Which three actions are valid for static URL filtering?
NSE4_JM

Quiz
•
Computers
•
1st - 2nd Grade
•
Hard

JMTelcom JMTelcom
Used 1+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Allow
Block
Exempt
Shape
Warning
2.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate?
Trusted authentication
FortiTelemetry
SSH
Trusted host
HTTPS
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which is not a FortiGate feature?
Database auditing
Intrusion prevention
Web filtering
Application control
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What actions are possible with Application Control?
Warn
Allow
Block
Traffic Shaping
Quarantine
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An administrator has configured a route-based site-to-site IPsec VPN. Which statement is correct regarding this IPsec VPN configuration?
The IPsec firewall policies must be placed at the top of the list.
This VPN cannot be used as a part of a hub and spoke topology.
Routes are automatically created based on the quick mode selectors.
A virtual IPsec interface is automatically created after the Phase 1 configuration is completed.
6.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What attributes are always included in a log header?
policyid
level
user
time
subtype
7.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which of the following settings can be configured per VDOM?
Operating mode (NAT/route or transparent)
Static routes
Hostname
System time
Firewall Policies
8.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which user group types does FortiGate support for firewall authentication?
RSSO
Firewall
LDAP
NTLM
FSSO
9.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which best describes the mechanism of a TCP SYN flood?
The attackers keeps open many connections with slow data transmission so that other clients cannot start new connections.
The attackers sends a packets designed to sync with the FortiGate
The attacker sends a specially crafted malformed packet, intended to crash the target by exploiting its parser.
The attacker starts many connections, but never acknowledges to fully form them
Similar Resources on Quizizz
10 questions
Primera evaluación de ataques a la red

Quiz
•
2nd Grade
10 questions
Tes FireWall

Quiz
•
1st - 3rd Grade
10 questions
Mulai karir sebagai Network Engineer dengan MikroTik

Quiz
•
KG - Professional Dev...
14 questions
cyber security

Quiz
•
KG - Professional Dev...
10 questions
Data Security

Quiz
•
1st Grade
13 questions
Teknologi Jaringan XI

Quiz
•
2nd Grade
10 questions
Cloud resources

Quiz
•
1st Grade
8 questions
protection

Quiz
•
1st - 5th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade