Fortinet FCP_FWB_AD-7.4 Practice Test - Questions Answers, Page 3
List of questions
Question 21
Which two items can be defined in a FortiWeb XML Protection Rule? (Choose two.)
Question 22
Which two statements about running a vulnerability scan are true? (Choose two.)
Question 23
An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application.
What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?
Question 24
Review the following configuration:
Which result would you expect from this configuration setting?
Question 25
Refer to the exhibit.
What can you conclude from this support vector machine (SVM) plot of a potential bot connection?
Question 26
Which two objects are required to configure a server policy in reverse proxy mode without content routing? (Choose two.)
Question 27
When is it possible to use a self-signed certificate, rather than one purchased from a commercial certificate authority?
Question 28
Refer to the exhibit.
Which statement is true?
Question 29
How are bot machine learning (ML) models different from API or anomaly detection models?
Question 30
In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)
Question