1.
An administrator wishes to generate a report showing Top Traffic by service type, but wants to exclude SMTP traffic from the report. Which of the following statements best describes how to do this?
2.
An organization wishes to protect its SIP Server from call flooding attacks. Which of the following configuration changes can be performed on the FortiGate unit to fulfill this requirement?
3.
In a High Availability configuration operating in Active-Active mode, which of the following correctly describes the path taken by a load-balanced HTTP session?
4.
The following diagnostic output is displayed in the CLI: Based on this output, which of the following statements is correct?
5.
Which of the following statements is correct about configuring web filtering overrides?
6.
The transfer of encrypted files or the use of encrypted protocols between users and servers on the internet can frustrate the efforts of administrators attempting to monitor traffic passing through the FortiGate unit and ensuring user compliance to corporate rules. Which of the following items will allow the administrator to control the transfer of encrypted data through the FortiGate unit? (Select all that apply.)
7.
The following ban list entry is displayed through the CLI. Based on this command output, which of the following statements is correct?
8.
What protocol cannot be used with the active authentication type?
9.
Which statement best describes the objective of the SYN proxy feature available in SP processors?
10.
An Internet browser is using the WPAD DNS method to discover the PAC file's URL. The DNS server replies to the browser's request with the IP address 10.100.1.10. Which URL will the browser use to download the PAC file?