Which of the following statements are correct regarding the configuration of a FortiGate unit as an SSL VPN ga
Which of the following statements are correct regarding the configuration of a FortiGate unit
as an SSL VPN gateway? (Select all that apply.)
Which of the following statements is correct about configuring web filtering overrides?
Which of the following statements is correct about configuring web filtering overrides?
Which of the following statements are correct regarding FSAE in a Windows domain environment when NTLM is
The FortiGate Server Authentication Extensions (FSAE) provide a single sign on solution to
authenticate users transparently to a FortiGate unit using credentials stored in Windows
Active Directory. Which of the following statements are correct regarding FSAE in a
Windows domain environment when NTLM is not used? (Select all that apply.)
Which of the following statements is correct regarding the use of public key cryptography in this scenario?
Bob wants to send Alice a file that is encrypted using public key cryptography. Which of the
following statements is correct regarding the use of public key cryptography in this
scenario?
Which of the following statements is correct based on the firewall configuration illustrated in the exhibit?
Which of the following statements is correct regarding the antivirus scanning function on the FortiGate un
Which of the following statements is correct regarding the antivirus scanning function on the
FortiGate unit?
What is the correct behavior when the email attachment is detected as a virus by the FortiGate AntiVirus engin
A firewall policy has been configured for the internal email server to receive email from
external parties through SMTP. Exhibits A and B show the AntiVirus and Email Filter profiles
applied to this policy. What is the correct behavior when the email attachment is detected as
a virus by the FortiGate AntiVirus engine?
Which of the following describes the best custom signature for detecting the use of the word "Fortinet&qu
which of the following statements are correct?
An administrator is examining the attack logs and notices the following entry: type=ips
subtype=signature pri=alert vd=root serial=1995 attack_id=103022611 src=69.45.64.22
dst=192.168.1.100 src_port=80 dst_port=4887 src_int=wlan dst_int=internal
status=detected proto=6 service=4887/tcp user=N/A group=N/A msg=web_client:
IE.IFRAME.BufferOverflow.B Based on the information displayed in this entry, which of the
following statements are correct? (Select all that apply.)
which of the following statements is correct?
An administrator is examining the attack logs and notices the following entry:
device_id=FG100A3907508962 log_id=18432 subtype=anomaly type=ips
timestamp=1270017358 pri=alert itime=1270017893 severity=critical src=192.168.1.52
dst=64.64.64.64 src_int=internal serial=0 status=clear_session proto=6 service=http
vd=root count=1 src_port=35094 dst_port=80 attack_id=100663402 sensor=protect-servers
ref=http://www.fortinet.com/ids/VID100663402 msg=”anomaly: tcp_src_session, 2 >
threshold 1″ policyid=0 carrier_ep=N/A profile=N/A dst_int=N/A user=N/A group=N/A Based
solely upon this log message, which of the following statements is correct?