ExamGecko
Home Home / Fortinet / NSE6_FWB-6.4

Fortinet NSE6_FWB-6.4 Practice Test - Questions Answers

Question list
Search
Search

Review the following configuration:

What is the expected result of this configuration setting?

A.
When machine learning (ML) is in its collecting phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
A.
When machine learning (ML) is in its collecting phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
Answers
B.
When machine learning (ML) is in its running phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
B.
When machine learning (ML) is in its running phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
Answers
C.
When machine learning (ML) is in its collecting phase, FortiWeb will not accept any samples from any source IP addresses.
C.
When machine learning (ML) is in its collecting phase, FortiWeb will not accept any samples from any source IP addresses.
Answers
D.
When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples from the same source IP address.
D.
When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples from the same source IP address.
Answers
Suggested answer: A

Which two statements about the anti-defacement feature on FortiWeb are true? (Choose two.)

A.
Anti-defacement can redirect users to a backup web server, if it detects a change.
A.
Anti-defacement can redirect users to a backup web server, if it detects a change.
Answers
B.
Anti-defacement downloads a copy of your website to RAM, in order to restore a clean image, if it detects defacement.
B.
Anti-defacement downloads a copy of your website to RAM, in order to restore a clean image, if it detects defacement.
Answers
C.
FortiWeb will only check to see if there are changes on the web server; it will not download the whole file each time.
C.
FortiWeb will only check to see if there are changes on the web server; it will not download the whole file each time.
Answers
D.
Anti-defacement does not make a backup copy of your databases.
D.
Anti-defacement does not make a backup copy of your databases.
Answers
Suggested answer: C, D

Explanation:

Anti-defacement backs up web pages only,notdatabases.

If it detects any file changes, theFortiWebappliance will download a new backup revision.

What role does FortiWeb play in ensuring PCI DSS compliance?

A.
PCI specifically requires a WAF
A.
PCI specifically requires a WAF
Answers
B.
Provides credit card processing capabilities
B.
Provides credit card processing capabilities
Answers
C.
Provide ability to securely process cash transactions
C.
Provide ability to securely process cash transactions
Answers
D.
Provides load balancing between multiple web servers
D.
Provides load balancing between multiple web servers
Answers
Suggested answer: A

Explanation:

FortiWeb helps you meet all PCI requirements, but PCI now specifically recommends using a WAF, and developing remediations against the top 10 vulnerabilities, according to OWASP.

Which operation mode does not require additional configuration in order to allow FTP traffic to your web server?

A.
Offline Protection
A.
Offline Protection
Answers
B.
Transparent Inspection
B.
Transparent Inspection
Answers
C.
True Transparent Proxy
C.
True Transparent Proxy
Answers
D.
Reverse-Proxy
D.
Reverse-Proxy
Answers
Suggested answer: B

Which implementation is best suited for a deployment that must meet compliance criteria?

A.
SSL Inspection with FortiWeb in Transparency mode
A.
SSL Inspection with FortiWeb in Transparency mode
Answers
B.
SSL Offloading with FortiWeb in reverse proxy mode
B.
SSL Offloading with FortiWeb in reverse proxy mode
Answers
C.
SSL Inspection with FrotiWeb in Reverse Proxy mode
C.
SSL Inspection with FrotiWeb in Reverse Proxy mode
Answers
D.
SSL Offloading with FortiWeb in Transparency Mode
D.
SSL Offloading with FortiWeb in Transparency Mode
Answers
Suggested answer: C

Which of the following FortiWeb features is part of the mitigation tools against OWASP A4 threats?

A.
Sensitive info masking
A.
Sensitive info masking
Answers
B.
Poison Cookie detection
B.
Poison Cookie detection
Answers
C.
Session Management
C.
Session Management
Answers
D.
Brute Force blocking
D.
Brute Force blocking
Answers
Suggested answer: C

What capability can FortiWeb add to your Web App that your Web App may or may not already have?

A.
Automatic backup and recovery
A.
Automatic backup and recovery
Answers
B.
High Availability
B.
High Availability
Answers
C.
HTTP/HTML Form Authentication
C.
HTTP/HTML Form Authentication
Answers
D.
SSL Inspection
D.
SSL Inspection
Answers
Suggested answer: C

What must you do with your FortiWeb logs to ensure PCI DSS compliance?

A.
Store in an off-site location
A.
Store in an off-site location
Answers
B.
Erase them every two weeks
B.
Erase them every two weeks
Answers
C.
Enable masking of sensitive data
C.
Enable masking of sensitive data
Answers
D.
Compress them into a .zip file format
D.
Compress them into a .zip file format
Answers
Suggested answer: C

What role does FortiWeb play in ensuring PCI DSS compliance?

A.
It provides the ability to securely process cash transactions.
A.
It provides the ability to securely process cash transactions.
Answers
B.
It provides the required SQL server protection.
B.
It provides the required SQL server protection.
Answers
C.
It provides the WAF required by PCI.
C.
It provides the WAF required by PCI.
Answers
D.
It provides credit card processing capabilities.
D.
It provides credit card processing capabilities.
Answers
Suggested answer: C

Refer to the exhibit.

There is only one administrator account configured on FortiWeb. What must an administrator do to restrict any brute force attacks that attempt to gain access to the FortiWeb management GUI?

A.
Delete the built-in administrator user and create a new one.
A.
Delete the built-in administrator user and create a new one.
Answers
B.
Configure IPv4 Trusted Host # 3 with a specific IP address.
B.
Configure IPv4 Trusted Host # 3 with a specific IP address.
Answers
C.
The configuration changes must be made on the upstream device.
C.
The configuration changes must be made on the upstream device.
Answers
D.
Change the Access Profile to Read_Only.
D.
Change the Access Profile to Read_Only.
Answers
Suggested answer: B
Total 56 questions
Go to page: of 6