1.
Which of the following regular expression patterns make the terms confidential data case insensitive?
2.
In the case of TCP traffic, which of the following correctly describes the routing table lookups performed by a FortiGate operating in NAT/Route mode, when searching for a suitable gateway?
3.
Examine the two static routes to the same destination subnet 172.20.168.0/24 as shown below; then answer the question following it. Which of the following statements correctly describes the static routing configuration provided above?
4.
A FortiGate is configured with three virtual domains (VDOMs). Which of the following statements is correct regarding multiple VDOMs?
5.
In transparent mode, forward-domain is an CLI setting associate with ___________.
6.
Which of the following sequences describes the correct order of criteria used for the selection of a master unit within a FortiGate high availability (HA) cluster when override is disabled?
7.
Which statement is one disadvantage of using FSSO NetAPI polling mode over FSSO Security Event Log (WinSecLog) polling mode?
8.
When the SSL proxy is NOT doing man-in-the-middle interception of SSL traffic, which certificate field can be used to determine the rating of a website?
9.
Which Fortinet products & features could be considered part of a comprehensive solution to monitor and prevent the leakage of sensitive data? (Select all that apply.)
10.
For data leak prevention, which statement describes the difference between the block and quarantine actions?