Prévia do material em texto
Question 12 Correct 1 points out of 1 Question 13 Correct 1 points out of 1 Question 14 Correct 1 points out of 1 Question 15 Correct 1 points out of 1 Which two items should you configure as the source of a firewall policy, to allow all internal users in a small office to access the internet? (Choose two.) Select one or more: Security profiles Application signatures The IP subnet of the LAN Users or user groups You need to examine the logs related to local users watching YouTube videos. Where can you find those logs? Select one: Log and Report > Security Events > WebFilter Log and Report > Security Events > Application Control Log and Report > Security Events > Antivirus Log and Report > Security Events > Intrusion Prevention Which inspection mode examines traffic as a whole before determining an action? Select one: Proxy-based inspection Flow-based inspection Application-level inspection Stateful inspection What are the three key categories of services provided by FortiGuard Labs? Select one: Machine learning, antivirus, and network monitoring Data encryption, network segmentation, and access control Threat hunting, intrusion detection, and firewall management Artificial intelligence, real-time threat protection, and outbreak alerts 23/05/2024, 01:55 FortiGate 7.4 Operator Exam: Attempt review https://training.fortinet.com/mod/quiz/review.php?attempt=19068929&cmid=485066 4/11