What is required in the SSL VPN configuration to meet these requirements?
A company needs to provide SSL VPN access to two user groups. The company also needs to display different welcome messages on the SSL VPN login screen for both user groups. What is required in the SSL VPN configuration to meet these requirements? A. Different SSL VPN realms for each group. B. Two separate SSL […]
Which of the following FortiGate configuration tasks will create a route in the policy route table? (Choose tw
Which of the following FortiGate configuration tasks will create a route in the policy route table? (Choose two.) A. Static route created with a Named Address object B. Static route created with an Internet Services object C. SD-WAN route created for individual member interfaces D. SD-WAN rule created to route traffic based on link latency
Which statements about a One-to-One IP pool are true? (Choose two.)
Which statements about a One-to-One IP pool are true? (Choose two.) A. It is used for destination NAT. B. It allows the fixed mapping of an internal address range to an external address range. C. It does not use port address translation. D. It allows the configuration of ARP replies.
What files are sent to FortiSandbox for inspection in flow-based inspection mode?
What files are sent to FortiSandbox for inspection in flow-based inspection mode? A. All suspicious files that do not have their hash value in the FortiGuard antivirus signature database. B. All suspicious files that are above the defined oversize limit value in the protocol options. C. All suspicious files that match patterns defined in the […]
A FortiGate interface is configured with the following commands:
A FortiGate interface is configured with the following commands:
Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection?
Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection? (Choose two.)
Under what circumstance would you enable LEARN as the Action on a firewall policy?
Under what circumstance would you enable LEARN as the Action on a firewall policy?
What methods can be used to deliver the token code to a user who is configured to use two-factor authenticatio
What methods can be used to deliver the token code to a user who is configured to use two-factor authentication? (Choose three.)
You are tasked to architect a new IPsec deployment with the following criteria:
You are tasked to architect a new IPsec deployment with the following criteria:
View the exhibit.Which of the following statements are correct? (Choose two.)
View the exhibit.Which of the following statements are correct? (Choose two.)