1.
Identify the statement which correctly describes the output of the following command: diagnose ips anomaly list
2.
Review the CLI configuration below for an IPS sensor and identify the correct statements regarding this configuration from the choices below. (Select all that apply.) config ips sensor edit "LINUX_SERVER" set comment '' set replacemsg-group '' set log enable config entries edit 1 set action default set application all set location server set log enable set log-packet enable set os Linux set protocol all set quarantine none set severity all set status default next end next end
3.
Identify the correct properties of a partial mesh VPN deployment:
4.
Which of the following represents the method used on a FortiGate unit running FortiOS version 4.2 to apply traffic shaping to P2P traffic, such as BitTorrent?
5.
With FSSO, a domain user could authenticate either against the domain controller running the Collector Agent and Domain Controller Agent, or a domain controller running only the Domain Controller Agent. If you attempt to authenticate with the Secondary Domain Controller running only the Domain Controller Agent, which of the following statements are correct? (Select all that apply.)
6.
Select the answer that describes what the CLI command diag debug authd fsso list is used for.
7.
Select the answer that describes what the CLI command diag debug authd fsso list is used for.
8.
What are the requirements for a cluster to maintain TCP connections after device or link failover? (Select all that apply.)