Prévia do material em texto
Question 32 Correct 1 points out of 1 Question 33 Correct 1 points out of 1 Question 34 Correct 1 points out of 1 Question 35 Correct 1 points out of 1 Which piece of information does FortiGate know about the user without firewall authentication? Select one: The application being used The user login name The originating domain name The source IP address What is grayware? Select one: Unsolicited programs installed without user consent Known malware with existing signatures Malicious files sent to the sandbox for inspection New and unknown malware variants How does FortiGate application control address evasion techniques used by peer-to-peer protocols? Select one: By allowing traffic from only well-known ports. By examining a URL block list By monitoring traffic for known patterns By analyzing flow-based inspection What is the purpose of creating a firewall address object? Select one: To define the action for a firewall policy To specify the source and destination interfaces To match the source or destination IP subnet To enable web filtering for a specific address 23/05/2024, 01:32 FortiGate 7.4 Operator Exam: Attempt review https://training.fortinet.com/mod/quiz/review.php?attempt=19068614&cmid=485066 9/11