Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which statement about local user accounts is true?

A.

They are best suited for large environments with many users.

B.

They cannot be used for site publishing.

C.

They must be assigned, regardless of any other authentication.

D.

They can be used for SSO.

When integrating FortiWeb and FortiAnalyzer, why is the selection for FortiWeb Version critical? (Choose two)

A.

Defines Log file format

B.

Defines communication protocol

C.

Defines Database Schema

D.

Defines Log storage location

Refer to the exhibit.

There is only one administrator account configured on FortiWeb. What must an administrator do to restrict any brute force attacks that attempt to gain access to the FortiWeb management GUI?

A.

Delete the built-in administrator user and create a new one.

B.

Configure IPv4 Trusted Host # 3 with a specific IP address.

C.

The configuration changes must be made on the upstream device.

D.

Change the Access Profile to Read_Only.

You are using HTTP content routing on FortiWeb. You want requests for web application A to be forwarded to a cluster of web servers, which all host the same web application. You want requests for web application B to be forwarded to a different, single web server.

Which statement about this solution is true?

A.

The server policy applies the same protection profile to all of its protected web applications.

B.

You must put the single web server in to a server pool, in order to use it with HTTP content routing.

C.

You must chain policies so that requests for web application A go to the virtual server for policy A, and requests for web application B go to the virtual server for policy B.

D.

Static or policy-based routes are not required.

In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)

A.

Offline protection

B.

Transparent inspection

C.

True transparent proxy

D.

Reverse proxy

What must you do with your FortiWeb logs to ensure PCI DSS compliance?

A.

Store in an off-site location

B.

Erase them every two weeks

C.

Enable masking of sensitive data

D.

Compress them into a .zip file format