lo q falta

lo q falta

3rd Grade

10 Qs

quiz-placeholder

Similar activities

Year 10 Forms of Expression- Symbols

Year 10 Forms of Expression- Symbols

KG - 12th Grade

10 Qs

The Holy Spirit

The Holy Spirit

3rd - 7th Grade

10 Qs

Joshua and Caleb

Joshua and Caleb

2nd - 3rd Grade

10 Qs

Muslim Festivals

Muslim Festivals

2nd - 5th Grade

10 Qs

Honoring the Parents

Honoring the Parents

3rd Grade

15 Qs

Epiphany

Epiphany

KG - 12th Grade

13 Qs

Shadrech Meshach Abednego

Shadrech Meshach Abednego

KG - 5th Grade

12 Qs

Surat ul Falaq

Surat ul Falaq

1st - 5th Grade

11 Qs

lo q falta

lo q falta

Assessment

Quiz

Religious Studies

3rd Grade

Easy

Created by

heber molero

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

what are two functions of the ZTNA rule? choose two

it redirects the client request to the access proxy

it applies security profiles to protect traffic

it defines the access proxy

it enforces access control

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

the exhibit shows a diagram of a foritgate devicen connected to the network and the firewall policy and IP pool configuration on the fortigate device..............choose two

fortigate allocates port blocks on a firts-come, firts-server basis

fortigate allocates 128 port blocks per user

fortigate generates a system event log for every port block allocation made user

fortigate allocates port blocks per user, based on the configured range of internal IP address.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

the exhibits show a firewall policy (exhibit A) and an antivirus profile(exhibit B) why is the user unable to receive a block replacement message when downloading an infected file for the first time?

the firewall policy performs a full content inspection on the file

the intrusion prevention security profile must be enabled when using flow-based inspection mode

the volume of traffic being inspected is too high for this model of fortigate

flow-based inspection is used, which resets the last packet to the user

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

which three statements about a flow-based antivirus profile are correct?choose two

fortigate buffers the whole file but transmits to the client simultaneously

optimized performance compared to proxy-based inspection

if the virus is detected the last packets is deli vered to the client

flow-based inspection uses a hybrid of scanning modes available in proxy-based inspection

IPS engine handles the process as a standalone

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

based on the raw log, which two statement are correct?choose two

traffic is blocked because action is set to DENY in the firewall policy

log severity is set to error on fortigate

traffic belongs to the root VDOM

this is a security log

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

what are two functions of the ZTNA rule? choose two

it redirects the client request to the access proxy

it applies security profiles to protect traffic

it defines the access proxy

it enforces access control

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

the exhibit shows a diagram of a foritgate devicen connected to the network and the firewall policy and IP pool configuration on the fortigate device..............choose two

fortigate allocates port blocks on a firts-come, firts-server basis

fortigate allocates 128 port blocks per user

fortigate generates a system event log for every port block allocation made user

fortigate allocates port blocks per user, based on the configured range of internal IP address.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?