Which of the following spam filtering methods are supported on the FortiGate unit?
Which of the following spam filtering methods are supported on the FortiGate unit? (Select
all that apply.)
Which of the following email spam filtering features is not supported on a FortiGate unit?
Which of the following email spam filtering features is not supported on a FortiGate unit?
Which of the following steps is required to prevent a user from being presented with a web browser warning whe
SSL content inspection is enabled on the FortiGate unit. Which of the following steps is
required to prevent a user from being presented with a web browser warning when
accessing an SSL-encrypted website?
Which of the following statements describes the method of creating a policy to block access to an FTP site?
Which of the following statements describes the method of creating a policy to block access
to an FTP site?
which of the following items?
UTM features can be applied to which of the following items?
How are UTM features applied to traffic?
Each UTM feature has configurable UTM objects such as sensors, profiles or lists that
define how the feature will function. How are UTM features applied to traffic?
which of the following statements describes the action taken on traffic flowing between these interfaces?
If no firewall policy is specified between two FortiGate interfaces and zones are not used,
which of the following statements describes the action taken on traffic flowing between
these interfaces?
which order are firewall policies processed on the FortiGate unit?
In which order are firewall policies processed on the FortiGate unit?
which of the following?
File blocking rules are applied before which of the following?
Which of the following pieces of information can be included in the Destination Address field of a firewall po
Which of the following pieces of information can be included in the Destination Address field
of a firewall policy?