ExamGecko
Home Home / Fortinet / NSE6_FWB-6.4

Fortinet NSE6_FWB-6.4 Practice Test - Questions Answers, Page 4

Question list
Search
Search

When viewing the attack logs on FortiWeb, which client IP address is shown when you are using XFF header rules?

A.
FortiGate public IP
A.
FortiGate public IP
Answers
B.
FortiWeb IP
B.
FortiWeb IP
Answers
C.
FortiGate local IP
C.
FortiGate local IP
Answers
D.
Client real IP
D.
Client real IP
Answers
Suggested answer: D

Explanation:

When an XFF header reaches Alteon from a client, Alteon removes all the content from the header and injects the client IP address. Alteon then forwards the header to the server.

Which three statements about HTTPS on FortiWeb are true? (Choose three.)

A.
For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server policy.
A.
For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server policy.
Answers
B.
After enabling HSTS, redirects to HTTPS are no longer necessary.
B.
After enabling HSTS, redirects to HTTPS are no longer necessary.
Answers
C.
In true transparent mode, the TLS session terminator is a protected web server.
C.
In true transparent mode, the TLS session terminator is a protected web server.
Answers
D.
Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb to only offer TLS 1.2.
D.
Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb to only offer TLS 1.2.
Answers
E.
In transparent inspection mode, you select which certificate that FortiWeb will present in the server pool, not in the server policy.
E.
In transparent inspection mode, you select which certificate that FortiWeb will present in the server pool, not in the server policy.
Answers
Suggested answer: C, D, E

What is one of the key benefits of the FortiGuard IP reputation feature?

A.
It maintains a list of private IP addresses.
A.
It maintains a list of private IP addresses.
Answers
B.
It provides a document of IP addresses that are suspect, so that administrators can manually update their blacklists.
B.
It provides a document of IP addresses that are suspect, so that administrators can manually update their blacklists.
Answers
C.
It is updated once per year.
C.
It is updated once per year.
Answers
D.
It maintains a list of public IPs with a bad reputation for participating in attacks.
D.
It maintains a list of public IPs with a bad reputation for participating in attacks.
Answers
Suggested answer: D

Explanation:

FortiGuard IP Reputation service assigns a poor reputation, including virus-infected clients and malicious spiders/crawlers.

How does FortiWeb protect against defacement attacks?

A.
It keeps a complete backup of all files and the database.
A.
It keeps a complete backup of all files and the database.
Answers
B.
It keeps hashes of files and periodically compares them to the server.
B.
It keeps hashes of files and periodically compares them to the server.
Answers
C.
It keeps full copies of all files and directories.
C.
It keeps full copies of all files and directories.
Answers
D.
It keeps a live duplicate of the database.
D.
It keeps a live duplicate of the database.
Answers
Suggested answer: B

Explanation:

The anti-defacement feature examines a web site's files for changes at specified time intervals. If it detects a change that could indicate a defacement attack, theFortiWebappliancecan notify you and quickly react by automatically restoring the web site contents to the previous backup.

You are using HTTP content routing on FortiWeb. You want requests for web application A to be forwarded to a cluster of web servers, which all host the same web application. You want requests for web application B to be forwarded to a different, single web server.

Which statement about this solution is true?

A.
The server policy applies the same protection profile to all of its protected web applications.
A.
The server policy applies the same protection profile to all of its protected web applications.
Answers
B.
You must put the single web server in to a server pool, in order to use it with HTTP content routing.
B.
You must put the single web server in to a server pool, in order to use it with HTTP content routing.
Answers
C.
You must chain policies so that requests for web application A go to the virtual server for policy A, and requests for web application B go to the virtual server for policy B.
C.
You must chain policies so that requests for web application A go to the virtual server for policy A, and requests for web application B go to the virtual server for policy B.
Answers
D.
Static or policy-based routes are not required.
D.
Static or policy-based routes are not required.
Answers
Suggested answer: D

When generating a protection configuration from an auto learning report what critical step must you do before generating the final protection configuration?

A.
Restart the FortiWeb to clear the caches
A.
Restart the FortiWeb to clear the caches
Answers
B.
Drill down in the report to correct any false positives.
B.
Drill down in the report to correct any false positives.
Answers
C.
Activate the report to create t profile
C.
Activate the report to create t profile
Answers
D.
Take the FortiWeb offline to apply the profile
D.
Take the FortiWeb offline to apply the profile
Answers
Suggested answer: B

How does an ADOM differ from a VDOM?

A.
ADOMs do not have virtual networking
A.
ADOMs do not have virtual networking
Answers
B.
ADOMs improve performance by offloading some functions.
B.
ADOMs improve performance by offloading some functions.
Answers
C.
ADOMs only affect specific functions, and do not provide full separation like VDOMs do.
C.
ADOMs only affect specific functions, and do not provide full separation like VDOMs do.
Answers
D.
Allows you to have 1 administrator for multiple tenants
D.
Allows you to have 1 administrator for multiple tenants
Answers
Suggested answer: A

In which operation mode(s) can FortiWeb modify HTTP packets? (Choose two.)

A.
Transparent Inspection
A.
Transparent Inspection
Answers
B.
Offline protection
B.
Offline protection
Answers
C.
True transparent proxy
C.
True transparent proxy
Answers
D.
Reverse proxy
D.
Reverse proxy
Answers
Suggested answer: C, D

What other consideration must you take into account when configuring Defacement protection

A.
Use FortiWeb to block SQL Injections and keep regular backups of the Database
A.
Use FortiWeb to block SQL Injections and keep regular backups of the Database
Answers
B.
Also incorporate a FortiADC into your network
B.
Also incorporate a FortiADC into your network
Answers
C.
None. FortiWeb completely secures the site against defacement attacks
C.
None. FortiWeb completely secures the site against defacement attacks
Answers
D.
Configure the FortiGate to perform Anti-Defacement as well
D.
Configure the FortiGate to perform Anti-Defacement as well
Answers
Suggested answer: A

Under what circumstances would you want to use the temporary uncompress feature of FortiWeb?

A.
In the case of compression being done on the FortiWeb, to inspect the content of the compressed file
A.
In the case of compression being done on the FortiWeb, to inspect the content of the compressed file
Answers
B.
In the case of the file being a .MP3 music file
B.
In the case of the file being a .MP3 music file
Answers
C.
In the case of compression being done on the web server, to inspect the content of the compressed file.
C.
In the case of compression being done on the web server, to inspect the content of the compressed file.
Answers
D.
In the case of the file being an .MP4 video
D.
In the case of the file being an .MP4 video
Answers
Suggested answer: C
Total 56 questions
Go to page: of 6