لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Refer to the exhibit. If rule 1 matches http://bwapp.fortinet.demo, rule 2 matches http://dvwa.fortinet.demo, and the default web protection profile is the inline protection profile, which protection profile will be applied to a connection to http://petstore.fortinet.demo?
A. bwappcorrect
B. policy1
C. dwva
D. Inline protection profile
عرض الإجابة
اجابة صحيحة: A
السؤال #2
When configuring URL rewriting, what is the primary purpose of using regular expressions (regex)? (Select all that apply)
A. Matching and transforming specific URL patternscorrect
B. Encrypting sensitive data in URLs
C. Blocking access to all URLs
D. Simplifying URLs for SEO purposescorrect
عرض الإجابة
اجابة صحيحة: AD
السؤال #3
Which implementation is best suited for a deployment that must meet compliance criteria?
A. SSL Offloading with FortiWeb in reverse proxy mode
B. SSL Inspection with FortiWeb in Transparency mode
C. SSL Offloading with FortiWeb in Transparency Mode
D. SSL Inspection with FrotiWeb in Reverse Proxy modecorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Refer to the exhibit. A FortiWeb device is deployed upstream of a device performing source network address translation (SNAT) or load balancing. What configuration must you perform on FortiWeb to preserve the original IP address of the client?
A. Enable and configure the Preserve Client IP setting
B. Use a transparent operating mode on FortiWeb
C. Enable and configure the Add X-Forwarded-For setting
D. Turn off NAT on the FortiWeb
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Refer to the exhibits. Exhibit A. Exhibit B. Exhibit C. A wireless network has been installed in a small office building and is being used by a business to connect its wireless clients. The network is used for multiple purposes, including corporate access, guest access, and connecting point-of-sale and loT devices. Users connecting to the guest network located in the reception area are reporting slow performance. The network administrator is reviewing the information shown in the exhibits as part of the on
A. Install another AP in the reception area to improve available bandwidth
B. Increase the transmission power of the AP radios
C. Reduce the number of wireless networks being broadcast by the AP
D. Enable frequency handoff on the AP to band steer clients
عرض الإجابة
اجابة صحيحة: D
السؤال #6
How does your FortiWeb configuration differ if the FortiWeb is upstream of the SNAT device instead of downstream of the SNAT device?
A. FortiWeb must be set for Transparent Mode
B. You must enable "Add" X-Forwarded-For: instead of the "Use" X-Forwarded-For: option
C. You must enable the "Use" X-Forwarded-For: option
D. No special configuration required
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which operation mode requires additional configuration in order to allow FTP traffic into your web server?
A. True transparent proxy
B. Transparent inspection
C. Reverse proxycorrect
D. Offline protection
عرض الإجابة
اجابة صحيحة: C
السؤال #8
How does bot detection and mitigation contribute to web application security?
A. Identifying and blocking malicious automated activitiescorrect
B. Encrypting user data during login
C. Optimizing database queries
D. Authenticating API requests
عرض الإجابة
اجابة صحيحة: A
السؤال #9
In which scenario might you want to use the compression feature on FortiWeb?
A. When you are serving many corporate road warriors using 4G tablets and phonescorrect
B. When you are offering a music streaming service
C. When you want to reduce buffering of video streams
D. Never, since most traffic today is already highly compressed
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which HTTP response code is commonly used to indicate a permanent redirection in application delivery?
A. 200 OK
B. 301 Moved Permanentlycorrect
C. 404 Not Found
D. 500 Internal Server Error
عرض الإجابة
اجابة صحيحة: B
السؤال #11
How are bot machine learning (ML) models different from API or anomaly detection models?
A. Bot ML models analyze multiple connections overtime instead analyzing each connection as a single unit
B. Bot ML models detect only anomalies and not actual threats
C. Bot ML models inspect more types of connection properties
D. Bot ML models do not update models periodically from new data
عرض الإجابة
اجابة صحيحة: A
السؤال #12
What are two additional configuration elements that you must be configure for this API gateway? (Choose two.)
A. You must define rate limits
B. You must define URL prefixes
C. You must select a setting in the Allow User Group field
D. You must enable and configure Host Status
عرض الإجابة
اجابة صحيحة: AB
السؤال #13
Where in the controller interface can you find a wireless client's upstream and downstream link rates?
A. On the AP CLI, using the cw_diag ksta commandcorrect
B. On the controller CLI, using the diag wireless-controller wlac -d sta command
C. On the AP CLI, using the cw_diag -d sta command
D. On the controller CLI, using the WiFi Client monitor
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which implementation is most suited for a deployment that must meet PCI DSS compliance criteria?
A. SSL offloading with FortiWeb in reverse proxy mode
B. SSL offloading with FortiWeb in PCI DSS mode
C. SSL offloading with FortiWeb in transparency mode
D. SSL offloading with FortiWeb in full transparent proxy mode
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which statement about local user accounts is true?
A. They are best suited for large environments with many users
B. They cannot be used for site publishing
C. They must be assigned, regardless of any other authentication
D. They can be used for SS
عرض الإجابة
اجابة صحيحة: B
السؤال #16
In application delivery, what should be considered when configuring caching policies for dynamic content? (Select all that apply)
A. Cache expiration timecorrect
B. User authentication statuscorrect
C. Server response headerscorrect
D. Browser type
عرض الإجابة
اجابة صحيحة: ABC
السؤال #17
Refer to the exhibit. What are two additional configuration elements that you must be configure for this API gateway? (Choose two.)
A. You must define rate limits
B. You must define URL prefixes
C. You must select a setting in the Allow User Group field
D. You must enable and configure Host Status
عرض الإجابة
اجابة صحيحة: AB
السؤال #18
When configuring a wireless network for dynamic VLAN allocation, which three IETF attributes must be supplied by the radius server? (Choose three.)
A. 81 Tunnel-Private-Group-IDcorrect
B. 65 Tunnel-Medium-Typecorrect
C. 83 Tunnel-Preference
D. 58 Egress-VLAN-Name
E. 64 Tunnel-Typecorrect
عرض الإجابة
اجابة صحيحة: ABE
السؤال #19
Review the following FortiWeb CLI command: diagnose network sniffer port3 none 6 When you use this command, what is the result?
A. It displays six packets before ending
B. It displays the MACaddress of packets
C. It shows the interface name in the output
D. It shows only TCP packets
عرض الإجابة
اجابة صحيحة: C
السؤال #20
The FortiWeb machine learning (ML) feature is a two-phase analysis mechanism. Which two functions does the first layer perform? (Choose two.)
A. Determines whether an anomaly is a real attack or just a benign anomaly that should be ignoredcorrect
B. Builds a threat model behind every parameter and HTTP methodcorrect
C. Determines if a detected threat is a false-positive or not
D. Determines whether traffic is an anomaly, based on observed application traffic over timecorrect
عرض الإجابة
اجابة صحيحة: ABD
السؤال #21
How does your FortiWeb configuration differ if the FortiWeb is upstream of the SNAT device instead of downstream of the SNAT device?
A. FortiWeb must be set for Transparent Mode
B. You must enable "Add" X-Forwarded-For: instead of the "Use" X-Forwarded-For: option
C. You must enable the "Use" X-Forwarded-For: option
D. No special configuration required
عرض الإجابة
اجابة صحيحة: B
السؤال #22
In the context of web application security, what is the primary role of a Content Security Policy (CSP)?
A. Detecting malicious JavaScript code
B. Preventing SQL injection attacks
C. Encrypting data at rest
D. Controlling the sources of content that a web page can load
عرض الإجابة
اجابة صحيحة: D
السؤال #23
When configuring URL rewriting, what is the primary purpose of using regular expressions (regex)? (Select all that apply)
A. Matching and transforming specific URL patternscorrect
B. Encrypting sensitive data in URLs
C. Blocking access to all URLs
D. Simplifying URLs for SEO purposescorrect
عرض الإجابة
اجابة صحيحة: AD
السؤال #24
What is the difference between an API gateway protection schema and a machine learning (ML) API protection schema?
A. An API gateway protection schema does not allow authentication
B. An API gateway protection schema handles response bodies
C. An API gateway protection schema supports data types other than string
D. An API gateway protection schema cannot change without administrator intervention
عرض الإجابة
اجابة صحيحة: D
السؤال #25
In which operation mode does FortiWeb offer both the ability to offload SSL as well as re-encrypt SSL?
A. Reverse proxycorrect
B. Offline protection
C. Transparent inspection
D. True transparent proxy
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Under which circumstance would you not use compression on FortiWeb?
A. When the file is too big for the FortiWeb buffer
B. When the server is too heavily tasked
C. When the available bandwidth is low
D. When the client Internet connections are slow
عرض الإجابة
اجابة صحيحة: A
السؤال #27
What is the purpose of a CAPTCHA in web application security?
A. Authenticating users
B. Encrypting data in transit
C. Preventing automated form submissions by botscorrect
D. Securing API endpoints
عرض الإجابة
اجابة صحيحة: C
السؤال #28
Review the following configuration:What are two routing behaviors that you can expect on FortiWeb after this configuration change? (Choose two.)
A. API gateway rule
B. Known signatures
C. Machine learning (ML)-based API protection--anomaly detection
D. ML-based API protection--threat detection
عرض الإجابة
اجابة صحيحة: AC
السؤال #29
Which would be a reason to implement HTTP rewriting?
A. To redirect HTTP to HTTPS
B. To implement load balancing
C. To replace a vulnerable element in a requested URL
D. The original page has moved to a new URL
عرض الإجابة
اجابة صحيحة: C
السؤال #30
Review the following configuration: What are two routing behaviors that you can expect on FortiWeb after this configuration change? (Choose two.)
A. Non-HTTP traffic routed through the FortiWeb is allowed
B. IPv6 routing is enabled
C. Non-HTTP traffic destined to the FortiWeb virtual server IP address is dropped
D. Only ICMP traffic is allowed
عرض الإجابة
اجابة صحيحة: AC

View The Updated Fortinet Exam Questions

SPOTO Provides 100% Real Fortinet Exam Questions for You to Pass Your Fortinet Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: