When generating a protection configuration from an auto learning report what critical step must you do before generating the final protection configuration?
A. Restart the FortiWeb to clear the caches
B. Drill down in the report to correct any false positives.
C. Activate the report to create t profile
D. Take the FortiWeb offline to apply the profile
How does an ADOM differ from a VDOM?
A. ADOMs do not have virtual networking
B. ADOMs improve performance by offloading some functions.
C. ADOMs only affect specific functions, and do not provide full separation like VDOMs do.
D. Allows you to have 1 administrator for multiple tenants
You are configuring FortiAnalyzer to store logs from FortiWeb. Which is true?
A. FortiAnalyzer will store antivirus and DLP archives from FortiWeb.
B. You must enable ADOMs on FortiAnalyzer.
C. To store logs from FortiWeb 6.0, on FortiAnalyzer, you must select "FrotiWeb 5.4".
D. FortiWeb will query FortiAnalyzer for reports, instead of generating them locally.
Which of the following would be a reason for implementing rewrites?
A. Page has been moved to a new URL
B. Page has been moved to a new IP address
C. Replace vulnerable functions.
D. Send connection to secure channel
Which is true about HTTPS on FortiWeb? (Choose three.)
A. For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server policy.
B. After enabling HSTS, redirects to HTTPS are no longer necessary.
C. In true transparent mode, the TLS session terminator is a protected web server.
D. Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb to only offer TLS 1.2.
E. In transparent inspection mode, you select which certificate that FortiWeb will present in the server pool, not in the server policy.
In which operation mode(s) can FortiWeb modify HTTP packets? (Choose two.)
A. Transparent Inspection
B. Offline protection
C. True transparent proxy
D. Reverse proxy
What other consideration must you take into account when configuring Defacement protection A. Use FortiWeb to block SQL Injections and keep regular backups of the Database
B. Also incorporate a FortiADC into your network
C. None. FortiWeb completely secures the site against defacement attacks
D. Configure the FortiGate to perform Anti-Defacement as well
Under what circumstances would you want to use the temporary uncompress feature of FortiWeb?
A. In the case of compression being done on the FortiWeb, to inspect the content of the compressed file
B. In the case of the file being a .MP3 music file
C. In the case of compression being done on the web server, to inspect the content of the compressed file.
D. In the case of the file being an .MP4 video
What is one of the key benefits of the FortiGuard IP Reputation feature?
A. FortiGuard maintains a list of public IPs with a bad reputation for participating in attacks.
B. It is updated once per year
C. Provides a Document of IP addresses that are suspect, so that administrators can manually update their blacklists
D. It maintains a list of private IP addresses
When the FortiWeb is configured in Reverse Proxy mode and the FortiGate is configured as an SNAT device, what IP address will the FortiGate's Real Server configuration point at?
A. Virtual Server IP on the FortiGate
B. Server's real IP
C. FortiWeb's real IP
D. IP Address of the Virtual Server on the FortiWeb
You are using HTTP content routing on FortiWeb. Requests for web app A should be forwarded to a
cluster of web servers which all host the same web app. Requests for web app B should be forwarded to a
different, single web server.
Which is true about the solution?
A. Static or policy-based routes are not required.
B. To achieve HTTP content routing, you must chain policies: the first policy accepts all traffic, and forwards requests for web app A to the virtual server for policy A. It also forwards requests for web app B to the virtual server for policy B. Policy A and Policy B apply their app-specific protection profiles, and then distribute that app's traffic among all members of the server farm.
C. You must put the single web server into a server pool in order to use it with HTTP content routing.
D. The server policy applies the same protection profile to all its protected web apps.
You've configured an authentication rule with delegation enabled on FortiWeb. What happens when a user tries to access the web application?
A. FrotiWeb redirects users to a FortiAuthenticator page, then if the user authenticates successfully, FortiGate signals to FortiWeb to allow access to the web app
B. ForitWeb redirects the user to the web app's authentication page
C. FortiWeb forwards the HTTP challenge from the server to the client, then monitors the reply, allowing access if the user authenticates successfully
D. FortiWeb replies with a HTTP challenge of behalf of the server, the if the user authenticates successfully, FortiWeb allows the request and also includes credentials in the request that it forwards to the web app
When integrating FortiWeb and FortiAnalyzer, why is the selection for FortiWeb Version critical? (Choose two)
A. Defines Log file format
B. Defines communication protocol
C. Defines Database Schema
D. Defines Log storage location
Which of the following FortiWeb features is part of the mitigation tools against OWASP A4 threats?
A. Sensitive info masking
B. Poison Cookie detection
C. Session Management
D. Brute Force blocking
Reverse-proxy mode is best suited for use in which type of environment?
A. New networks where infrastructure is not yet defined
B. Environments where you cannot change your IP addressing scheme
C. Flexible environments where you can easily change the IP addressing scheme
D. Small Office/Home Office environments