Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two statements describe characteristics of automation stitches? (Choose two answers)

A.

Actions involve only devices included in the Security Fabric.

B.

An automation stitch can have multiple triggers.

C.

Multiple actions can run in parallel.

D.

Triggers can involve external connectors.

Refer to the exhibits.

The system performance output and default configuration of high memory usage thresholds on a FortiGate device are shown.

Based on the system performance output, what are the two possible outcomes? (Choose two.)

A.

Administrators can access FortiGate only through the console port.

B.

FortiGate has entered conserve mode.

C.

FortiGate drops new sessions.

D.

Administrators can change the configuration.

A new administrator is configuring FSSO authentication on FortiGate using DC Agent Mode. Which step is not part of the expected process?

A.

The DC agent sends login event data directly to FortiGate.

B.

FortiGate determines user identity based on the IP address in the FSSO list.

C.

The collector agent forwards login event data to FortiGate.

D.

The user logs into the windows domain.

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

A.

FortiGate uses the AD server as the collector agent.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.

FortiGate does not support workstation check.

D.

FortiGate directs the collector agent to use a remote LDAP server.

A network administrator is reviewing firewall policies in both Interface Pair View and By Sequence View. The policies appear in a different order in each view. Why is the policy order different in these two views?

A.

By Sequence View groups policies based on rule priority, while Interface Pair View always follows the order of traffic logs.

B.

The firewall dynamically reorders policies in Interface Pair View based on recent traffic patterns, but By Sequence View remains static.

C.

Interface Pair View sorts policies based on matching interfaces, while By Sequence View shows the actual processing order of rules.

D.

Policies in Interface Pair View are prioritized by security levels, while By Sequence View strictly follows the administrator's manual ordering.

Refer to the exhibits.

You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.

You cannot access any of the Google applications, but you are able to access www.fortinet.com.

Which two actions would you take to resolve the issue? (Choose two.)

A.

Set SSL inspection to deep-content inspection.

B.

Move up Google in the Application and Filter Overrides section to set its priority lot

C.

Add "Google".com to the URL category in the security profile.

D.

Change the Inspection mode to Flow-based

E.

Set the action for Google in the Application and Filter Overrides section to Allow

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

A.

The collector agent uses a Windows API to query DCs for user logins.

B.

The NetSessionEnum function is used to track user logouts.

C.

NetAPI polling can increase bandwidth usage in large networks.

D.

The collector agent must search Windows application event logs.

Refer to the exhibits.

You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.

Which two factors can you observe from these configurations? (Choose two.)

A.

YouTube access is blocked based on Excessive-Bandwidth Application and Filter override settings.

B.

Facebook access is blocked based on the category filter settings.

C.

Facebook access is allowed but you cannot play Facebook videos based on Video/Audio category filter settings.

D.

YouTube search is allowed based on the Google Application and Filter override settings.