Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet FCP_FWB_AD-7.4 - FCP - FortiWeb 7.4 Administrator

Page: 1 / 1
Total 36 questions

Review the following configuration:

Which result would you expect from this configuration setting?

A.

When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples from the same source IP address.

B.

When ML is in its running phase, FortiWeb will accept an unlimited number of samples from the same source IP address.

C.

When ML is in its collecting phase, FortiWeb will accept an unlimited number of samples from the same source IP address.

D.

When ML is in its collecting phase, FortiWeb will not accept any samples from any IP addresses.

Which would be a reason to implement HTTP rewriting?

A.

To redirect HTTP to HTTPS.

B.

To implement load balancing.

C.

To replace a vulnerable element in a requested URL.

D.

The original page has moved to a new URL.

Which high availability (HA) mode uses gratuitous Address Resolution Protocol (ARP) to advertise a failover event to neighboring network devices?

A.

Passive-Passive

B.

Active-Passive

C.

Active-Active

D.

Passive-Active

What is the difference between an API gateway protection schema and a machine learning (ML) API protection schema?

A.

An API gateway protection schema does not allow authentication.

B.

An API gateway protection schema handles response bodies.

C.

An API gateway protection schema supports data types other than string.

D.

An API gateway protection schema cannot change without administrator intervention.

You are using HTTP content routing on FortiWeb. You want requests for web application A to be forwarded to a cluster of web servers, which all host the same web application. You want requests for web application B to be forwarded to a different, single web server.

Which statement regarding this solution is true?

A.

You must chain policies so that all requests go to the virtual server for policy A first, and then redirect requests for web application B to go to the virtual server for policy B

B.

You must create static routes on the FortiWebto allow these requests.

C.

You must put the single web server for application B into a server pool and use it with HTTP content routing.

D.

The server policy always applies the same web protection profile to both web application A and web application B.

Refer to the exhibit.

What can you conclude from this support vector machine (SVM) plot of a potential bot connection?

A.

The connection is normal and within the expected averages.

B.

The connection uses too much bandwidth.

C.

The connection uses an excessive amount of TCP connections, but is harmless.

D.

The connection is possibly a bot.

A customer wants to be able to index your websites for search and advertisement purposes.

What is the easiest way to allow this on a FortiWeb?

A.

Add the indexer IP address to the trusted IP list on the FortiWeb.

B.

Add the indexer IP address tothe FortiGuard "Known Search Engines" category.

C.

Create a firewall rule to bypass the FortiWeb entirely for the indexer IP address.

D.

Do not allow any external sites to index your websites.

Refer to the exhibit.

What is true about this FortiWeb device? (Choose two.)

A.

It has 41% of the disk available for logging.

B.

It was upgraded to a different version after initial installation.

C.

It is currently running version 6.4.0.

D.

It is currently running version 6.4.1.

Review the following configuration:

What are two routing behaviors that you can expect on FortiWeb after this configuration change? (Choose two.)

A.

Non-HTTP traffic routed through the FortiWeb is allowed.

B.

IPv6 routing is enabled.

C.

Non-HTTP traffic destined to the FortiWeb virtual server IP address is dropped.

D.

Only ICMP traffic is allowed. All other traffic is dropped.

An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application.

What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?

A.

Blocklist any suspected IPs.

B.

Configure a brute force login custom policy.

C.

Rate limit all connections from suspected IP addresses.

D.

Block the IP address at the border router.