Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application.

What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?

A.

Blocklist any suspected IPs.

B.

Configure a brute force login custom policy.

C.

Rate limit all connections from suspected IP addresses.

D.

Block the IP address at the border router.

Which implementation is most suited for a deployment that must meet PCI DSS compliance criteria?

A.

SSL offloading with FortiWeb in reverse proxy mode

B.

SSL offloading with FortiWeb in PCI DSS mode

C.

SSL offloading with FortiWeb in transparency mode

D.

SSL offloading with FortiWeb in full transparent proxy mode

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers.

When an attack occurs, FortiWeb blocks traffic based on the192.0.2.1source IP address, which belongs to FortiADC. This setup is breaking all connectivity and genuine clients are not able to access the servers.

What can the administrator do to avoid this problem? (Choose two.)

A.

Enable and configure the Preserve Client IP setting on the client.

B.

No special configuration is required; connectivity will be re-established for all clients after the set timeout.

C.

Place FortiWeb in front of FortiADC.

D.

Enable and configure the Use X-Forwarded-For setting on FortiWeb.

In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)

A.

True transparent proxy

B.

Virtual proxy

C.

Transparent inspection

D.

Reverse proxy

Which is an example of a cross-site scripting (XSS) attack?

A.

SELECT username FROM accounts WHERE username='admin';-- ' AND password='password';

B.

C.

SELECT username FROM accounts WHERE username='XSS' ' AND password='alert("http://badurl.com")';

D.

What are two results of enabling monitor mode on FortiWeb? (Choose two.)

A.

It does not affect denial-of-service (DoS) protection profile actions to rate limit traffic.

B.

It uses the default action for all profiles and, depending on the configuration, blocks or allows traffic.

C.

It does not affect any HTML rewriting or redirection actions in web protection profiles.

D.

It overrides all usual profile actions. FortiWeb accepts all requests and generates alert email or log messages only for violations.

A customer wants to be able to index your websites for search and advertisement purposes.

What is the easiest way to allow this on a FortiWeb?

A.

Add the indexer IP address to the trusted IP list on the FortiWeb.

B.

Add the indexer IP address tothe FortiGuard "Known Search Engines" category.

C.

Create a firewall rule to bypass the FortiWeb entirely for the indexer IP address.

D.

Do not allow any external sites to index your websites.

An attacker attempts to send an SQL injection attack containing the known attack string 'root'; -- through an API call.

Which FortiWeb inspection feature will be able to detect this attack the quickest?

A.

API gateway rule

B.

Known signatures

C.

Machine learning(ML)-based API protection—anomaly detection

D.

ML-based API protection—threat detection

Refer to the exhibit.

What are two additional configuration elements that you must be configure for this API gateway? (Choose two.)

A.

You must define rate limits.

B.

You must define URL prefixes.

C.

You must select a setting in the Allow User Group field.

D.

You must enable and configure Host Status.

Which command will enable debugging for the FortiWeb user tracking feature?

A.

debug enable user-tracking7

B.

diagnose debug application user-cracking 7

C.

debug application user-cracking 7

D.

diagnose debug enable user-cracking 7