which of the following configuration changes can be performed on the FortiGate unit to fulfill this requiremen
An organization wishes to protect its SIP Server from call flooding attacks. Which of the
following configuration changes can be performed on the FortiGate unit to fulfill this
requirement?