ExamGecko
Home / Fortinet / FCP_FWB_AD-7.4 / List of questions
Ask Question

Fortinet FCP_FWB_AD-7.4 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Refer to the exhibits.

Fortinet FCP_FWB_AD-7.4 image Question 11 6387800638454096382831

Fortinet FCP_FWB_AD-7.4 image Question 11 6387800638454096382831

What will happen when a client attempts a mousedown cross-site scripting (XSS) attack against the site http://my.blog.org/userl1/blog.php and FortiWeb is enforcing the highlighted signature?

The connection will be stripped of the mousedown JavaScript code.

The connection will be stripped of the mousedown JavaScript code.

The connection will be blocked as an XSS attack.

The connection will be blocked as an XSS attack.

FortiWeb will report the new mousedown attack to FortiGuard.

FortiWeb will report the new mousedown attack to FortiGuard.

The connection will be allowed.

The connection will be allowed.

Suggested answer: D
Explanation:

In the provided configuration, the signature exception has been set for the URL http://my.blog.org/user1V. This means that any request to this specific URL will bypass the signature ID 01000001, which is designed to block cross-site scripting (XSS) attacks using the mousedown event. As the request comes from the URL http://my.blog.org/userl1/blog.php, which does not match the exception rule for http://my.blog.org/user1V, the attack will be allowed through.

Therefore, the connection will be allowed because the exception rule bypasses protection for the specified URL.

asked 19/03/2025
xingrui li
44 questions

Question 12

Report Export Collapse

What can a FortiWeb administrator do if a client has been incorrectly period blocked?

Allow the period block to expire on its own, you cannot override it.

Allow the period block to expire on its own, you cannot override it.

Manually release the IP address from the blocklist.

Manually release the IP address from the blocklist.

Disable and re-enable the server policy.

Disable and re-enable the server policy.

Force a new IP address to the client.

Force a new IP address to the client.

Suggested answer: B
Explanation:

If a client has been incorrectly blocked due to a period block, the FortiWeb administrator can manually release the IP address from the blocklist. This allows the client to access the application again before the block expires naturally.

asked 19/03/2025
Florence Li
47 questions

Question 13

Report Export Collapse

Which two functions does the first layer of the FortiWeb anomaly machine learning (ML) analysis mechanism perform? (Choose two.)

Determines whether an anomaly is a real attack or just a harmless anomaly that should be ignored

Determines whether an anomaly is a real attack or just a harmless anomaly that should be ignored

Determines a probability model behind every parameter and HTTP method passing through FortiWeb

Determines a probability model behind every parameter and HTTP method passing through FortiWeb

Determines whether traffic is an anomaly, based on observable features overtime

Determines whether traffic is an anomaly, based on observable features overtime

Determines if a detected threat is a false-positive or not

Determines if a detected threat is a false-positive or not

Suggested answer: B, C
Explanation:

The first layer of the FortiWeb anomaly machine learning (ML) analysis mechanism focuses on analyzing traffic and creating a probability model for parameters and HTTP methods to detect potential anomalies. It also assesses traffic patterns over time to determine whether certain behavior is anomalous. These functions are key to understanding and classifying traffic before further analysis is done.

asked 19/03/2025
Courage Marume
40 questions

Question 14

Report Export Collapse

Which is an example of a cross-site scripting (XSS) attack?

SELECT username FROM accounts WHERE username='admin';-- ' AND password='password';

SELECT username FROM accounts WHERE username='admin';-- ' AND password='password';



SELECT username FROM accounts WHERE username='XSS' ' AND password='alert('http://badurl.com')';

SELECT username FROM accounts WHERE username='XSS' ' AND password='alert('http://badurl.com')';

<IMG SRC='xss.png'>

<IMG SRC='xss.png'>

Suggested answer: B
Explanation:

Cross-Site Scripting (XSS) is a type of web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. This can lead to session hijacking, credential theft, or redirection to malicious sites. XSS attacks typically exploit vulnerabilities in web applications that fail to properly sanitize user input.

Here's an analysis of the given options:

A . SELECT username FROM accounts WHERE username='admin';-- ' AND password='password';

This is an example of SQL Injection (SQLi) rather than XSS. It manipulates SQL queries to bypass authentication, not execute JavaScript in a user's browser.

B .

This is a classic XSS attack.

It uses an tag with a non-existent src attribute.

The onerror event triggers when the image fails to load, executing alert(document.cookie);, which can expose session cookies.

This method is commonly used for stealing cookies or executing arbitrary scripts.

C . SELECT username FROM accounts WHERE username='XSS' ' AND password='alert('http://badurl.com')';

This is neither a valid SQL injection nor a valid XSS attack.

The syntax suggests an incorrect SQL query rather than JavaScript execution in a browser.

D . <IMG SRC='xss.png'>

This is not a valid XSS attack unless there is an additional event handler like onload, onerror, or onmouseover executing JavaScript.

By itself, it just loads an image and does not execute any malicious script.

Thus, Option B is the correct answer as it represents a real-world XSS attack technique.

OWASP XSS Guide: https://owasp.org/www-community/attacks/xss/

Fortinet XSS Protection Documentation: https://docs.fortinet.com/

asked 19/03/2025
Simon John Mather
49 questions

Question 15

Report Export Collapse

Which Layer 7 routing method does FortiWeb support?

URL policy routing

URL policy routing

OSPF

OSPF

BGP

BGP

HTTP content routing

HTTP content routing

Suggested answer: D
Explanation:

FortiWeb is a Web Application Firewall (WAF) designed to protect web applications from various threats. Among its features, FortiWeb supports Layer 7 routing methods, which operate based on the content of the HTTP/HTTPS traffic.

HTTP Content Routing refers to the capability of directing incoming web traffic to specific backend servers based on characteristics found within the HTTP requests, such as URL paths, headers, or other content. This allows for more granular and efficient distribution of traffic, ensuring that requests are handled by the appropriate servers based on their content.

Analysis of Options:

A . URL policy routing: While this term suggests routing decisions based on URL policies, it is not a standard term used in FortiWeb's documentation. FortiWeb's content routing encompasses URL-based decisions, making this option less precise.

B . OSPF (Open Shortest Path First): This is a Layer 3 routing protocol used for IP routing within an Autonomous System. It operates at the network layer and is not related to Layer 7 routing methods.

C . BGP (Border Gateway Protocol): Another Layer 3 routing protocol, BGP is used for routing between Autonomous Systems on the internet. It does not pertain to Layer 7 or application-layer routing.

D . HTTP content routing: This aligns with FortiWeb's capabilities to make routing decisions based on the content of HTTP requests, such as URL paths, headers, or other application-layer data. This is a Layer 7 routing method supported by FortiWeb.

Therefore, the correct answer is D. HTTP content routing.

FortiWeb 7.2.6 Administration Guide: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' cloud.orange-business.com

FortiWeb Data Sheet: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' Exclusive Networks

FortiWeb on OCB-FE - Installation and Deployment Guide: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' cloud.orange-business.com

These references confirm that FortiWeb supports HTTP content routing as a Layer 7 routing method.

asked 19/03/2025
Padmanabhan Kudiarasu
54 questions

Question 16

Report Export Collapse

Which command will enable debugging for the FortiWeb user tracking feature?

debug enable user-tracking 7

debug enable user-tracking 7

diagnose debug application user-cracking 7

diagnose debug application user-cracking 7

debug application user-cracking 7

debug application user-cracking 7

diagnose debug enable user-cracking 7

diagnose debug enable user-cracking 7

Suggested answer: B
Explanation:

To enable debugging for the user tracking feature in FortiWeb, you would use the command diagnose debug application user-tracking 7. This command enables debugging for the user-tracking application and sets the debug level to 7, providing detailed logs for troubleshooting.

asked 19/03/2025
Ammar Ahmed
39 questions

Question 17

Report Export Collapse

Refer to the exhibit.

Fortinet FCP_FWB_AD-7.4 image Question 17 63878006384572213383311

What is true about this FortiWeb device? (Choose two.)

It has 41% of the disk available for logging.

It has 41% of the disk available for logging.

It was upgraded to a different version after initial installation.

It was upgraded to a different version after initial installation.

It is currently running version 6.4.0.

It is currently running version 6.4.0.

It is currently running version 6.4.1.

It is currently running version 6.4.1.

Suggested answer: B
Explanation:

It was upgraded to a different version after initial installation: The device has multiple partitions with different firmware versions (6.4.0 and 6.4.1), indicating that it was upgraded after the initial installation from version 6.4.0 to 6.4.1.

asked 19/03/2025
Victor Armando SÑnchez
43 questions

Question 18

Report Export Collapse

Which high availability (HA) mode uses gratuitous Address Resolution Protocol (ARP) to advertise a failover event to neighboring network devices?

Passive-Passive

Passive-Passive

Active-Passive

Active-Passive

Active-Active

Active-Active

Passive-Active

Passive-Active

Suggested answer: B
Explanation:

In Active-Passive high availability (HA) mode, the active unit is responsible for handling traffic while the passive unit remains idle, ready to take over in case of a failure. When a failover occurs, the active unit sends out gratuitous ARP messages to notify neighboring devices about the change in the active unit's IP address. This ensures that the network devices update their ARP tables and can forward traffic to the new active unit.

asked 19/03/2025
Dan Yann
54 questions

Question 19

Report Export Collapse

In SAML deployments, which server contains user authentication credentials (username/password)?

Identity provider

Identity provider

Service provider

Service provider

User database

User database

Authentication client

Authentication client

Suggested answer: A
Explanation:

In SAML (Security Assertion Markup Language) deployments, the Identity Provider (IdP) is responsible for storing and managing user authentication credentials, such as usernames and passwords. The IdP authenticates the user and then issues a SAML assertion to the Service Provider (SP), which allows the user to access services without needing to re-enter credentials.

asked 19/03/2025
Tim baxter
48 questions

Question 20

Report Export Collapse

What are two possible impacts of a DoS attack on your web server? (Choose two.)

The web application starts accepting unencrypted traffic.

The web application starts accepting unencrypted traffic.

The web application is unable to accept any more connections because of network socket exhaustion.

The web application is unable to accept any more connections because of network socket exhaustion.

The web application server is unable to accept new client sessions due to memory exhaustion.

The web application server is unable to accept new client sessions due to memory exhaustion.

The web application server database is compromised with data theft.

The web application server database is compromised with data theft.

Suggested answer: B, C
Explanation:

The web application is unable to accept any more connections because of network socket exhaustion: A Denial of Service (DoS) attack often floods the web server with an overwhelming number of requests, leading to network socket exhaustion. This can prevent the server from accepting new legitimate connections, effectively disrupting service.

The web application server is unable to accept new client sessions due to memory exhaustion: DoS attacks can consume a significant amount of server memory, causing memory exhaustion. This results in the web application being unable to accept new client sessions or handle requests properly.

asked 19/03/2025
rafael Flores
57 questions
Total 36 questions
Go to page: of 4