1.
WAN optimization is configured in Active/Passive mode. When will the remote peer accept an attempt to initiate a tunnel?
2.
SSL Proxy is used to decrypt the SSL-encrypted traffic. After decryption, where is the traffic buffered in preparation for content inspection?
3.
An administrator logs into a FortiGate unit using an account which has been assigned a super_admin profile. Which of the following operations can this administrator perform?
4.
Which of the following statements is correct about how the FortiGate unit verifies username and password during user authentication?
5.
In the Tunnel Mode widget of the web portal, the administrator has configured an IP Pool and enabled split tunneling. Which of the following statements is true about the IP address used by the SSL VPN client?
6.
The Host Check feature can be enabled on the FortiGate unit for SSL VPN connections. When this feature is enabled, the FortiGate unit probes the remote host computer to verify that it is safe before access is granted. Which of the following items is NOT an option as part of the Host Check feature?
7.
Which of the following report templates must be used when scheduling report generation?
8.
Which of the following statements is not correct regarding virtual domains (VDOMs)?
9.
What advantages are there in using a fully Meshed IPSec VPN configuration instead of a hub and spoke set of IPSec tunnels?
10.
An administrator wishes to generate a report showing Top Traffic by service type, but wants to exclude SMTP traffic from the report. Which of the following statements best describes how to do this?