لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Examine the following code snippet: servers: - url: 'http://petstore.swagger.io/v1' paths: /pets: get: summary: List all pets operationId: listPets tags: - pets parameters: - name: limit in: query description: How many items to return at one time (max 100) required: true schema: $ref: '#/components/schemas/ref' What is this a snippet from?
A. An HTTP request restriction file
B. An API schema filecorrect
C. An XML schema file
D. An API machine learning (ML) configuration file
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which two statements about distributed automatic radio resource provisioning (DARRP) are correct? (Choose two.)
A. DARRP performs continuous spectrum analysis to detect sources of interference
B. DARRP performs measurements of the number of BSSIDs and their signal strength (RSSI)
C. DARRP measurements can be scheduled to occur at specific times
D. DARRP requires that wireless intrusion detection (WIDS) be enabled to detect neighboring devices
عرض الإجابة
اجابة صحيحة: AB
السؤال #3
Which two statements about distributed automatic radio resource provisioning (DARRP) are correct? (Choose two.)
A. DARRP performs continuous spectrum analysis to detect sources of interference
B. DARRP performs measurements of the number of BSSIDs and their signal strength (RSSI)
C. DARRP measurements can be scheduled to occur at specific times
D. DARRP requires that wireless intrusion detection (WIDS) be enabled to detect neighboring devices
عرض الإجابة
اجابة صحيحة: AB
السؤال #4
Review the following configuration What are two routing behaviors that you can expect on FortiWeb after this configuration change? (Choose two.)
A. Non - HTTP traffic routed through the FortiWeb is allowed
B. IPv6 routing is enabled
C. Non - HTTP traffic destined to the FortiWeb virtual server IP address is dropped
D. Only ICMP traffic is allowed
عرض الإجابة
اجابة صحيحة: AC
السؤال #5
Review the following configuration:
A. When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples from the same source IP address
B. When machine learning (ML) is in its collecting phase, FortiWeb will not accept any samples from any source IP addresses
C. When machine learning (ML) is in its collecting phase, FortiWeb will accept an unlimited number of samples from the same source IP address
D. When machine learning (ML) is in its running phase, FortiWeb will accept an unlimited number of samples from the same source IP address
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Review the following configuration: What are two routing behaviors that you can expect on FortiWeb after this configuration change? (Choose two.)
A. Non-HTTP traffic routed through the FortiWeb is allowed
B. IPv6 routing is enabled
C. Non-HTTP traffic destined to the FortiWeb virtual server IP address is dropped
D. Only ICMP traffic is allowed
عرض الإجابة
اجابة صحيحة: AC
السؤال #7
Which implementation is most suited for a deployment that must meet PCI DSS compliance criteria?
A. SSL offloading with FortiWeb in reverse proxy mode
B. SSL offloading with FortiWeb in PCI DSS mode
C. SSL offloading with FortiWeb in transparency mode
D. SSL offloading with FortiWeb in full transparent proxy mode
عرض الإجابة
اجابة صحيحة: B
السؤال #8
An attacker attempts to send an SQL injection attack containing the known attack string 'root'; -- through an API call. Which FortiWeb inspection feature will be able to detect this attack the quickest?
A. API gateway rule
B. Known signatures
C. Machine learning (ML)-based API protection—anomaly detection
D. ML-based API protection—threat detection
عرض الإجابة
اجابة صحيحة: B
السؤال #9
When FortiWeb triggers a redirect action, which two HTTP codes does it send to the client to inform the browser of the new URL? (Choose two.)
A. 404correct
B. 301correct
C. 403
D. 302correct
عرض الإجابة
اجابة صحيحة: ABD
السؤال #10
Refer to the exhibit. FortiADC is performing load balancing operations and directing traffic directly to the IP addresses of the web servers. Which operating mode should the two FortiWeb devices use to pass traffic to the web servers?
A. Routing mode
B. Reverse proxy
C. True transparent proxycorrect
D. Bypass mode
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Refer to the exhibit. What are two additional configuration elements that you must be configure for this API gateway? (Choose two.)
A. You must define rate limits
B. You must define URL prefixes
C. You must select a setting in the Allow User Group field
D. You must enable and configure Host Status
عرض الإجابة
اجابة صحيحة: AB
السؤال #12
Which command allows you to temporarily terminate a process that is consuming excessive amounts of resources?
A. execute sys kill
B. diagnose sys kill correct
C. execute sys terminate
D. diagnose sys terminate
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which command allows you to temporarily terminate a process that is consuming excessive amounts of resources?
A. execute sys kill
B. diagnose sys kill correct
C. execute sys terminate
D. diagnose sys terminate
عرض الإجابة
اجابة صحيحة: B
السؤال #14
How can you troubleshoot encryption-related issues in a web application? (Select all that apply)
A. Checking SSL certificate expirationcorrect
B. Reviewing SSL/TLS handshake logscorrect
C. Disabling all encryption protocols
D. Testing SSL connections from different devicescorrect
عرض الإجابة
اجابة صحيحة: ABD
السؤال #15
An attacker attempts to send an SQL injection attack containing the known attack string 'root'; -- through an API call. Which FortiWeb inspection feature will be able to detect this attack the quickest?
A. API gateway rule
B. Known signatures
C. Machine learning (ML)-based API protection—anomaly detection
D. ML-based API protection—threat detection
عرض الإجابة
اجابة صحيحة: B
السؤال #16
What are two advantages of using the URL rewriting and redirecting feature on FortiWeb? (Choose two.)
A. It enhances security by redirecting all requests to a private IP address
B. It reduces the number of requests, which reduces the risk of man-in-the-middle attacks
C. It prevents the disclosure of underlying technology to clients
D. It reduces server load by reducing the number of clients being served by a single web server
عرض الإجابة
اجابة صحيحة: ABC
السؤال #17
What can an administrator do if a client has been incorrectly period blocked?
A. Nothing, it is not possible to override a period block
B. Manually release the ID address from the temporary blacklist
C. Force a new IP address to the client
D. Disconnect the client from the network
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Refer to the exhibit. FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. This setup is breaking all connectivity and genuine clients are not able to access the servers. What can the administrator do to avoid this problem? (Choose two.)
A. Enable and configure the Preserve Client IP setting on the client
B. No special configuration is required; connectivity will be re-established for all clients after the set timeout
C. Place FortiWeb in front of FortiADC
D. Enable and configure the Use X-Forwarded-For setting on FortiWeb
عرض الإجابة
اجابة صحيحة: CD
السؤال #19
Which action must you take with your FortiWeb logs to ensure Payment Card Industry Data Security Standard (PCI DSS) compliance?
A. Keep all log files for at least one year
B. Store logs, unencrypted, in an off-site location for regulators to access
C. Erase all logs every two weeks
D. Encrypt all log and configuration files on an offline server
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Refer to the exhibit. A FortiWeb device is deployed upstream of a device performing source network address translation (SNAT) or load balancing. What configuration must you perform on FortiWeb to preserve the original IP address of the client?
A. Enable and configure the Preserve Client IP setting
B. Use a transparent operating mode on FortiWeb
C. Enable and configure the Add X-Forwarded-For setting
D. Turn off NAT on the FortiWeb
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which high availability mode is commonly used to integrate with a traffic distributer like FortiADC?
A. Cold standby
B. Load sharing
C. Active-Active
D. Active-Passive
عرض الإجابة
اجابة صحيحة: C
السؤال #22
Which operation mode requires additional configuration in order to allow FTP traffic into your web server?
A. True transparent proxy
B. Transparent inspection
C. Reverse proxycorrect
D. Offline protection
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Which of the following steps is essential for troubleshooting deployment and system-related issues in FortiWeb?
A. Clearing browser cache
B. Disabling firewall policies
C. Collecting logs and diagnostic informationcorrect
D. Increasing server pool capacity
عرض الإجابة
اجابة صحيحة: C
السؤال #24
When configuring a wireless network for dynamic VLAN allocation, which three IETF attributes must be supplied by the radius server? (Choose three.)
A. 81 Tunnel-Private-Group-IDcorrect
B. 65 Tunnel-Medium-Typecorrect
C. 83 Tunnel-Preference
D. 58 Egress-VLAN-Name
E. 64 Tunnel-Typecorrect
عرض الإجابة
اجابة صحيحة: ABE
السؤال #25
You've configured an authentication rule with delegation enabled on FortiWeb. What happens when a user tries to access the web application?
A. FortiWeb replies with a HTTP challenge of behalf of the server, the if the user authenticates successfully, FortiWeb allows the request and also includes credentials in the request that it forwards to the web app
B. FrotiWeb redirects users to a FortiAuthenticator page, then if the user authenticates successfully, FortiGate signals to FortiWeb to allow access to the web appcorrect
C. FortiWeb forwards the HTTP challenge from the server to the client, then monitors the reply, allowing access if the user authenticates successfully
D. ForitWeb redirects the user to the web app's authentication page
عرض الإجابة
اجابة صحيحة: B
السؤال #26
Which statement about local user accounts is true?
A. They are best suited for large environments with many users
B. They cannot be used for site publishing
C. They must be assigned, regardless of any other authentication
D. They can be used for SS
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Refer to the exhibits.
A. FortiGate should forward web traffic to the server pool IP addresses
B. The configuration is incorrect
C. You must disable the Preserve Client IP setting on FotriGate for this configuration to work
D. FortiGate should forward web traffic to virtual server IP address
عرض الإجابة
اجابة صحيحة: D
السؤال #28
What is an advantage of utilizing machine learning for web application security compared to rule-based approaches?
A. Adaptability to evolving attack patternscorrect
B. Faster response time to threats
C. Simplicity in configuration and management
D. Lower computational resource utilization
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Review the following configuration:What are two routing behaviors that you can expect on FortiWeb after this configuration change? (Choose two.)
A. Non-HTTP traffic routed through the FortiWeb is allowed
B. IPv6 routing is enabled
C. Non-HTTP traffic destined to the FortiWeb virtual server IP address is dropped
D. Only ICMP traffic is allowed
عرض الإجابة
اجابة صحيحة: AC
السؤال #30
Which is true about HTTPS on FortiWeb? (Choose three.)
A. Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb to only offer TLS 1
B. In true transparent mode, the TLS session terminator is a protected web server
C. In transparent inspection mode, you select which certificate that FortiWeb will present in the server pool, not in the server policy
D. For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server policy
E. After enabling HSTS, redirects to HTTPS are no longer necessary
عرض الإجابة
اجابة صحيحة: ABCD

View The Updated Fortinet Exam Questions

SPOTO Provides 100% Real Fortinet Exam Questions for You to Pass Your Fortinet Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: