ExamGecko
Home / Fortinet / NSE6_FWB-6.4 / List of questions
Ask Question

Fortinet NSE6_FWB-6.4 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

What key factor must be considered when setting brute force rate limiting and blocking?

A single client contacting multiple resources
A single client contacting multiple resources
Multiple clients sharing a single Internet connection
Multiple clients sharing a single Internet connection
Multiple clients from geographically diverse locations
Multiple clients from geographically diverse locations
Multiple clients connecting to multiple resources
Multiple clients connecting to multiple resources
Suggested answer: B
Explanation:

https://training.fortinet.com/course/view.php?id=3363 What is one key factor that you must consider when setting brute force rate limiting and blocking? Multiple clients sharing a single Internet connection

asked 18/09/2024
Ayanda Zwane
36 questions

Question 12

Report Export Collapse

Refer to the exhibits.

Fortinet NSE6_FWB-6.4 image Question 12 26844 09182024190643000000

Fortinet NSE6_FWB-6.4 image Question 12 26844 09182024190643000000

FortiWeb is configured in reverse proxy mode and it is deployed downstream to FortiGate. Based on the configuration shown in the exhibits, which of the following statements is true?

FortiGate should forward web traffic to the server pool IP addresses.
FortiGate should forward web traffic to the server pool IP addresses.
The configuration is incorrect. FortiWeb should always be located upstream to FortiGate.
The configuration is incorrect. FortiWeb should always be located upstream to FortiGate.
You must disable the Preserve Client IP setting on FotriGate for this configuration to work.
You must disable the Preserve Client IP setting on FotriGate for this configuration to work.
FortiGate should forward web traffic to virtual server IP address.
FortiGate should forward web traffic to virtual server IP address.
Suggested answer: D
asked 18/09/2024
Carlo Hearne
47 questions

Question 13

Report Export Collapse

Which two statements about running a vulnerability scan are true? (Choose two.)

You should run the vulnerability scan during a maintenance window.
You should run the vulnerability scan during a maintenance window.
You should run the vulnerability scan in a test environment.
You should run the vulnerability scan in a test environment.
Vulnerability scanning increases the load on FortiWeb, so it should be avoided.
Vulnerability scanning increases the load on FortiWeb, so it should be avoided.
You should run the vulnerability scan on a live website to get accurate results.
You should run the vulnerability scan on a live website to get accurate results.
Suggested answer: A, B
Explanation:

Should the Vulnerability Scanner allow it, SVMS will set the scan schedule (or schedules) to run in a maintenance window. SVMS will advise Client of the scanner's ability to complete the scan(s) within the maintenance window.

Vulnerabilities on live web sites. Instead, duplicate the web site and its database in a test environment.

https://help.fortinet.com/fweb/552/Content/FortiWeb/fortiweb-admin/vulnerability_scans.htm

asked 18/09/2024
Hassene SAADI
45 questions

Question 14

Report Export Collapse

FortiWeb offers the same load balancing algorithms as FortiGate.

Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)

Round robin
Round robin
HTTP session-based round robin
HTTP session-based round robin
HTTP user-based round robin
HTTP user-based round robin
HTTP content routes
HTTP content routes
Suggested answer: A, D
Explanation:

http://fortinet.globalgate.com.ar/pdfs/FortiWeb/FortiWeb_DS.pdf

asked 18/09/2024
Manuel Ortega
48 questions

Question 15

Report Export Collapse

Which would be a reason to implement HTTP rewriting?

The original page has moved to a new URL
The original page has moved to a new URL
To replace a vulnerable function in the requested URL
To replace a vulnerable function in the requested URL
To send the request to secure channel
To send the request to secure channel
The original page has moved to a new IP address
The original page has moved to a new IP address
Suggested answer: B
Explanation:

Create a new URL rewriting rule.

asked 18/09/2024
Innos Phoku
47 questions

Question 16

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FWB-6.4 image Question 16 26848 09182024190643000000

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.

What must the administrator do to avoid this problem? (Choose two.)

Enable the Use X-Forwarded-For setting on FortiWeb.
Enable the Use X-Forwarded-For setting on FortiWeb.
No Special configuration is required; connectivity will be re-established after the set timeout.
No Special configuration is required; connectivity will be re-established after the set timeout.
Place FortiWeb in front of FortiADC.
Place FortiWeb in front of FortiADC.
Enable the Add X-Forwarded-For setting on FortiWeb.
Enable the Add X-Forwarded-For setting on FortiWeb.
Suggested answer: A, C
Explanation:

Configure your load balancer to insert or append to anX-Forwarded-For:,X-Real-IP:, or other HTTP X-header. Also configureFortiWebto find the original attacker's or client's IP address in that HTTP header

asked 18/09/2024
Kevin Taylor
37 questions

Question 17

Report Export Collapse

Which statement about local user accounts is true?

They are best suited for large environments with many users.
They are best suited for large environments with many users.
They cannot be used for site publishing.
They cannot be used for site publishing.
They must be assigned, regardless of any other authentication.
They must be assigned, regardless of any other authentication.
They can be used for SSO.
They can be used for SSO.
Suggested answer: B
asked 18/09/2024
Mpho Ntshontsi
50 questions

Question 18

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FWB-6.4 image Question 18 26850 09182024190643000000

Based on the configuration, what would happen if this FortiWeb were to lose power? (Choose two.)

Traffic that passes between port5 and port6 will be inspected.
Traffic that passes between port5 and port6 will be inspected.
Traffic will be interrupted between port3 and port4.
Traffic will be interrupted between port3 and port4.
All traffic will be interrupted.
All traffic will be interrupted.
Traffic will pass between port5 and port6 uninspected.
Traffic will pass between port5 and port6 uninspected.
Suggested answer: B, D
asked 18/09/2024
Dylan Brons
40 questions

Question 19

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FWB-6.4 image Question 19 26851 09182024190643000000

FortiWeb is configured to block traffic from Japan to your web application server. However, in the logs, the administrator is seeing traffic allowed from one particular IP address which is geo-located in Japan.

What can the administrator do to solve this problem? (Choose two.)

Manually update the geo-location IP addresses for Japan.
Manually update the geo-location IP addresses for Japan.
If the IP address is configured as a geo reputation exception, remove it.
If the IP address is configured as a geo reputation exception, remove it.
Configure the IP address as a blacklisted IP address.
Configure the IP address as a blacklisted IP address.
If the IP address is configured as an IP reputation exception, remove it.
If the IP address is configured as an IP reputation exception, remove it.
Suggested answer: B, C
asked 18/09/2024
Andrew Oliphant
41 questions

Question 20

Report Export Collapse

Which algorithm is used to build mathematical models for bot detection?

HCM
HCM
SVN
SVN
SVM
SVM
HMM
HMM
Suggested answer: C
Explanation:

FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model

asked 18/09/2024
Charles Smith
31 questions
Total 56 questions
Go to page: of 6