Which of the following represents the correct order of criteria used for the selection…?
Which of the following represents the correct order of criteria used for the selection of a
Master unit within a FortiGate High Availability (HA) cluster when master override is
disabled?
Which of the following statements are correct regarding virtual domains (VDOMs)?
Which of the following statements are correct regarding virtual domains (VDOMs)? (Select
all that apply.)
which of the following types of network traffic?
Data Leak Prevention archiving gives the ability to store files and message data onto a
FortiAnalyzer unit for which of the following types of network traffic? (Select all that apply.)
Which of the following statements are correct regarding Application Control?
Which of the following statements are correct regarding Application Control? (Select all that
apply.)
Within the UTM Proxy Options, the CA certificate Fortinet_CA_SSLProxy defines which of the following:
which of the following describes the difference between the block and quarantine actions?
For Data Leak Prevention, which of the following describes the difference between the block
and quarantine actions?
How can DLP file filters be configured to detect Office 2010 files?
How can DLP file filters be configured to detect Office 2010 files? (Select all that apply.)
what action will the FortiGate unit take?
Examine the Exhibits shown below, then answer the question that follows. Review the
following DLP Sensor (Exhibit 1): Review the following File Filter list for rule #1 (Exhibit 2):
Review the following File Filter list for rule #2 (Exhibit 3): Review the following File Filter list
for rule #3 (Exhibit 4): An MP3 file is renamed to ‘workbook.exe’ and put into a ZIP archive.
It is then sent through the FortiGate device over HTTP. It is intercepted and processed by
the configuration shown in the above Exhibits 1-4. Assuming the file is not too large for the
File scanning threshold, what action will the FortiGate unit take?
Which of one the following profiles could be enabled in order to prevent the file from passing through the For
The eicar test virus is put into a zip archive, which is given the password of “Fortinet” in
order to open the archive. Review the configuration in the exhibits shown below; then
answer the question that follows. Exhibit A – Antivirus Profile: Exhibit B – Non-default UTM
Proxy Options Profile: Exhibit C – DLP Profile: Which of one the following profiles could be
enabled in order to prevent the file from passing through the FortiGate device over HTTP on
the standard port for that protocol?
which of the following statements are correct?
With FSSO, a domain user could authenticate either against the domain controller running
the Collector Agent and Domain Controller Agent, or a domain controller running only the
Domain Controller Agent. If you attempt to authenticate with the Secondary Domain
Controller running only the Domain Controller Agent, which of the following statements are
correct? (Select all that apply.)