1.
In transparent mode, forward-domain is an CLI setting associate with ___________.
2.
Which of the following sequences describes the correct order of criteria used for the selection of a master unit within a FortiGate high availability (HA) cluster when override is disabled?
3.
Which statement is an advantage of using a hub and spoke IPsec VPN configuration instead of a fully-meshed set of IPsec tunnels?
4.
Identify the statement which correctly describes the output of the following command: diagnose ips anomaly list
5.
Which statement is one disadvantage of using FSSO NetAPI polling mode over FSSO Security Event Log (WinSecLog) polling mode?
6.
Which statement describes what the CLI command diagnose debug authd fsso list is used for
7.
When the SSL proxy is NOT doing man-in-the-middle interception of SSL traffic, which certificate field can be used to determine the rating of a website?
8.
Bob wants to send Alice a file that is encrypted using public key cryptography. Which of the following statements is correct regarding the use of public key cryptography in this scenario?
9.
For data leak prevention, which statement describes the difference between the block and quarantine actions?
10.
Which is one of the conditions that must be met for offloading the encryption and decryption of IPsec traffic to an NP6 processor?