1.
Under what circumstance would you enable LEARN as the Action on a firewall policy?
2.
You are tasked to architect a new IPsec deployment with the following criteria:
- There are two HQ sites that all satellite offices must connect to.
- The satellite offices do not need to communicate directly with other satellite offices.
- No dynamic routing will be used.
- The design should minimize the number of tunnels being configured.
Which topology should be used to satisfy all of the requirements?
3.
What step is required to configure an SSL VPN to access to an internal server using port forward mode?
4.
A company needs to provide SSL VPN access to two user groups. The company also needs to display different welcome messages on the SSL VPN login screen for both user groups. What is required in the SSL VPN configuration to meet these requirements?
5.
How can a browser trust a web-server certificate signed by a third party CA?
6.
An administrator has enabled proxy-based antivirus scanning and configured the following settings: Which statement about the above configuration is true?
7.
An administrator has created a custom IPS signature. Where does the custom IPS signature have to be applied?
8.
An administrator wants to configure a FortiGate as a DNS server. The FortiGate must use its DNS database first, and then relay all irresolvable queries to an external DNS server. Which of the following DNS method must you use?
9.
What information is flushed when the chunk-size value is changed in the config dlp settings?
10.
How does FortiGate select the central SNAT policy that is applied to a TCP session?