How do you configure a FortiGate to do traffic shaping of P2P traffic, such as BitTorrent?
How do you configure a FortiGate to do traffic shaping of P2P traffic, such as BitTorrent?
Which file names will match the *.tiff file name pattern configured in a data leak prevention filter? (Choose
Which file names will match the *.tiff file name pattern configured in a data leak prevention filter? (Choose two.)
An administrator has configured a dialup IPsec VPN with XAuth. Which method statement best describes this scen
An administrator has configured a dialup IPsec VPN with XAuth. Which method statement best describes this scenario?
Examine this output from a debug flow:
Examine this output from a debug flow:
Which component of FortiOS performs application control inspection?
Which component of FortiOS performs application control inspection?
Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)
Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)
What statement describes what DNS64 does?
What statement describes what DNS64 does?
What does the command diagnose debug fsso-polling refresh-user do?
What does the command diagnose debug fsso-polling refresh-user do?
Why must you use aggressive mode when a local FortiGate IPsec gateway hosts multiple dialup tunnels?
Why must you use aggressive mode when a local FortiGate IPsec gateway hosts multiple dialup tunnels?
An administrator has configured the following settings:
An administrator has configured the following settings: