Which two statements about virtual domains (VDOMs) are true?
Which two statements about virtual domains (VDOMs) are true? (Choose two.) A. Transparent mode and NAT mode VDOMs cannot be combined on the same FortiGate. B. Each VDOM can be configured with different system hostnames. C. Different VLAN subinterfaces of the same physical interface can be assigned to different VDOMs. D. Each VDOM has its […]
The FSSO collector agent set to advanced access mode for the Windows Active Directory uses which convention?
The FSSO collector agent set to advanced access mode for the Windows Active Directory uses which convention? A. LDAP B. Windows C. RSSO D. NTLM
Which two statements about antivirus scanning mode are true?
Which two statements about antivirus scanning mode are true? (Choose two.) A. In proxy-based inspection mode, antivirus buffers the whole file for scanning, before sending it to the client. B. In full scan flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client. C. In proxy-based inspection mode, files bigger […]
In an HA cluster operating in active-active mode, which path is taken by the SYN packet of an HTTP session tha
In an HA cluster operating in active-active mode, which path is taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate? A. Client > secondary FortiGate > primary FortiGate > web server B. Client > primary FortiGate > secondary FortiGate > primary FortiGate > web server C. Client > […]
Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all For
Which downstream FortiGate VDOM is used to join the Security Fabric when split-task VDOM is enabled on all FortiGate devices? A. FG-traffic VDOM B. Root VDOM C. Customer VDOM D. Global VDOM Reference: https://docs.fortinet.com/document/fortigate/6.2.0/new-features/287377/split-task-vdom-support
What will happen to unauthenticated users when an active authentication policy is followed by a fall through p
Examine the FortiGate configuration: What will happen to unauthenticated users when an active authentication policy is followed by a fall through policy without authentication? A. The user must log in again to authenticate. B. The user will be denied access to resources without authentication. C. The user will not be prompted for authentication. D. User […]
Which two statements about bulk configuration changes using FortiManager CLI scripts are correct? (Choose two.
Which two statements about bulk configuration changes using FortiManager CLI scripts are correct? (Choose two.) A. When executed on the Device Database, you must use the installation wizard to apply the changes to the managed FortiGate. B. When executed on the Policy Package, ADOM database, changes are applied directly to the managed FortiGate. C. When […]
Which three conditions are required for two FortiGate devices to form an OSP adjacency? (Choose three.)
Which three conditions are required for two FortiGate devices to form an OSP adjacency? (Choose three.) A. OSPF costs match B. OSPF peer IDs match C. Hello and dead intervals match D. OSPF IP MTUs match E. IP addresses are in the same subnet
Refer to the exhibits, which contain configuration on FortiGate and partial session information.
Refer to the exhibits, which contain configuration on FortiGate and partial session information. All traffic to the Internet currently egresses from port1. The exhibit shows partial session information for Internet traffic from a user on the internal network. If the priority on route ID 1 were changed from 5 to 20, what would happen to […]
Which two statements about application layer test commands are true? (Choose two.)
Which two statements about application layer test commands are true? (Choose two.) A. They are used to filter real-time debugs. B. They display real-time application debugs. C. Some of them can be used to restart an application. D. Some of them display statistics and configuration information about a feature or process.