Question 1
Question 2
Question
What is a more accurate description of a modern firewall?
Answer
-
A. A device that inspects network traffic at an entry point to the Internet and within a simple, easily- defined network perimeter.
-
B. A multi-functional device that inspects network traffic from the perimeter or internally, within a network that has many different entry points.
Question 3
Question
What solution, specific to Fortinet, enhances performance and reduces latency for specific features and traffic?
Question 4
Question
Resetting a lost password administrator
Question 5
Question
Maintainer user for reset lost password can´t be disabled.
Question 6
Question
How do you restrict logins to FortiGate to be only from specific IP addresses?
Question 7
Question
As a best security practice when configuring administrative access to FortiGate, which protocol should be disabled?
Question 8
Question
To access the maintainer account during a recovery, begin by:
Question 9
Question
When configuring FortiGate as a DHCP server to restrict access by MAC address, what does the Assign IP option do?
Question 10
Question
When configuring FortiGate as a DNS server, which resolution method uses the FortiGate DNS database only to try to resolve queries?
Answer
-
A. Non-recursive
-
B. Recursive
Question 11
Question
When restoring an encrypted system configuration file, in addition to needing the FortiGate model and firmware version from the time the configuration file was produced, you also must provide:
Question 12
Question
Which document should you consult to increase the chances of success before upgrading or downgrading firmware?
Question 13
Question
Fortinet Security Fabric (Select 6)
Answer
-
Endpoint
-
SIEM
-
Management
-
SDN
-
Cloud
-
Virtual
-
Appliance
-
UTM
-
Layer-2
Question 14
Question
Security Fabric attributes
Answer
-
Broad
Powerful
Automated
-
Integration
Secure
Fast
Question 15
Question
Devices That Comprise the Security Fabric
Question 16
Question
What are the essential devices that are required by the Fortinet security fabric?
Answer
-
A. FortiAnalyzer, FortiManager, and FortiGates
-
B. FortiAnaIyzer and FortiGates
Question 17
Question
What was a strategy discussed in this section to contain network breaches?