In which order are firewall policies processed on a FortiGate unit?
Answer : A
In an IPSec gateway-to-gateway configuration, two FortiGate units create a VPN tunnel between two separate private networks. Which of the following configuration steps must be performed on both FortiGate units to support this configuration?
Answer : A,D,E
The exhibit shows two static routes to the same destinations subnet 172.20.168.0/24.
Answer : CD
Review the IKE debug output for IPsec shown in the exhibit below.
Answer : C
Files that are larger than the oversized limit are subjected to which Antivirus check?
Answer : C
Which statements correctly describe transparent mode operation? (Choose three.)
Answer : ABD
Which statements are true regarding local user authentication? (Choose two.)
Answer : A,D
Which protocols can you use for secure administrative access to a FortiGate? (Choose two)
Answer : A,D
What is not true of configuring disclaimers on the FortiGate?
Answer : C
Which of the following statements are correct regarding FortiGate virtual domains
(VDOMs)? (Choose two)
Answer : AB
Where are most of the security events logged?
Answer : C
What is the maximum number of FortiAnalyzer/FortiManager devices a FortiGate unit can be configured to send logs to?
Answer : C
The exhibit shows the Disconnect Cluster Member command in a FortiGate unit that is part of a HA cluster with two HA members.
Answer : AC
Which statements are correct regarding an IPv6 over IPv4 IPsec configuration? (Choose two.)
Answer : BC
Which IPsec configuration mode can be used for implementing GRE-over-IPsec VPNs?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us