Why is the total quota less than the total system storage?
Refer to the exhibit. Why is the total quota less than the total system storage? A. Some space is reserved for system use B. 3.6% of the system storage is already being used C. The logfiled process is just estimating the total quota D. The oftpd process has not archived the logs yet
Which two of the following must you configure on FortiAnalyzer to email a FortiAnalyzer report externally?
Which two of the following must you configure on FortiAnalyzer to email a FortiAnalyzer report externally? (Choose two.) A. Mail server B. Output profile C. SFTP server D. Report scheduling Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/6d9f8fb5-6cf4-11e9-81a4-00505692583a/FortiAnalyzer-6.0.5-Administration-Guide.pdf (119)
Which two statements about NTLM authentication are correct?
Which two statements about NTLM authentication are correct? (Choose two.) A. It requires DC agents on every domain controller when used in multidomain environments. B. It is useful when users log in to DCs that are not monitored by a collector agent. C. It requires NTLM-enabled web browsers. D. It takes over as the primary […]
When configuring the root FortiGate to communicate with a downstream FortiGate, which two settings must you co
Refer to the exhibit. You are configuring the root FortiGate to implement the Security Fabric. You are configuring port10 to communicate with a downstream FortiGate. The exhibit shows the default Edit Interface. When configuring the root FortiGate to communicate with a downstream FortiGate, which two settings must you configure? (Choose two.) A. Enable Device Detection […]
What criteria does FortiGate use to look for a matching firewall policy to process traffic?
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.) A. Services defined in the firewall policy. B. Incoming and outgoing interfaces C. Highest to lowest priority defined in the firewall policy. D. Lowest to highest policy ID number.
Which topology should you use to satisfy all of the requirements?
Consider a new IPsec deployment with the following criteria: All satellite offices must connect to the two HQ sites. The satellite offices do not need to communicate directly with other satellite offices. Backup VPN is not required. The design should minimize the number of tunnels being configured. Which topology should you […]
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server?
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server? A. srv_proxy./wpad.dat B. srv_tcp.wpad. C. wpad. D. proxy..wpad
Why is the site www.bing.com being blocked?
Examine the exhibit, which shows the output of a web filtering real time debug. Why is the site www.bing.com being blocked? A. The web site www.bing.com is categorized by FortiGuard as Malicious Websites. B. The user has not authenticated with the FortiGate yet. C. The web server IP address 204.79.197.200 is categorized by FortiGuard as […]
Which configuration option is the most effective way to support this request?
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not. Which configuration option is the most effective way to support this request? A. Implement web filter authentication for the specified website. B. Implement a web filter category override for the […]
What three FortiGate components are tested during the hardware test?
What three FortiGate components are tested during the hardware test? (Choose three.) A. CPU B. Administrative access C. HA heartbeat D. Hard disk E. Network interfaces