Questão 1
Questão 2
Questão
What is a more accurate description of a modern firewall?
Responda
-
A. A device that inspects network traffic at an entry point to the Internet and within a simple, easily- defined network perimeter.
-
B. A multi-functional device that inspects network traffic from the perimeter or internally, within a network that has many different entry points.
Questão 3
Questão
What solution, specific to Fortinet, enhances performance and reduces latency for specific features and traffic?
Questão 4
Questão
Resetting a lost password administrator
Questão 5
Questão
Maintainer user for reset lost password can´t be disabled.
Questão 6
Questão
How do you restrict logins to FortiGate to be only from specific IP addresses?
Questão 7
Questão
As a best security practice when configuring administrative access to FortiGate, which protocol should be disabled?
Questão 8
Questão
To access the maintainer account during a recovery, begin by:
Questão 9
Questão
When configuring FortiGate as a DHCP server to restrict access by MAC address, what does the Assign IP option do?
Questão 10
Questão
When configuring FortiGate as a DNS server, which resolution method uses the FortiGate DNS database only to try to resolve queries?
Responda
-
A. Non-recursive
-
B. Recursive
Questão 11
Questão
When restoring an encrypted system configuration file, in addition to needing the FortiGate model and firmware version from the time the configuration file was produced, you also must provide:
Questão 12
Questão
Which document should you consult to increase the chances of success before upgrading or downgrading firmware?
Questão 13
Questão
Fortinet Security Fabric (Select 6)
Responda
-
Endpoint
-
SIEM
-
Management
-
SDN
-
Cloud
-
Virtual
-
Appliance
-
UTM
-
Layer-2
Questão 14
Questão
Security Fabric attributes
Responda
-
Broad
Powerful
Automated
-
Integration
Secure
Fast
Questão 15
Questão
Devices That Comprise the Security Fabric
Questão 16
Questão
What are the essential devices that are required by the Fortinet security fabric?
Responda
-
A. FortiAnalyzer, FortiManager, and FortiGates
-
B. FortiAnaIyzer and FortiGates
Questão 17
Questão
What was a strategy discussed in this section to contain network breaches?