Which of the following settings and protocols can be used to provide secure and restrictive administrative acc
Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate t
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate take?
How can a browser trust a web-server certificate signed by a third party CA?
How can a browser trust a web-server certificate signed by a third party CA?
How does FortiGate verify the login credentials of a remote LDAP user?
How does FortiGate verify the login credentials of a remote LDAP user?
An administrator has enabled proxy-based antivirus scanning and configured the following settings:
An administrator has enabled proxy-based antivirus scanning and configured the following settings:
Examine this output from the diagnose sys top command:
Examine this output from the diagnose sys top command:
An administrator has created a custom IPS signature. Where does the custom IPS signature have to be applied?
An administrator has created a custom IPS signature. Where does the custom IPS signature have to be applied?
An administrator wants to configure a FortiGate as a DNS server. The FortiGate must use its DNS database first
An administrator wants to configure a FortiGate as a DNS server. The FortiGate must use its DNS database first, and then relay all irresolvable queries to an external DNS server. Which of the following DNS method must you use?
Which statements about high availability (HA) for FortiGates are true? (Choose two.)
Which statements about high availability (HA) for FortiGates are true? (Choose two.)
Which of the following statements about central NAT are true? (Choose two.)
Which of the following statements about central NAT are true? (Choose two.)