
51-75 Fortinet
Authored by Resul Gedikli
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Examine the intrusion prevention system (IPS) diagnostic command.
Which statement is correct If option 5 was used with the IPS diagnostic command and the outcome
was a decrease in the CPU usage?
The IPS engine was inspecting high volume of traffic.
The IPS engine was unable to prevent an intrusion attack .
The IPS engine was blocking all traffic
The IPS engine will continue to run in a normal state
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Based on the raw log, which two statements are correct? (Choose two.)
Traffic is blocked because Action is set to DENY in the firewall policy.
Traffic belongs to the root VDOM
This is a security log
Log severity is set to error on FortiGate
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two statements are true about the FGCP protocol? (Choose two.)
FGCP elects the primary FortiGate device
FGCP is not used when FortiGate is in transparent mode
FGCP runs only over the heartbeat links.
FGCP is used to discover FortiGate devices in different HA groups
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two statements are true about the RPF check? (Choose two.)
The RPF check is run on the first sent packet of any new session.
The RPF check is run on the first reply packet of any new session
The RPF check is run on the first sent and reply packet of any new session
RPF is a mechanism that protects FortiGate and your network from IP spoofing attacks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When configuring a firewall virtual wire pair policy, which following statement is true?
Any number of virtual wire pairs can be included, as long as the policy traffic direction is the same.
Only a single virtual wire pair can be included in each policy
Any number of virtual wire pairs can be included in each policy, regardless of the policy traffic
direction settings.
Exactly two virtual wire pairs need to be included in each policy
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Examine this FortiGate configuration:
How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires
authorization?
It always authorizes the traffic without requiring authentication.
It drops the traffic.
It authenticates the traffic using the authentication scheme SCHEME2
It authenticates the traffic using the authentication scheme SCHEME1
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three statements explain a flow-based antivirus profile? (Choose three.)
Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.
If a virus is detected, the last packet is delivered to the client.
The IPS engine handles the process as a standalone
FortiGate buffers the whole file but transmits to the client at the same time
Flow-based inspection optimizes performance compared to proxy-based inspection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?