View Mode
Q: 1
To complete the final step of a Security Fabric configuration, an administrator must authorize all the devices on which device?
Options
Q: 2

Which two protocol options are available on the CLI but not on the GUI when configuring an SD-WAN Performance SLA? (Choose two.)

Options
Q: 3
Consider the topology: Application on a Windows machine FGT--> Telnet to Linux server. An administrator is investigating a problem where an application establishes a Telnet session to a Linux server over the SSL VPN through FortiGate and the idle session times out after about 90 minutes. The administrator would like to increase or disable this timeout. The administrator has already verified that the issue is not caused by the application or Linux server. This issue does not happen when the application establishes a Telnet connection to the Linux server directly on the LAN. What two changes can the administrator make to resolve the issue without affecting services running through FortiGate? (Choose two.)
Options
Q: 4

An administrator wants to configure timeouts for users. Regardless of the user's behavior, the timer should start as soon as the user authenticates and expire after the configured value. Which timeout option should be configured on FortiGate?

Options
Q: 5
Which of the following statements is true regarding SSL VPN settings for an SSL VPN portal?
Options
Q: 6
Examine this FortiGate configuration: FCP FGT AD 7 question Examine the output of the following debug command: FCP FGT AD 7 question Based on the diagnostic outputs above, how is the FortiGate handling the traffic for new sessions that require inspection?
Options
Q: 7

Refer to the exhibit. FCP FGT AD 7 question The global settings on a FortiGate device must be changed to align with company security policies. What does the Administrator account need to access the FortiGate global settings?

Options
Q: 8
Which two statements are correct about SLA targets? (Choose two.)
Options
Q: 9
Which security feature does FortiGate provide to protect servers located in the internal networks from attacks such as SQL injections?
Options
Q: 10
Which two actions can you perform only from the root FortiGate in a Security Fabric? (Choose two.)
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE