Which of the following must be configured on a FortiGate unit to redirect content requests to remote web cache
Which of the following must be configured on a FortiGate unit to redirect content requests to
remote web cache servers?
Which of the following represents the method used on a FortiGate unit running FortiOS version 4.2 to apply tra
Which of the following represents the method used on a FortiGate unit running FortiOS
version 4.2 to apply traffic shaping to P2P traffic, such as BitTorrent?
Select the answer that describes what the CLI command diag debug authd fsso list is used for.
Select the answer that describes what the CLI command diag debug authd fsso list is used
for.
Which of the following statements are correct regarding FSSO in a Windows domain environment when NTLM and Pol
FSSO provides a single sign on solution to authenticate users transparently to a FortiGate
unit using credentials stored in Windows Active Directory. Which of the following statements
are correct regarding FSSO in a Windows domain environment when NTLM and Polling
Mode are not used? (Select all that apply.)
which of the following correctly describes the path taken by the SYN packet of an HTTP session that is offload
In a High Availability cluster operating in Active-Active mode, which of the following correctly
describes the path taken by the SYN packet of an HTTP session that is offloaded to a
subordinate unit?
Which of the following represents the correct order of criteria used for the selection…?
Which of the following represents the correct order of criteria used for the selection of a
Master unit within a FortiGate High Availability (HA) cluster when master override is
disabled?
Which of the following statements are correct regarding virtual domains (VDOMs)?
Which of the following statements are correct regarding virtual domains (VDOMs)? (Select
all that apply.)
which of the following types of network traffic?
Data Leak Prevention archiving gives the ability to store files and message data onto a
FortiAnalyzer unit for which of the following types of network traffic? (Select all that apply.)
Which of the following statements are correct regarding Application Control?
Which of the following statements are correct regarding Application Control? (Select all that
apply.)