Which two solutions meet the requirements for the new spoke group? (Choose two.)
A FortiOS device is used for termination of VPNs for a number of remote spoke VPN units (designated Group A spokes) using a phase 1 main mode dial-up tunnel using pre-shared keys. Your company recently acquired another organization. You are asked to establish VPN connectivity for the newly acquired organization’s sites for which new devices […]
Referring to the exhibit, which two statements correctly describe the affected device’s status and result? (
Click the Exhibit button. You log into FortiManager, look at the Device Manager window and notice that one of your managed devices is not in normal status. Referring to the exhibit, which two statements correctly describe the affected device’s status and result? (Choose two.) A. The device configuration was changed on the local FortiGate side […]
Which action will help to achieve the requirements?
You deploy a FortiGate device in a remote office based on the requirements shown below. -Due to company’s security policy, management IP of your FortiGate is not allowed to access the Internet. – Apply Web Filtering, AntiVirus, IPS and Application control to the protected subnet. – Be managed by a central FortiManager on the head […]
Which two envelope addresses will need an access control rule to relay e-mail sent for unauthenticated users?
FortiMail is configured with the protected domain “internal.lab”. Which two envelope addresses will need an access control rule to relay e-mail sent for unauthenticated users? (Choose two.) A. MAIL FROM: training@fortinet.com;RCPT TO;student@fortinet.com B. MAIL FROM: student@fortinet.com;RCPT TO;student@internal.lab C. MAIL FROM: training@internal.lab;RCPT TO;student@internal.lab D. MAIL FROM: student@ internal.lab;RCPT TO;student@fortinet.com
The FortiGate shows up in your list of devices on the FortiGate Web Site, but all management functions are eit
You want to manage a FortiGate with the FortiCloud service. The FortiGate shows up in your list of devices on the FortiGate Web Site, but all management functions are either missing or grayed out. Which statement is correct in this scenario? A. The managed FortiGate is running a version of FortiOS that is either too […]
Click the Exhibit button. The exhibit shows the steps for creating a URL rewrite policy on a FortiWeb. Which s
Click the Exhibit button. The exhibit shows the steps for creating a URL rewrite policy on a FortiWeb. Which statement represents the purpose of this policy? A. The policy redirects all HTTP URLs to HTTPS. B. The policy redirects all HTTPS URLs to HTTP. C. The policy redirects only HTTPS URLs containing ^/(.*)$ string to […]
Which configuration setting should be executed in the dial-up configuration to allow both VPNs to be connected
Click the Exhibit button. A FortiGate is configured for a dial-up IPsec VPN to allow multiple remote FortiGates to connect to it. However, FortiGates A and B have problems connecting to the VPN. Only one of them can be connected at a time. If site B tries to connect white site A is connected, site […]
In this scenario, which two actions would accomplish this task? (Choose two.)
You have a customer with a SCADA environmental control device that is triggering a false-positive IPS alert whenever the device’s Web GUI is accessed. You cannot seem to create a functional custom IPS filter to exempt this behavior, and it appears that the device is so old that it does not have HTTPS support. You […]
In this scenario, which two methods will satisfy the requirement? (Choose two.)
You want to access the JSON API on FortiManager to retrieve information on an object. In this scenario, which two methods will satisfy the requirement? (Choose two.) A. Make a call with the Web browser on your workstation. B. Make a call with the SoapUPI API tool on your workstation. C. Download the WSDL file […]
Referring to the exhibit, which statement is true?
Click the Exhibit button. You configured an IPsec tunnel to a branch office. Now you want to make sure that the encryption of the tunnel is offloaded to hardware. Referring to the exhibit, which statement is true? A. Incoming and outgoing traffic is offloaded. B. Outgoing traffic is offloaded; you cannot determine if incoming traffic […]