Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet FCP_FWB_AD-7.4 FCP - FortiWeb 7.4 Administrator Exam Practice Test

FCP - FortiWeb 7.4 Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which implementation is most suited for a deployment that must meet PCI DSS compliance criteria?

Options:

A.

SSL offloading with FortiWeb in reverse proxy mode

B.

SSL offloading with FortiWeb in PCI DSS mode

C.

SSL offloading with FortiWeb in transparency mode

D.

SSL offloading with FortiWeb in full transparent proxy mode

Question 2

Refer to the exhibit.

What can you conclude from this support vector machine (SVM) plot of a potential bot connection?

Options:

A.

The connection is normal and within the expected averages.

B.

The connection uses too much bandwidth.

C.

The connection uses an excessive amount of TCP connections, but is harmless.

D.

The connection is possibly a bot.

Question 3

You are using HTTP content routing on FortiWeb. You want requests for web application A to be forwarded to a cluster of web servers, which all host the same web application. You want requests for web application B to be forwarded to a different, single web server.

Which statement regarding this solution is true?

Options:

A.

You must chain policies so that all requests go to the virtual server for policy A first, and then redirect requests for web application B to go to the virtual server for policy B

B.

You must create static routes on the FortiWebto allow these requests.

C.

You must put the single web server for application B into a server pool and use it with HTTP content routing.

D.

The server policy always applies the same web protection profile to both web application A and web application B.

Question 4

Review the following configuration:

Which result would you expect from this configuration setting?

Options:

A.

When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples from the same source IP address.

B.

When ML is in its running phase, FortiWeb will accept an unlimited number of samples from the same source IP address.

C.

When ML is in its collecting phase, FortiWeb will accept an unlimited number of samples from the same source IP address.

D.

When ML is in its collecting phase, FortiWeb will not accept any samples from any IP addresses.

Question 5

In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)

Options:

A.

True transparent proxy

B.

Virtual proxy

C.

Transparent inspection

D.

Reverse proxy

Question 6

Which three stages are part of creating a machine learning (ML) bot detection algorithm? (Choose three.)

Options:

A.

Model building

B.

Model running

C.

Model verification

D.

Sample collecting

E.

Model Bayesian analysis

Question 7

What are two possible impacts of a DoS attack on your web server? (Choose two.)

Options:

A.

The web application starts accepting unencrypted traffic.

B.

The web application is unable to accept any more connections because of network socket exhaustion.

C.

The web application server is unable to accept new client sessions due to memory exhaustion.

D.

The web application server database is compromised with data theft.

Question 8

How are bot machine learning (ML) models different from API or anomaly detection models?

Options:

A.

Bot ML models analyze multiple connections overtime instead analyzing each connection as a single unit.

B.

Bot ML models detect only anomalies and not actual threats.

C.

Bot ML models inspect more types of connection properties.

D.

Bot ML models do not update models periodically from new data.

Question 9

An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application.

What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?

Options:

A.

Blocklist any suspected IPs.

B.

Configure a brute force login custom policy.

C.

Rate limit all connections from suspected IP addresses.

D.

Block the IP address at the border router.

Question 10

Refer to the exhibits.

What will happen when a client attempts a mousedown cross-site scripting (XSS) attack against the site and FortiWeb is enforcing the highlighted signature?

Options:

A.

The connection will be stripped of the mousedown JavaScript code.

B.

The connection will be blocked as an XSS attack.

C.

FortiWeb will report the new mousedown attack to FortiGuard.

D.

The connection will be allowed.