Which two statements about background rogue scanning are correct?
Which two statements about background rogue scanning are correct? (Choose two.) A. A dedicated radio configured for background scanning can support the connection of wireless clients B. When detecting rogue APs, a dedicated radio configured for background scanning can suppress the rogue AP C. Background rogue scanning requires DARRP to be enabled on the AP […]
When configuring Auto TX Power control on an AP radio, which two statements best describe how the radio respon
When configuring Auto TX Power control on an AP radio, which two statements best describe how the radio responds? (Choose two.) A. When the AP detects any other wireless signal stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit. B. When the AP detects PF […]
Which factor is the best indicator of wireless client connection quality?
Which factor is the best indicator of wireless client connection quality? A. Downstream link rate, the connection rate for the AP to the client B. The receive signal strength (RSS) of the client at the AP C. Upstream link rate, the connection rate for the client to the AP D. The channel utilization of the […]
Which two statements about distributed automatic radio resource provisioning (DARRP) are correct?
Which two statements about distributed automatic radio resource provisioning (DARRP) are correct? (Choose two.) A. DARRP performs continuous spectrum analysis to detect sources of interference. It uses this information to allow the AP to select the optimum channel. B. DARRP performs measurements of the number of BSSIDs and their signal strength (RSSI). The controller then […]
A client is trying to start a session from a page that would normally be accessible only after the client has
A client is trying to start a session from a page that would normally be accessible only after the client has logged in. When a start page rule detects the invalid session access, what can FortiWeb do? (Choose three.) A. Display an access policy message, then allow the client to continue B. Redirect the client […]
Which algorithm is used to build mathematical models for bot detection?
Which algorithm is used to build mathematical models for bot detection? A. HCM B. SVN C. SVM D. HMM Explanation: FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model Reference: https://docs.fortinet.com/document/fortiweb/6.3.7/administration-guide/193258/machine-learning
Which statement about local user accounts is true?
Which statement about local user accounts is true? A. They are best suited for large environments with many users. B. They cannot be used for site publishing. C. They must be assigned, regardless of any other authentication. D. They can be used for SSO. Explanation: You can configure the Remedy Single Sign-On server to authenticate […]
Which would be a reason to implement HTTP rewriting?
Which would be a reason to implement HTTP rewriting? A. The original page has moved to a new URL B. To replace a vulnerable function in the requested URL C. To send the request to secure channel D. The original page has moved to a new IP address Explanation: Create a new URL rewriting rule. […]
FortiWeb offers the same load balancing algorithms as FortiGate.
FortiWeb offers the same load balancing algorithms as FortiGate. Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.) A. Round robin B. HTTP session-based round robin C. HTTP user-based round robin D. HTTP content routes Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-guide/399384/defining-your-web-servers http://fortinet.globalgate.com.ar/pdfs/FortiWeb/FortiWeb_DS.pdf
Which two statements about running a vulnerability scan are true?
Which two statements about running a vulnerability scan are true? (Choose two.) A. You should run the vulnerability scan during a maintenance window. B. You should run the vulnerability scan in a test environment. C. Vulnerability scanning increases the load on FortiWeb, so it should be avoided. D. You should run the vulnerability scan on […]