When browsing to an internal web server using a web-mode SSL VPN bookmark, from which of the following source IP addresses would the web server consider the HTTP request to be initiated?
A. The FortiGate unit's internal IP address.
B. The FortiGate unit's external IP address.
C. The remote user's virtual IP address.
D. The remote user's public IP address.
正解:A
質問 2:
In which order are firewall policies processed on the FortiGate unit?
A. They are processed using a policy hierarchy scheme that allows for multiple decision branching.
B. They are processed based on a priority value assigned through the priority column in the policy window.
C. They are processed from the top down as they appear in Web Config.
D. They are processed based on the policy ID number shown in the left hand column of the policy window.
正解:C
質問 3:
Users may require access to a web site that is blocked by a policy. Administrators can give users the ability to override the block. Which of the following statements regarding overrides is NOT correct?
A. A web filter profile may only have one user group defined as an override group.
B. Overrides can be allowed by the administrator for a specific period of time.
C. A firewall user group can be used to provide override privileges for FortiGuard Web Filtering.
D. When requesting an override, the matched user must belong to a user group for which the override capabilty has been enabled.
正解:A
質問 4:
Which Fortinet products & features could be considered part of a comprehensive solution to monitor and prevent the leakage of senstive data? (Select all that apply.)
A. Apply a DLP sensor to a firewall policy.
B. Configure FortiClient to prevent files flagged as sensitive from being copied to a USB disk.
C. Restrict unofficial methods of transferring files such as P2P using Application Control lists on a FortiGate.
D. Archive non-compliant outgoing e-mails using FortiMail.
E. Monitor database activity using FortiAnalyzer.
正解:A,C,D
質問 5:
Each UTM feature has configurable UTM objects such as sensors, profiles or lists that define how the feature will function.
An administrator must assign a set of UTM features to a group of users.
Which of the following is the correct method for doing this?
A. The administrator must enable the UTM features in an identify-based policy applicable to the user group.
B. The administrator must apply the UTM features directly to a user object.
C. Enable a set of unique UTM features under "Edit User Group".
D. When defining the UTM objects, the administrator must list the user groups which will use the UTM object.
正解:A
質問 6:
Which of the following statements are correct regarding logging to memory on a FortiGate unit? (Select all that apply.)
A. If the FortiGate unit is reset or loses power, log entries captured to memory will be lost.
B. None of the above.
C. When the system has reached its capacity for log messages, the FortiGate unit overwrites the oldest messages.
D. When the system has reached its capacity for log messages, the FortiGate unit will stop logging to memory.
正解:A,C
杉浦** -
今日はいい日ですね。ずっと悩んでいるFCNSA.v5試験に合格しました。貴社が提供するFCNSA.v5問題集はとても有効です。ありがとうございます。