Which two statements about running a vulnerability scan are true? (Choose two.)
Answer : AB
Explanation:
Should the Vulnerability Scanner allow it, SVMS will set the scan schedule (or schedules) to run in a maintenance window. SVMS will advise Client of the scannerג€™s ability to complete the scan(s) within the maintenance window.
Vulnerabilities on live web sites. Instead, duplicate the web site and its database in a test environment.
Reference:
https://www.trustwave.com/media/17427/trustwave_mss_managed-3rd-party-vulnerability-scanning.pdf https://help.fortinet.com/fweb/552/Content/FortiWeb/fortiweb-admin/vulnerability_scans.htm
FortiWeb offers the same load balancing algorithms as FortiGate.
Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)
Answer : AD
Reference:
https://docs.fortinet.com/document/fortiweb/6.3.0/administration-guide/399384/defining-your-web-servers http://fortinet.globalgate.com.ar/pdfs/FortiWeb/FortiWeb_DS.pdf
Which would be a reason to implement HTTP rewriting?
Answer : A
Explanation:
Create a new URL rewriting rule.
Reference:
https://docs.fortinet.com/document/fortiweb/6.3.0/administration-guide/961303/rewriting-redirecting
Refer to the exhibit.
Answer : AD
Explanation:
Configure your load balancer to insert or append to an X-Forwarded-For:, X-Real-IP:, or other HTTP X-header. Also configure FortiWeb to find the original attackerג€™s or clientג€™s IP address in that HTTP header
Reference:
https://help.fortinet.com/fweb/560/Content/FortiWeb/fortiweb-admin/planning_topology.htm
Which statement about local user accounts is true?
Answer : D
Explanation:
You can configure the Remedy Single Sign-On server to authenticate TrueSight Capacity Optimization users as local users.
Reference:
https://docs.bmc.com/docs/TSCapacity/110/setting-up-local-user-authentication-in-remedy-sso-743238341.html
Refer to the exhibit.
Answer : BD
Reference:
https://docs.fortinet.com/document/fortiweb/6.3.10/administration-guide/33485/fail-to-wire-for-power-loss-reboots
Refer to the exhibit.
Answer : AC
Explanation:
IP reputation leverages many techniques for accurate, early, and frequently updated identification of compromised and malicious clients so you can block attackers before they target your servers.
IP blacklisting is a method used to filter out illegitimate or malicious IP addresses from accessing your networks. Blacklists are lists containing ranges of or individual IP addresses that you want to block.
Reference:
https://docs.fortinet.com/document/fortiweb/6.3.5/administration-guide/137271/blacklisting-whitelisting-clients https://www.imperva.com/learn/application-security/ip-blacklist/
Which algorithm is used to build mathematical models for bot detection?
Answer : C
Explanation:
FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model
Reference:
https://docs.fortinet.com/document/fortiweb/6.3.7/administration-guide/193258/machine-learning
A client is trying to start a session from a page that would normally be accessible only after the client has logged in.
When a start page rule detects the invalid session access, what can FortiWeb do? (Choose three.)
Answer : BCE
Reference:
https://help.fortinet.com/fweb/607/Content/FortiWeb/fortiweb-admin/specify_urls_to_initiate.htm
Refer to the exhibit.
Answer : D
Explanation:
Bot Confirmation -
If the number of anomalies from a user has reached the Anomaly Count, the system executes Bot Confirmation before taking actions.
The Bot Confirmation is to confirm if the user is indeed a bot. The system sends RBE (Real Browser Enforcement) JavaScript or CAPTCHA to the client to double check if it's a real bot.
Reference:
https://docs.fortinet.com/document/fortiweb/6.3.1/administration-guide/600188/configuring-bot-detection-profiles
What can an administrator do if a client has been incorrectly period blocked?
Answer : B
Explanation:
Block Period -
Enter the number of seconds that you want to block the requests. The valid range is 1ג€"3,600 seconds. The default value is 60 seconds.
This option only takes effect when you choose Period Block in Action.
Note: Thatג€™s a temporary blacklist so you can manually release them from the blacklist.
Reference:
https://docs.fortinet.com/document/fortiweb/6.3.1/administration-guide/600188/configuring-bot-detection-profiles
Which regex expression is the correct format for redirecting the URL http://www.example.com?
Answer : B
Explanation:
\1://www.company.com/\2/\3
Reference:
https://learn.akamai.com/en-us/webhelp/edge-redirector/edge-redirector-guide/GUID-0C22DFC2-DCC4-42AF-BDB2-9537FBEE03FD.html
When FortiWeb triggers a redirect action, which two HTTP codes does it send to the client to inform the browser of the new URL? (Choose two.)
Answer : BC
Reference:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/302
True transparent proxy mode is best suited for use in which type of environment?
Answer : D
Explanation:
Does not require changes to the IP address scheme of the network. Requests are destined for a web server and not the FortiWeb appliance. This operation mode supports the same feature set as True Transparent Proxy mode.
Reference:
https://docs.fortinet.com/document/fortiweb/6.3.0/administration-guide/211763/planning-the-network-topology
Review the following configuration:
Answer : A
Have any questions or issues ? Please dont hesitate to contact us