How can you format the FortiGate flash disk?
How can you format the FortiGate flash disk?
How do you configure inline SSL inspection on a firewall policy? (Choose two.)
How do you configure inline SSL inspection on a firewall policy? (Choose two.)
Which traffic sessions can be offloaded to a NP6 processor? (Choose two.)
Which traffic sessions can be offloaded to a NP6 processor? (Choose two.)
View the exhibit. Based on this output, which statements are correct? (Choose two.)
View the exhibit. Based on this output, which statements are correct? (Choose two.)
An administrator has blocked Netflix login in a cloud access security inspection (CASI) profile. The administr
An administrator has blocked Netflix login in a cloud access security inspection (CASI) profile. The administrator has also applied the CASI profile to a firewall policy.
How does FortiGate look for a matching firewall policy to process traffic?
How does FortiGate look for a matching firewall policy to process traffic?
How do you configure a FortiGate to do traffic shaping of P2P traffic, such as BitTorrent?
How do you configure a FortiGate to do traffic shaping of P2P traffic, such as BitTorrent?
Which file names will match the *.tiff file name pattern configured in a data leak prevention filter? (Choose
Which file names will match the *.tiff file name pattern configured in a data leak prevention filter? (Choose two.)
An administrator has configured a dialup IPsec VPN with XAuth. Which method statement best describes this scen
An administrator has configured a dialup IPsec VPN with XAuth. Which method statement best describes this scenario?
Examine this output from a debug flow:
Examine this output from a debug flow: