Fortinet NSE6_FWB-6.4 Practice Test - Questions Answers, Page 2

List of questions
Question 11

What key factor must be considered when setting brute force rate limiting and blocking?
https://training.fortinet.com/course/view.php?id=3363 What is one key factor that you must consider when setting brute force rate limiting and blocking? Multiple clients sharing a single Internet connection
Question 12

Refer to the exhibits.
FortiWeb is configured in reverse proxy mode and it is deployed downstream to FortiGate. Based on the configuration shown in the exhibits, which of the following statements is true?
Question 13

Which two statements about running a vulnerability scan are true? (Choose two.)
Should the Vulnerability Scanner allow it, SVMS will set the scan schedule (or schedules) to run in a maintenance window. SVMS will advise Client of the scanner's ability to complete the scan(s) within the maintenance window.
Vulnerabilities on live web sites. Instead, duplicate the web site and its database in a test environment.
https://help.fortinet.com/fweb/552/Content/FortiWeb/fortiweb-admin/vulnerability_scans.htm
Question 14

FortiWeb offers the same load balancing algorithms as FortiGate.
Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)
http://fortinet.globalgate.com.ar/pdfs/FortiWeb/FortiWeb_DS.pdf
Question 15

Which would be a reason to implement HTTP rewriting?
Create a new URL rewriting rule.
Question 16

Refer to the exhibit.
FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)
Configure your load balancer to insert or append to anX-Forwarded-For:,X-Real-IP:, or other HTTP X-header. Also configureFortiWebto find the original attacker's or client's IP address in that HTTP header
Question 17

Which statement about local user accounts is true?
Question 18

Refer to the exhibit.
Based on the configuration, what would happen if this FortiWeb were to lose power? (Choose two.)
Question 19

Refer to the exhibit.
FortiWeb is configured to block traffic from Japan to your web application server. However, in the logs, the administrator is seeing traffic allowed from one particular IP address which is geo-located in Japan.
What can the administrator do to solve this problem? (Choose two.)
Question 20

Which algorithm is used to build mathematical models for bot detection?
FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model
Question