최신 FCP_FWB_AD-7.4 무료덤프 - Fortinet FCP - FortiWeb 7.4 Administrator
What must you do with your FortiWeb logs to ensure PCI DSS compliance?
정답: A
Which encryption algorithm is commonly used to secure data transmission over HTTPS connections?
(Select all that apply)
(Select all that apply)
정답: A,C
Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)
정답: A,B
What are two advantages of using the URL rewriting and redirecting feature on FortiWeb? (Choose two.)
정답: B,C
In order for FortiWeb to provide the best possible protection for servers, how should you deploy it?
정답: B
In which two ways does FortiWeb handle traffic that does not match any defined policies? (Choose two.)
정답: A,D
FortiWeb offers the same load balancing algorithms as FortiGate.
Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)
Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)
정답: B,D
Refer to the exhibits.


FortiWeb is configured in reverse proxy mode and it is deployed downstream to FortiGate. Based on the configuration shown in the exhibits, which of the following statements is true?


FortiWeb is configured in reverse proxy mode and it is deployed downstream to FortiGate. Based on the configuration shown in the exhibits, which of the following statements is true?
정답: C
When user tracking is configured, how does FortiWeb identify which users to track?
정답: D
What is a drawback of TLS 1.3?
정답: A