The exhibit shows a FortiGate routing table.

Which of the following statements are correct?(Choose two)
A. The distance values for the route to 192.168.1.0/24 is 200
B. The FortiGate will route the traffic to 172.17.1.2 to next hop with the IP address 192.168.11.254
C. An IP address in the subnet 172.16.78.0/24 has been assigned to the dmz interface.
D. There is only one active default route.
正解:B,D
質問 2:
Examine the following log message for IPS:
2012-07-01 09:54:28 oid=2 log_id=18433 type=ips subtype=anomaly pri=alert vd=root severity=''critical'' src=''192.168.3.168'' dst=''192.168.3.170'' src_int=''port2'' serial=0 status=''detected'' proto=1 service=''icmp'' count=1 attack_name=''icmp_flood'' icmp_id=''0xa8a4''
icmp_type=''0x08'' icmp_code=''0x00'' attack_id=16777316 sensor=''1''
ref=''http://www.fortinet.com/ids/VID16777316'' msg=''anomaly: icmp_flood, 51 > threshold
50''
Which statement is correct about the above log? (Choose two.)
A. The target is 192.168.3.170.
B. The target is 192.168.3.168.
C. The attack was blocked.
D. The attack was NOT blocked.
正解:A,C
質問 3:
What are the advantages of FSSO DC mode over polling mode?
A. Scalability
B. Allows transparent authentication.
C. Redundancy in the collector agent.
D. DC agents are not required in the AD domain controllers.
正解:D
質問 4:
Which answer best describes what an "Unknown Application" is?
A. Any traffic that does not match an application control signature
B. Traffic that does not match the RFC pattern for its protocol.
C. A packet that fails the CRC check.
D. All traffic that matches the internal signature for unknown applications.
正解:A
質問 5:
Bob wants to send Alice a file that is encrypted using public key cryptography.
Which of the following statements is correct regarding the use of public key cryptography in this scenario?
A. Bob will use his public key to encrypt the file and Alice will use Bob's private key to decrypt the file.
B. Bob will use Alice's public key to encrypt the file and Alice will use her private key to decrypt the file.
C. Bob will use his private key to encrypt the file and Alice will use her private key to decrypt the file.
D. Bob will use his public key to encrypt the file and Alice will use her private key to decrypt the file.
正解:B