Which one of the following statements explains why the cache statistics are all zeros?
View the exhibit, which contains the output of a web filtering diagnose command, and then answer the question below. Which one of the following statements explains why the cache statistics are all zeros? A. There are no users making web requests. B. The administrator has reallocated the cache memory to a separate process. C. The […]
Why didn’t the tunnel come up?
View the exhibit, which contains the partial output of an IKE real-time debug, and then answer the question below. Why didn’t the tunnel come up? A. The remote gateway is using aggressive mode and the local gateway is configured to use main mode. B. The remote gateway’s phase 1 configuration does not match the local […]
Which of the following statements is true regarding this configuration? (Choose two.)
View the global IPS configuration, and then answer the question below. Which of the following statements is true regarding this configuration? (Choose two.) A. IPS will scan every byte in every session. B. IPS acceleration is disabled in this FortiGate device’s configuration. C. New packets requiring IPS inspection will be passed through during conserve mode. […]
Which of the following statements about the exhibit are true? (Choose two.)
View the exhibit, which contains the output of a BGP debug command, and then answer the question below. Which of the following statements about the exhibit are true? (Choose two.) A. The local router’s BGP state is Established with the 10.125.0.60 peer. B. Since the counters were last reset; the 10.200.3.1 peer has never been […]
Which one of the following statements is true regarding FortiGates’s inspection of this session?
View the exhibit, which contains a session table entry, and then answer the question below. Which one of the following statements is true regarding FortiGates’s inspection of this session? A. FortiGate applied flow-based inspection. B. FortiGate applied proxy-based inspection. C. FortiGate forwarded this session without any inspection. D. FortiGate applied NGFW flow-based inspection.
Which of the following tasks are automated using the Install Wizard on FortiManager? (Choose two.)
Which of the following tasks are automated using the Install Wizard on FortiManager? (Choose two.) A. Install configuration changes to managed devices. B. Preview pending configuration changes for managed devices. C. Import policy packages from managed devices. D. Add devices to FortiManager. E. Import interface mappings from managed devices
If the HA ID for the primary unit is zero (0), which one of the following statements about the output is true?
View the exhibit, which contains the output of diagnose sys session list, and then answer the question below. If the HA ID for the primary unit is zero (0), which one of the following statements about the output is true? A. This session is for HA heartbeat traffic. B. This session cannot be synced with […]
View the central management configuration shown in the exhibit, and then answer the question below.
View the central management configuration shown in the exhibit, and then answer the question below. Which server will FortiGate choose for antivirus and IPS updates if 10.0.1.243 is experiencing an outage? A. 10.0.1.244 B. Public FortiGuard servers C. 10.0.1.240 D. 10.0.1.242
Which of the advanced threat protection solutions should you use to protect against an attacker may take durin
Which of the advanced threat protection solutions should you use to protect against an attacker may take during the lateral movement stage of the kill chain? (Choose two.) A. FortiClient and FortiSandbox B. FortiMail and FortiSandbox C. FortiGate and FortiSandbox D. FortiWeb and FortiSandbox
What type of threats can FortiSandbox detect on inbound traffic? (Choose two.)
When using FortiSandbox in sniffer-mode, you should configure FortiSandbox to inspect both inbound and outbound traffic. What type of threats can FortiSandbox detect on inbound traffic? (Choose two.) A. Botnet connections B. Malware C. Malicious URLs D. Intrusion attempts