Fortinet FCP_FWB_AD-7.4 Practice Test - Questions Answers, Page 2

List of questions
Question 11

Refer to the exhibits.
What will happen when a client attempts a mousedown cross-site scripting (XSS) attack against the site http://my.blog.org/userl1/blog.php and FortiWeb is enforcing the highlighted signature?
The connection will be stripped of the mousedown JavaScript code.
The connection will be blocked as an XSS attack.
FortiWeb will report the new mousedown attack to FortiGuard.
The connection will be allowed.
In the provided configuration, the signature exception has been set for the URL http://my.blog.org/user1V. This means that any request to this specific URL will bypass the signature ID 01000001, which is designed to block cross-site scripting (XSS) attacks using the mousedown event. As the request comes from the URL http://my.blog.org/userl1/blog.php, which does not match the exception rule for http://my.blog.org/user1V, the attack will be allowed through.
Therefore, the connection will be allowed because the exception rule bypasses protection for the specified URL.
Question 12

What can a FortiWeb administrator do if a client has been incorrectly period blocked?
Allow the period block to expire on its own, you cannot override it.
Manually release the IP address from the blocklist.
Disable and re-enable the server policy.
Force a new IP address to the client.
If a client has been incorrectly blocked due to a period block, the FortiWeb administrator can manually release the IP address from the blocklist. This allows the client to access the application again before the block expires naturally.
Question 13

Which two functions does the first layer of the FortiWeb anomaly machine learning (ML) analysis mechanism perform? (Choose two.)
Determines whether an anomaly is a real attack or just a harmless anomaly that should be ignored
Determines a probability model behind every parameter and HTTP method passing through FortiWeb
Determines whether traffic is an anomaly, based on observable features overtime
Determines if a detected threat is a false-positive or not
The first layer of the FortiWeb anomaly machine learning (ML) analysis mechanism focuses on analyzing traffic and creating a probability model for parameters and HTTP methods to detect potential anomalies. It also assesses traffic patterns over time to determine whether certain behavior is anomalous. These functions are key to understanding and classifying traffic before further analysis is done.
Question 14

Which is an example of a cross-site scripting (XSS) attack?
SELECT username FROM accounts WHERE username='admin';-- ' AND password='password';
SELECT username FROM accounts WHERE username='XSS' ' AND password='alert('http://badurl.com')';
<IMG SRC='xss.png'>
Cross-Site Scripting (XSS) is a type of web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. This can lead to session hijacking, credential theft, or redirection to malicious sites. XSS attacks typically exploit vulnerabilities in web applications that fail to properly sanitize user input.
Here's an analysis of the given options:
A . SELECT username FROM accounts WHERE username='admin';-- ' AND password='password';
This is an example of SQL Injection (SQLi) rather than XSS. It manipulates SQL queries to bypass authentication, not execute JavaScript in a user's browser.
B .
This is a classic XSS attack.
It uses an tag with a non-existent src attribute.
The onerror event triggers when the image fails to load, executing alert(document.cookie);, which can expose session cookies.
This method is commonly used for stealing cookies or executing arbitrary scripts.
C . SELECT username FROM accounts WHERE username='XSS' ' AND password='alert('http://badurl.com')';
This is neither a valid SQL injection nor a valid XSS attack.
The syntax suggests an incorrect SQL query rather than JavaScript execution in a browser.
D . <IMG SRC='xss.png'>
This is not a valid XSS attack unless there is an additional event handler like onload, onerror, or onmouseover executing JavaScript.
By itself, it just loads an image and does not execute any malicious script.
Thus, Option B is the correct answer as it represents a real-world XSS attack technique.
OWASP XSS Guide: https://owasp.org/www-community/attacks/xss/
Fortinet XSS Protection Documentation: https://docs.fortinet.com/
Question 15

Which Layer 7 routing method does FortiWeb support?
URL policy routing
OSPF
BGP
HTTP content routing
FortiWeb is a Web Application Firewall (WAF) designed to protect web applications from various threats. Among its features, FortiWeb supports Layer 7 routing methods, which operate based on the content of the HTTP/HTTPS traffic.
HTTP Content Routing refers to the capability of directing incoming web traffic to specific backend servers based on characteristics found within the HTTP requests, such as URL paths, headers, or other content. This allows for more granular and efficient distribution of traffic, ensuring that requests are handled by the appropriate servers based on their content.
Analysis of Options:
A . URL policy routing: While this term suggests routing decisions based on URL policies, it is not a standard term used in FortiWeb's documentation. FortiWeb's content routing encompasses URL-based decisions, making this option less precise.
B . OSPF (Open Shortest Path First): This is a Layer 3 routing protocol used for IP routing within an Autonomous System. It operates at the network layer and is not related to Layer 7 routing methods.
C . BGP (Border Gateway Protocol): Another Layer 3 routing protocol, BGP is used for routing between Autonomous Systems on the internet. It does not pertain to Layer 7 or application-layer routing.
D . HTTP content routing: This aligns with FortiWeb's capabilities to make routing decisions based on the content of HTTP requests, such as URL paths, headers, or other application-layer data. This is a Layer 7 routing method supported by FortiWeb.
Therefore, the correct answer is D. HTTP content routing.
FortiWeb 7.2.6 Administration Guide: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' cloud.orange-business.com
FortiWeb Data Sheet: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' Exclusive Networks
FortiWeb on OCB-FE - Installation and Deployment Guide: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' cloud.orange-business.com
These references confirm that FortiWeb supports HTTP content routing as a Layer 7 routing method.
Question 16

Which command will enable debugging for the FortiWeb user tracking feature?
debug enable user-tracking 7
diagnose debug application user-cracking 7
debug application user-cracking 7
diagnose debug enable user-cracking 7
To enable debugging for the user tracking feature in FortiWeb, you would use the command diagnose debug application user-tracking 7. This command enables debugging for the user-tracking application and sets the debug level to 7, providing detailed logs for troubleshooting.
Question 17

Refer to the exhibit.
What is true about this FortiWeb device? (Choose two.)
It has 41% of the disk available for logging.
It was upgraded to a different version after initial installation.
It is currently running version 6.4.0.
It is currently running version 6.4.1.
It was upgraded to a different version after initial installation: The device has multiple partitions with different firmware versions (6.4.0 and 6.4.1), indicating that it was upgraded after the initial installation from version 6.4.0 to 6.4.1.
Question 18

Which high availability (HA) mode uses gratuitous Address Resolution Protocol (ARP) to advertise a failover event to neighboring network devices?
Passive-Passive
Active-Passive
Active-Active
Passive-Active
In Active-Passive high availability (HA) mode, the active unit is responsible for handling traffic while the passive unit remains idle, ready to take over in case of a failure. When a failover occurs, the active unit sends out gratuitous ARP messages to notify neighboring devices about the change in the active unit's IP address. This ensures that the network devices update their ARP tables and can forward traffic to the new active unit.
Question 19

In SAML deployments, which server contains user authentication credentials (username/password)?
Identity provider
Service provider
User database
Authentication client
In SAML (Security Assertion Markup Language) deployments, the Identity Provider (IdP) is responsible for storing and managing user authentication credentials, such as usernames and passwords. The IdP authenticates the user and then issues a SAML assertion to the Service Provider (SP), which allows the user to access services without needing to re-enter credentials.
Question 20

What are two possible impacts of a DoS attack on your web server? (Choose two.)
The web application starts accepting unencrypted traffic.
The web application is unable to accept any more connections because of network socket exhaustion.
The web application server is unable to accept new client sessions due to memory exhaustion.
The web application server database is compromised with data theft.
The web application is unable to accept any more connections because of network socket exhaustion: A Denial of Service (DoS) attack often floods the web server with an overwhelming number of requests, leading to network socket exhaustion. This can prevent the server from accepting new legitimate connections, effectively disrupting service.
The web application server is unable to accept new client sessions due to memory exhaustion: DoS attacks can consume a significant amount of server memory, causing memory exhaustion. This results in the web application being unable to accept new client sessions or handle requests properly.
Question