Refer to the exhibit.
FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)
A. Enable the Use X-Forwarded-For setting on FortiWeb.
B. No Special configuration is required; connectivity will be re-established after the set timeout.
C. Place FortiWeb in front of FortiADC.
D. Enable the Add X-Forwarded-For setting on FortiWeb.
An organization has decided to automate specific tasks by leveraging the fortiADC REST API. The tasks will perform updates to existing items. Which REST API method should you use to update existing items on FortiADC?
A. PATCH
B. POST
C. GET
D. PUT
Which two statements about Layer 7 application delivery control are true? (Choose two.)
A. It provides more intelligent traffic distribution decisions
B. It provides the fastest traffic processing
C. It supports only IPv4
D. It requires more packets to make a decision
Refer to the exhibit.
The exhibit shows the first few lines of three scripts, and a virtual server configuration leveraging these scripts.
Based on the way FortiADC prioritizes script execution, in what order will the scripts execute?
A. COOKIE_COMMANDS, GENERAL_REDIRECT, GEOIP_UTILITY
B. COOKIE_COMMANDS< GEOIP_UTILITY, GENERAL_REDIRECT
C. GEOIP_UTILITY, GENERAL_ REDIRECT, COOKIE_COMMAND
Which two FortiADC features can you um to harden the device and server security? (Choose two.)
A. Connection limits
B. Web filtering
C. Antivirus scanning
D. FortiGuard IP reputation
Refer to the exhibits.
Which show the HA configurations for two FortiADC devices
If both FortiADC devices are operational, which FortiADC is the active device in the cluster?
A. The FortiADC with the highest HA uptime value
B. The FortiADC with the highest sorting serial number
C. FortiADC-1
D. FortiADC-2
Which two statements about virtual tunneling for outbound link load balancing are true? (Choose two.)
A. Link policies are used to specify which traffic is sent through each virtual tunnel.
B. Each virtual tunnel can contain no more than three IP tunnel.
C. Two dispatch algorithms are supported weighted round robin and source destination hash.
D. A virtual tunnel can combine point to point and multipoint IP tunnels.
An administrator is managing a web site that uses specialized servers for streaming, in addition to servers that handle HTTP traffic.
To make sure that specialized servers handle the streaming traffic, what FortiADC capacity should they use?
A. Persistence rules
B. Content routing
C. Dynamic load balancing
D. HTTP compression
Which two actions can FortiADC take with the GeoIP block list when receiving requests from a blocked country's address space? (Choose two.)
A. Deny access
B. Redirect the request
C. Apply an HTTP protocol constraint
D. Send a 404 Not Found message
An administrator has configured all the back end servers with a maximum warm-up state rate.
Under which two conditions is the maximum rate enforced by FortiADC? (Choose two.)
A. As long as a server keeps replying to the health Check
B. When multiple health check methods have been configured for a server and some of them are failing but at least one is up.
C. When the status of a server is set to Enabled from Maintain of Disabled
D. During a warm-up period, when a server is back online after a health check downtime