Which three actions are valid for static URL filtering?
NSE4_JM

Quiz
•
Computers
•
1st - 2nd Grade
•
Hard

JMTelcom JMTelcom
Used 1+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Allow
Block
Exempt
Shape
Warning
2.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate?
Trusted authentication
FortiTelemetry
SSH
Trusted host
HTTPS
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which is not a FortiGate feature?
Database auditing
Intrusion prevention
Web filtering
Application control
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What actions are possible with Application Control?
Warn
Allow
Block
Traffic Shaping
Quarantine
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An administrator has configured a route-based site-to-site IPsec VPN. Which statement is correct regarding this IPsec VPN configuration?
The IPsec firewall policies must be placed at the top of the list.
This VPN cannot be used as a part of a hub and spoke topology.
Routes are automatically created based on the quick mode selectors.
A virtual IPsec interface is automatically created after the Phase 1 configuration is completed.
6.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What attributes are always included in a log header?
policyid
level
user
time
subtype
7.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which of the following settings can be configured per VDOM?
Operating mode (NAT/route or transparent)
Static routes
Hostname
System time
Firewall Policies
8.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which user group types does FortiGate support for firewall authentication?
RSSO
Firewall
LDAP
NTLM
FSSO
9.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which best describes the mechanism of a TCP SYN flood?
The attackers keeps open many connections with slow data transmission so that other clients cannot start new connections.
The attackers sends a packets designed to sync with the FortiGate
The attacker sends a specially crafted malformed packet, intended to crash the target by exploiting its parser.
The attacker starts many connections, but never acknowledges to fully form them
Similar Resources on Quizizz
13 questions
Kuis suka suka 10

Quiz
•
1st Grade
13 questions
Teknologi Jaringan XI

Quiz
•
2nd Grade
10 questions
Primera evaluación de ataques a la red

Quiz
•
2nd Grade
7 questions
informatica 4 semestre

Quiz
•
1st Grade
11 questions
Bezpieczni w Sieci

Quiz
•
KG - University
6 questions
VMUG Puerto Rico

Quiz
•
1st Grade
8 questions
Partner event Game 1

Quiz
•
1st Grade
14 questions
cyber security

Quiz
•
KG - Professional Dev...
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade