Which two statements about NTLM authentication are correct?
Which two statements about NTLM authentication are correct? (Choose two.) A. It requires DC agents on every domain controller when used in multidomain environments. B. It is useful when users log in to DCs that are not monitored by a collector agent. C. It requires NTLM-enabled web browsers. D. It takes over as the primary […]
When configuring the root FortiGate to communicate with a downstream FortiGate, which two settings must you co
Refer to the exhibit. You are configuring the root FortiGate to implement the Security Fabric. You are configuring port10 to communicate with a downstream FortiGate. The exhibit shows the default Edit Interface. When configuring the root FortiGate to communicate with a downstream FortiGate, which two settings must you configure? (Choose two.) A. Enable Device Detection […]
What criteria does FortiGate use to look for a matching firewall policy to process traffic?
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.) A. Services defined in the firewall policy. B. Incoming and outgoing interfaces C. Highest to lowest priority defined in the firewall policy. D. Lowest to highest policy ID number.
Which topology should you use to satisfy all of the requirements?
Consider a new IPsec deployment with the following criteria: All satellite offices must connect to the two HQ sites. The satellite offices do not need to communicate directly with other satellite offices. Backup VPN is not required. The design should minimize the number of tunnels being configured. Which topology should you […]
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server?
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server? A. srv_proxy./wpad.dat B. srv_tcp.wpad. C. wpad. D. proxy..wpad
Why is the site www.bing.com being blocked?
Examine the exhibit, which shows the output of a web filtering real time debug. Why is the site www.bing.com being blocked? A. The web site www.bing.com is categorized by FortiGuard as Malicious Websites. B. The user has not authenticated with the FortiGate yet. C. The web server IP address 204.79.197.200 is categorized by FortiGuard as […]
Which configuration option is the most effective way to support this request?
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not. Which configuration option is the most effective way to support this request? A. Implement web filter authentication for the specified website. B. Implement a web filter category override for the […]
What three FortiGate components are tested during the hardware test?
What three FortiGate components are tested during the hardware test? (Choose three.) A. CPU B. Administrative access C. HA heartbeat D. Hard disk E. Network interfaces
Which two statements about virtual domains (VDOMs) are true?
Which two statements about virtual domains (VDOMs) are true? (Choose two.) A. Transparent mode and NAT mode VDOMs cannot be combined on the same FortiGate. B. Each VDOM can be configured with different system hostnames. C. Different VLAN subinterfaces of the same physical interface can be assigned to different VDOMs. D. Each VDOM has its […]
The FSSO collector agent set to advanced access mode for the Windows Active Directory uses which convention?
The FSSO collector agent set to advanced access mode for the Windows Active Directory uses which convention? A. LDAP B. Windows C. RSSO D. NTLM