An administrator is investigating a report of users having intermittent issues with browsing the web. The administrator ran diagnostics and received the output shown in the exhibit.
Examine the diagnostic output shown exhibit. Which of the following options is the most likely cause of this issue?
A. NAT port exhaustion
B. High CPU usage
C. High memory usage
D. High session timeout value
Which one of the following processes is involved in updating IPS from FortiGuard?
A. FortiGate IPS update requests are sent using UDP port 443.
B. Protocol decoder update requests are sent to service.fortiguard.net.
C. IPS signature update requests are sent to update.fortiguard.net.
D. IPS engine updates can only be obtained using push updates.
How can you block or allow to Twitter using a firewall policy?
A. Configure the Destination field as Internet Service objects for Twitter.
B. Configure the Action field as Learn and select Twitter.
C. Configure the Service field as Internet Service objects for Twitter.
D. Configure the Source field as Internet Service objects for Twitter.
An administrator is attempting to allow access to https://fortinet.com through a firewall policy that is configured with a web filter and an SSL inspection profile configured for deep inspection. Which of the following are possible actions to eliminate the certificate error generated by deep inspection? (Choose two.)
A. Implement firewall authentication for all users that need access to fortinet.com.
B. Manually install the FortiGate deep inspection certificate as a trusted CA.
C. Configure fortinet.com access to bypass the IPS engine.
D. Configure an SSL-inspection exemption for fortinet.com.
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?
A. remote user's public IP address
B. The public IP address of the FortiGate device.
C. The remote user's virtual IP address.
D. The internal IP address of the FortiGate device.
View the following exhibit, which shows the firewall policies and the object uses in the firewall policies.
The administrator is using the Policy Lookup feature and has entered the search create shown in the following exhibit.
Which of the following will be highlighted based on the input criteria?
A. Policy with ID1.
B. Policies with ID 2 and 3.
C. Policy with ID 5.
D. Policy with ID 4.
Which is the correct description of a hash result as it relates to digital certificates?
A. A unique value used to verify the input data
B. An output value that is used to identify the person or device that authored the input data.
C. An obfuscation used to mask the input data.
D. An encrypted output value used to safe-guard the input data
Examine the following web filtering log.
Which statement about the log message is true?
A. The action for the category Games is set to block.
B. The usage quota for the IP address 10.0.1.10 has expired
C. The name of the applied web filter profile is default.
D. The web site miniclip.com matches a static URL filter whose action is set to Warning.
Which of the following SD-WAN load ç’ªalancing method use interface weight value to distribute traffic? (Choose two.)
A. Source IP
B. Spillover
C. Volume
D. Session
Which is a requirement for creating an inter-VDOM link between two VDOMs?
A. The inspection mode of at least one VDOM must be proxy-based.
B. At least one of the VDOMs must operate in NAT mode.
C. The inspection mode of both VDOMs must match.
D. Both VDOMs must operate in NAT mode.