Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two recommendations prevent invalid paths when using zero phase 2 selectors?

A.

Routing protocols

B.

Exact selectors

C.

Aggregate IPsec

D.

Assign tunnel IP

An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.

What two conclusions can the administrator draw? (Choose two.)

A.

The suspicious packet is related to a cluster that has VDOMs enabled.

B.

The network includes FortiGate devices configured with the FGSP protocol.

C.

The suspicious packet is related to a cluster with a group-id value lower than 255.

D.

The suspicious packet corresponds to port 7 on a FortiGate device.

How do you allow IPS inspection of inbound HTTPS traffic?

A.

Enable HTTP

B.

Enable HTTPS mapping

C.

Enable SMTPS

D.

Disable inspection