which order are firewall policies processed on the FortiGate unit?
In which order are firewall policies processed on the FortiGate unit?
Which of the following pieces of information can be included in the Destination Address field of a firewall po
Which of the following pieces of information can be included in the Destination Address field
of a firewall policy? (Select all that apply.)
The command used in the CLI to perform this function is ______
The ordering of firewall policies is very important. Policies can be re-ordered within the
FortiGate unit’s GUI and also using the CLI. The command used in the CLI to perform this
function is ______
which one of the following addresses is correct?
You wish to create a firewall policy that applies only to traffic intended for your web server.
The web server has an IP address of 192.168.2.2 and a /24 subnet mask. When defining
the firewall address for use in this policy, which one of the following addresses is correct?
Which of the following network protocols are supported for administrative access to a FortiGate unit?
Which of the following network protocols are supported for administrative access to a
FortiGate unit?
Which of the following statements is correct regarding a FortiGate unit operating in NAT/Route mode?
Which of the following statements is correct regarding a FortiGate unit operating in
NAT/Route mode?
which of the following capabilities?
A FortiGate unit can provide which of the following capabilities? (Select all that apply.)
Which of the following methods can be used to access the CLI?
Which of the following methods can be used to access the CLI? (Select all that apply.)
Which of the following are some of the available event types in Web Config?
Alert emails enable the FortiGate unit to send email notifications to an email address upon
detection of a pre-defined event type. Which of the following are some of the available event
types in Web Config? (Select all that apply.)
which of the following methods?
When backing up the configuration file on a FortiGate unit, the contents can be encrypted
by enabling the encrypt option and supplying a password. If the password is forgotten, the
configuration file can still be restored using which of the following methods?