Which of the following antivirus and attack definition …
Which of the following antivirus and attack definition update features are supported by FortiGate
units? (Select all that apply.)
which of the following source IP addresses would the we…
When browsing to an internal web server using a web-mode SSL VPN bookmark, from which of
the following source IP addresses would the web server consider the HTTP request to be initiated?
which of the following benefits?
Encrypted backup files provide which of the following benefits? (Select all that apply.)
Which of the following statements regarding Banned Word…
Which of the following statements regarding Banned Words are correct? (Select all that apply.)
Which of the following statements are true regarding Lo…
Which of the following statements are true regarding Local User Authentication? (Select all that
apply.)
Which of the following email spam filtering features is…
Which of the following email spam filtering features is NOT supported on a FortiGate unit?
The command used in the CLI to perform this function is…
The ordering of firewall policies is very important. Policies can be re-ordered within the FortiGate
unit’s GUI and also using the CLI. The command used in the CLI to perform this function is ______ .
which one of the following addresses is correct?
You wish to create a firewall policy that applies only to traffic intended for your web server. The
web server has an IP address of 192.168.2.2 and a /24 subnet mask. When defining the firewall
address for use in this policy, which one of the following addresses is correct?
which security method to secure the transfer of log dat…
A FortiAnalyzer device could use which security method to secure the transfer of log data from
FortiGate devices?
Which of the following is true regarding Switch Port Mode?
Which of the following is true regarding Switch Port Mode?