Which two statements are correct on a FortiGate using the FortiGuard Outbreak Protection Service (VOS)? (Choose two.)
Question 32
A remote worker requests access to an SSH server inside the network. You deployed a ZTNA Rule to their FortiClient. You need to follow the security requirements to inspect this traffic. Which two statements are true regarding the requirements? (Choose two.)
Question 33
On a FortiGate configured in Transparent mode, which configuration option allows you to control Multicast traffic passing through the device?
Question 34
Refer to the CLI configuration of an SSL inspection profile from a FortiGate device configured to protect a web server: Based on the information shown, what is the expected behavior when an HTTP/2 request comes in?
Question 35
Refer to the exhibits. Topology -Configuration -The exhibits show a FortiGate network topology and the output of the status of high availability on the FortiGate. Given this information, which statement is correct?
Question 36
Refer to the exhibit showing an SD-WAN configuration. According to the exhibit, if an internal user pings 10.1.100.2 and 10.1.100.2 from subnet 172.16.05.0/24, which outgoing interfaces will be used?
Question 37
A customer’s cybersecurity department needs to implement security for the traffic between two VPCs in AWS, but these belong to different departments within the company. The company uses a single region for all their VPCs. Which two actions will achieve this requirement while keeping separate management of each departments VPC? (Choose two.)
Question 38
Refer to the exhibit containing the configuration snippets from the FortiGate. Customer requirements: SSLVPN Portal must be accessible on standard HTTPS port (TCP/443)Public IP address (129.11.1.100) is assigned to port1Datacenter.acmecorp.com resolves to the public IP address assigned to port1The customer has a Let’s Encrypt certificate that is going to expire soon and it reports that subsequent attempts to renew that certificate are failing. Reviewing the requirement and the exhibit, which configuration change below will resolve this issue?
Question 39
Refer to the exhibit. The exhibit shows the forensics analysis of an event detected by the FortiEDR core. In this scenario, which statement is correct regarding the threat?
Question 40
An automation stitch was configured using an incoming webhook as the trigger named ‘my_incoming_webhook’. The action is configured to execute the CLI Script shown: The base Curl command starts with: curl -k -x POST -H ‘Authorization: Bearer ’ --data Which Curl command will successfully work with the configured automation stitch?