Search Header Logo

lo q falta

Authored by heber molero

Religious Studies

3rd Grade

Used 5+ times

lo q falta
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

what are two functions of the ZTNA rule? choose two

it redirects the client request to the access proxy

it applies security profiles to protect traffic

it defines the access proxy

it enforces access control

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

the exhibit shows a diagram of a foritgate devicen connected to the network and the firewall policy and IP pool configuration on the fortigate device..............choose two

fortigate allocates port blocks on a firts-come, firts-server basis

fortigate allocates 128 port blocks per user

fortigate generates a system event log for every port block allocation made user

fortigate allocates port blocks per user, based on the configured range of internal IP address.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

the exhibits show a firewall policy (exhibit A) and an antivirus profile(exhibit B) why is the user unable to receive a block replacement message when downloading an infected file for the first time?

the firewall policy performs a full content inspection on the file

the intrusion prevention security profile must be enabled when using flow-based inspection mode

the volume of traffic being inspected is too high for this model of fortigate

flow-based inspection is used, which resets the last packet to the user

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

which three statements about a flow-based antivirus profile are correct?choose two

fortigate buffers the whole file but transmits to the client simultaneously

optimized performance compared to proxy-based inspection

if the virus is detected the last packets is deli vered to the client

flow-based inspection uses a hybrid of scanning modes available in proxy-based inspection

IPS engine handles the process as a standalone

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

based on the raw log, which two statement are correct?choose two

traffic is blocked because action is set to DENY in the firewall policy

log severity is set to error on fortigate

traffic belongs to the root VDOM

this is a security log

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

what are two functions of the ZTNA rule? choose two

it redirects the client request to the access proxy

it applies security profiles to protect traffic

it defines the access proxy

it enforces access control

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

the exhibit shows a diagram of a foritgate devicen connected to the network and the firewall policy and IP pool configuration on the fortigate device..............choose two

fortigate allocates port blocks on a firts-come, firts-server basis

fortigate allocates 128 port blocks per user

fortigate generates a system event log for every port block allocation made user

fortigate allocates port blocks per user, based on the configured range of internal IP address.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Religious Studies