Fortinet FCP_FWB_AD-7.4 Practice Test - Questions Answers, Page 3
List of questions
Question 21

Which two items can be defined in a FortiWeb XML Protection Rule? (Choose two.)
Question 22

Which two statements about running a vulnerability scan are true? (Choose two.)
Question 23

An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application.
What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?
Question 24

Review the following configuration:
Which result would you expect from this configuration setting?
Question 25

Refer to the exhibit.
What can you conclude from this support vector machine (SVM) plot of a potential bot connection?
Question 26

Which two objects are required to configure a server policy in reverse proxy mode without content routing? (Choose two.)
Question 27

When is it possible to use a self-signed certificate, rather than one purchased from a commercial certificate authority?
Question 28

Refer to the exhibit.
Which statement is true?
Question 29

How are bot machine learning (ML) models different from API or anomaly detection models?
Question 30

In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)
Question