Refer to the exhibits to view the firewall policy (Exhibit A) and the antivirus profile (Exhibit B).
Which statement is correct if a user is unable to receive a block replacement message when downloading an infected file for the first time?
Refer to the exhibit.
Based on the raw log, which two statements are correct? (Choose two.)
Which three statements explain a flow-based antivirus profile? (Choose three.)
An administrator has configured two-factor authentication to strengthen SSL VPN access. Which additional best practice can an administrator implement?
Refer to the exhibit to view the application control profile.
Based on the configuration, what will happen to Apple FaceTime?
7
Which two settings can be separately configured per VDOM on a FortiGate device? (Choose two.)
FortiGate is operating in NAT mode and is configured with two virtual LAN (VLAN) subinterfaces added to the same physical interface.
In this scenario, which statement about VLAN IDs is true?
What are two benefits of flow-based inspection compared to proxy-based inspection? (Choose two.)
40
Which CLI command will display sessions both from client to the proxy and from the proxy to the servers?
An administrator is running the following sniffer command:
Which three pieces of Information will be Included in me sniffer output? {Choose three.)