Which of the following statements best describes the proxy behavior on a FortiGate unit during an FTP client u
Which of the following statements best describes the proxy behavior on a FortiGate unit
during an FTP client upload when FTP splice is disabled?
What is the correct behavior when the email attachment is detected as a virus by the FortiGate antivirus engin
A firewall policy has been configured for the internal email server to receive email from
external parties through SMTP. Exhibits A and B show the antivirus and email filter profiles
applied to this policy. Exhibit A: Exhibit B: What is the correct behavior when the email
attachment is detected as a virus by the FortiGate antivirus engine?
Which email filter is NOT available on a FortiGate device?
Which email filter is NOT available on a FortiGate device?
Which part of an email message exchange is NOT inspected by the POP3 and IMAP proxies?
Which part of an email message exchange is NOT inspected by the POP3 and IMAP
proxies?
What are the valid sub-types for a Firewall type policy?
What are the valid sub-types for a Firewall type policy? (Select all that apply)
which of the following statements describes the action taken on traffic?
In NAT/Route mode when there is no matching firewall policy for traffic to be forwarded by
the Firewall, which of the following statements describes the action taken on traffic?
which order are firewall policies processed on the FortiGate unit?
In which order are firewall policies processed on the FortiGate unit?
Which of the following pieces of information can be included in the Destination Address field of a firewall po
Which of the following pieces of information can be included in the Destination Address field
of a firewall policy? (Select all that apply.)
The command used in the CLI to perform this function is ______
The ordering of firewall policies is very important. Policies can be re-ordered within the
FortiGate unit’s GUI and also using the CLI. The command used in the CLI to perform this
function is ______
which one of the following addresses is correct?
You wish to create a firewall policy that applies only to traffic intended for your web server.
The web server has an IP address of 192.168.2.2 and a /24 subnet mask. When defining
the firewall address for use in this policy, which one of the following addresses is correct?