For More Information Please Contact Our Whatsupp +21655255099
For More Information Please Contact Our Whatsupp +21655255099
For More Information Please Contact Our Whatsupp +21655255099
4
WhtsAPP : +21655255099
ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy help on exam)
ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay after Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA
ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy
help on exam)
ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay after
Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA
Question: 1
Which two statements about running a vulnerability scan are true? (Choose two.)
Answer: A, B
Explanation:
Should the Vulnerability Scanner allow it, SVMS will set the scan schedule (or schedules) to run in a
maintenance window. SVMS will advise Client of the scanner’s ability to complete the scan(s) within
the maintenance window.
Vulnerabilities on live web sites. Instead, duplicate the web site and its database in a test
environment.
Reference: https://www.trustwave.com/media/17427/trustwave_mss_managed-3rd-party-
vulnerability-scanning.pdf
https://help.fortinet.com/fweb/552/Content/FortiWeb/fortiweb-admin/vulnerability_scans.htm
Question: 2
A. Round robin
B. HTTP session-based round robin
C. HTTP user-based round robin
D. HTTP content routes
Answer: A, D
Explanation:
ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy
help on exam)
ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay
after Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA
www.dumpstoday.com
Questions and Answers PDF 2/27
Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-
guide/399384/defining-your-web-servers
http://fortinet.globalgate.com.ar/pdfs/FortiWeb/FortiWeb_DS.pdf
Question: 3
Answer: B
Explanation:
Question: 4
FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb
blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is
breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)
www.dumpstoday.com
Questions and Answers PDF 3/27
Answer: A, C
Explanation:
Configure your load balancer to insert or append to an X-Forwarded-For:, X-Real-IP:, or other HTTP X-
header. Also configure FortiWeb to find the original attacker’s or client’s IP address in that HTTP
header
Reference: https://help.fortinet.com/fweb/560/Content/FortiWeb/fortiweb-
admin/planning_topology.htm
Question: 5
A. They are best suited for large environments with many users.
B. They cannot be used for site publishing.
C. They must be assigned, regardless of any other authentication.
D. They can be used for SSO.
Answer: B
Explanation:
Question: 6
Based on the configuration, what would happen if this FortiWeb were to lose power? (Choose two.)
www.dumpstoday.com
Questions and Answers PDF 4/27
Answer: B, D
Explanation:
Reference: https://docs.fortinet.com/document/fortiweb/6.3.10/administration-guide/33485/fail-
to-wire-for-power-loss-reboots
Question: 7
FortiWeb is configured to block traffic from Japan to your web application server. However, in the
logs, the administrator is seeing traffic allowed from one particular IP address which is geo-located in
Japan.
What can the administrator do to solve this problem? (Choose two.)
Answer: B, C
Explanation:
www.dumpstoday.com
Questions and Answers PDF 5/27
Question: 8
A. HCM
B. SVN
C. SVM
D. HMM
Answer: C
Explanation:
FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model
Reference: https://docs.fortinet.com/document/fortiweb/6.3.7/administration-
guide/193258/machine-learning
Question: 9
A client is trying to start a session from a page that would normally be accessible only after the client
has logged in.
When a start page rule detects the invalid session access, what can FortiWeb do? (Choose three.)
Answer: B, C, E
Explanation:
Reference: https://help.fortinet.com/fweb/607/Content/FortiWeb/fortiweb-
admin/specify_urls_to_initiate.htm
Question: 10
ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,
pay after Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA
Many legitimate users are being identified as bots. FortiWeb bot detection has been configured with
the settings shown in the exhibit. The FortiWeb administrator has already verified that the current
model is accurate.
What can the administrator do to fix this problem, making sure that real bots are not allowed
through FortiWeb?
Answer: D
www.dumpstoday.com
Questions and Answers PDF 7/27
Explanation:
Bot Confirmation
If the number of anomalies from a user has reached the Anomaly Count, the system executes Bot
Confirmation before taking actions.
The Bot Confirmation is to confirm if the user is indeed a bot. The system sends RBE (Real Browser
Enforcement) JavaScript or CAPTCHA to the client to double check if it's a real bot.
Reference: https://docs.fortinet.com/document/fortiweb/6.3.1/administration-
guide/600188/configuring-bot-detection-profiles
Question: 11
Answer: B
Explanation:
Block Period
Enter the number of seconds that you want to block the requests. The valid range is 1–3,600
seconds. The default value is 60 seconds.
This option only takes effect when you choose Period Block in Action.
Note: That’s a temporary blacklist so you can manually release them from the blacklist.
Reference: https://docs.fortinet.com/document/fortiweb/6.3.1/administration-
guide/600188/configuring-bot-detection-profiles
Question: 12
Which regex expression is the correct format for redirecting the URL http://www.example.com?
A. www\.example\.com
B. www.example.com
C. www\example\com
D. www/.example/.com
Answer: B
Explanation:
www.dumpstoday.com
Questions and Answers PDF 8/27
\1://www.company.com/\2/\3
Reference: https://learn.akamai.com/en-us/webhelp/edge-redirector/edge-redirector-guide/GUID-
0C22DFC2-DCC4-42AF-BDB2-9537FBEE03FD.html
Question: 13
When FortiWeb triggers a redirect action, which two HTTP codes does it send to the client to inform
the browser of the new URL? (Choose two.)
A. 403
B. 302
C. 301
D. 404
Answer: B, C
Explanation:
Reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/302
Question: 14
True transparent proxy mode is best suited for use in which type of environment?
Answer: B
Explanation:
"Because blocking is not guaranteed to succeed in offline mode, this mode is best used during the
evaluation and planning phase, early in implementation. Reverse proxy is the most popular operating
mode. It can rewrite URLs, offload TLS, load balance, and apply NAT. For very large MSSP, true
transparent mode has a significant advantage. You can drop it in without changing any schemes of
limited IPv4 space–in transparent mode, you don’t need to give IP addresses to the network
interfaces on FortiWeb."
Question: 15
Review the following configuration:
www.dumpstoday.com
Questions and Answers PDF 9/27
A. When machine learning (ML) is in its collecting phase, FortiWeb will accept an unlimited number
of samples from the same source IP address.
B. When machine learning (ML) is in its running phase, FortiWeb will accept an unlimited number of
samples from the same source IP address.
C. When machine learning (ML) is in its collecting phase, FortiWeb will not accept any samples from
any source IP addresses.
D. When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples
from the same source IP address.
Answer: A
Explanation:
Question: 16
Which two statements about the anti-defacement feature on FortiWeb are true? (Choose two.)
Answer: C, D
Explanation:
Question: 17
What must you do with your FortiWeb logs to ensure PCI DSS compliance?
www.dumpstoday.com
Questions and Answers PDF 10/27
Answer: C
Explanation:
Reference: https://docplayer.net/8466775-Fortiweb-web-application-firewall-ensuring-compliance-
for-pci-dss-requirement-6-6-solution-guide.html
Question: 18
Answer: C
Explanation:
Question: 19
Refer to the exhibit.
ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy help on
exam)
ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay after Pass
)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA
www.dumpstoday.com
Questions and Answers PDF 11/27
There is only one administrator account configured on FortiWeb. What must an administrator do to
restrict any brute force attacks that attempt to gain access to the FortiWeb management GUI?
Answer: B
Explanation:
Reference: https://docs.fortinet.com/document/fortiweb/6.1.1/administration-
guide/397469/preventing-brute-force-logins
Question: 20
What key factor must be considered when setting brute force rate limiting and blocking?
www.dumpstoday.com
Questions and Answers PDF 12/27
Answer: B
Explanation:
Question: 21
www.dumpstoday.com
Questions and Answers PDF 13/27
FortiWeb is configured in reverse proxy mode and it is deployed downstream to FortiGate. Based on
the configuration shown in the exhibits, which of the following statements is true?
Answer: D
Explanation:
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ebe2ce28-
5c66-11eb-b9ad-00505692583a/FortiWeb_6.3.10_Administration_Guide.pdf
Question: 22
When is it possible to use a self-signed certificate, rather than one purchased from a commercial
certificate authority?
Answer: D
Explanation:
www.dumpstoday.com
Questions and Answers PDF 14/27
Question: 23
In which scenario might you want to use the compression feature on FortiWeb?
A. When you are serving many corporate road warriors using 4G tablets and phones
B. When you are offering a music streaming service
C. When you want to reduce buffering of video streams
D. Never, since most traffic today is already highly compressed
Answer: A
Explanation:
https://training.fortinet.com/course/view.php?id=3363
When might you want to use the compression feature on FortiWeb? When you are serving many
road warriors who are using 4G tablets and phones
Question: 24
A. Determines whether an anomaly is a real attack or just a benign anomaly that should be ignored
B. Builds a threat model behind every parameter and HTTP method
C. Determines if a detected threat is a false-positive or not
D. Determines whether traffic is an anomaly, based on observed application traffic over time
Answer: B, D
Explanation:
The first layer uses the Hidden Markov Model (HMM) and monitors access to the application and
collects data to build a mathematical model behind every parameter and HTTP method.
Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-
guide/193258/machine-learning
Question: 25
In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)
A. Offline protection
B. Transparent inspection
C. True transparent proxy
www.dumpstoday.com
Questions and Answers PDF 15/27
D. Reverse proxy
Answer: CD
Explanation:
Reference: https://help.fortinet.com/fweb/541/Content/FortiWeb/fortiweb-
admin/planning_topology.htm
Question: 26
When viewing the attack logs on FortiWeb, which client IP address is shown when you are using XFF
header rules?
A. FortiGate public IP
B. FortiWeb IP
C. FortiGate local IP
D. Client real IP
Answer: D
Explanation:
When an XFF header reaches Alteon from a client, Alteon removes all the content from the header
and injects the client IP address. Alteon then forwards the header to the server.
Reference: https://support.radware.com/app/answers/answer_view/a_id/20925/~/modifying-the-
client-ip-address-in-the-xff-header-using-httpmod
Question: 27
Which three statements about HTTPS on FortiWeb are true? (Choose three.)
A. For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server
policy.
B. After enabling HSTS, redirects to HTTPS are no longer necessary.
C. In true transparent mode, the TLS session terminator is a protected web server.
D. Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb
to only offer TLS 1.2.
E. In transparent inspection mode, you select which certificate that FortiWeb will present in the
server pool, not in the server policy.
Answer: C, D, E
Explanation:
www.dumpstoday.com
Questions and Answers PDF 16/27
Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-
guide/742465/supported-cipher-suites-protocol-versions
Question: 28
Answer: D
Explanation: our WhatsApp +21655255099
FortiGuard IP Reputation service assigns a poor reputation, including virus-infected clients and
malicious spiders/crawlers.
Reference: https://docs.fortinet.com/document/fortiweb/6.1.1/administration-
guide/137271/blacklisting-whitelisting-clients
Question: 29
Answer: B
Explanation:
The anti-defacement feature examines a web site’s files for changes at specified time intervals. If it
detects a change that could indicate a defacement attack, the FortiWeb appliance can notify you and
quickly react by automatically restoring the web site contents to the previous backup.
Reference: https://help.fortinet.com/fweb/551/Content/FortiWeb/fortiweb-
admin/anti_defacement.htm
Question: 30
You are using HTTP content routing on FortiWeb. You want requests for web application A to be
www.dumpstoday.com
Questions and Answers PDF 17/27
forwarded to a cluster of web servers, which all host the same web application. You want requests
for web application B to be forwarded to a different, single web server.
Which statement about this solution is true?
A. The server policy applies the same protection profile to all of its protected web applications.
B. You must put the single web server in to a server pool, in order to use it with HTTP content
routing.
C. You must chain policies so that requests for web application A go to the virtual server for policy A,
and requests for web application B go to the virtual server for policy B.
D. Static or policy-based routes are not required.
Answer: D
Explanation:
Question: 31
When generating a protection configuration from an auto learning report what critical step must you
do before generating the final protection configuration?
Answer: B
Explanation:
Question: 32
Answer: A
Explanation:
Question: 33
www.dumpstoday.com
Questions and Answers PDF 18/27
Which is true?
Answer: B
Explanation:
Question: 34
Answer: C
Explanation:
Question: 35
A client is trying to start a session from a page that should normally be accessible only after they
have logged in.
When a start page rule detects the invalid session access, what can FortiWeb do? (Choose three.)
Answer: A,B,C
Explanation:
www.dumpstoday.com
Questions and Answers PDF 19/28
Question: 36
A. For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server
policy.
B. After enabling HSTS, redirects to HTTPS are no longer necessary.
C. In true transparent mode, the TLS session terminator is a protected web server.
D. Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb
to only offer TLS 1.2.
E. In transparent inspection mode, you select which certificate that FortiWeb will present in the
server pool, not in the server policy.
Answer: A,C,E
Explanation:
Question: 37
Answer: C
Explanation:
Question: 38
In which operation mode(s) can FortiWeb modify HTTP packets? (Choose two.)
A. Transparent Inspection
B. Offline protection
C. True transparent proxy
D. Reverse proxy
Answer: CD
Explanation:
www.dumpstoday.com
Questions and Answers PDF 20/28
Question: 36
What other consideration must you take into account when configuring Defacement protection
A. Use FortiWeb to block SQL Injections and keep regular backups of the Database
B. Also incorporate a FortiADC into your network
C. None. FortiWeb completely secures the site against defacement attacks
D. Configure the FortiGate to perform Anti-Defacement as well
Answer: A
Explanation:
Question: 40
Under what circumstances would you want to use the temporary uncompress feature of FortiWeb?
A. In the case of compression being done on the FortiWeb, to inspect the content of the compressed
file
B. In the case of the file being a .MP3 music file
C. In the case of compression being done on the web server, to inspect the content of the
compressed file.
D. In the case of the file being an .MP4 video
Answer: C
Explanation:
Question: 41
You are deploying FortiWeb 6.4 in an Amazon Web Services cloud. Which 2 lines of this initial setup
via CLI are incorrect? (Choose two.)
www.dumpstoday.com
Questions and Answers PDF 21/27
Answer: A,C
Explanation:
Question: 42
Answer: B
Explanation:
Question: 43
www.dumpstoday.com
Questions and Answers PDF 22/27
When the FortiWeb is configured in Reverse Proxy mode and the FortiGate is configured as an SNAT
device, what IP address will the FortiGate’s Real Server configuration point at?
Answer: A
Explanation:
Question: 44
How does your FortiWeb configuration differ if the FortiWeb is upstream of the SNAT device instead
of downstream of the SNAT device?
Answer: D
Explanation:
Question: 45
You are using HTTP content routing on FortiWeb. Requests for web app A should be forwarded to a
cluster of web servers which all host the same web app. Requests for web app B should be forwarded
to a different, single web server.
Answer: B
Explanation:
www.dumpstoday.com
Questions and Answers PDF 23/27
Question: 46
In Reverse proxy mode, how does FortiWeb handle traffic that does not match any defined policies?
Answer: C
Explanation:
Question: 47
A. FrotiWeb redirects users to a FortiAuthenticator page, then if the user authenticates successfully,
FortiGate signals to FortiWeb to allow access to the web app
B. ForitWeb redirects the user to the web app’s authentication page
C. FortiWeb forwards the HTTP challenge from the server to the client, then monitors the reply,
allowing access if the user authenticates successfully
D. FortiWeb replies with a HTTP challenge of behalf of the server, the if the user authenticates
successfully, FortiWeb allows the request and also includes credentials in the request that it forwards
to the web app
Answer: A
Explanation:
Question: 48
When integrating FortiWeb and FortiAnalyzer, why is the selection for FortiWeb Version critical?
(Choose two)
www.dumpstoday.com
Questions and Answers PDF 24/27
Answer: A,D
Explanation:
Question: 49
Answer: A
Explanation:
FortiWeb helps you meet all PCI requirements, but PCI now specifically recommends using a WAF,
and developing remediations against the top 10 vulnerabilities, according to OWASP.
Question: 50
Which operation mode does not require additional configuration in order to allow FTP traffic to your
web server?
A. Offline Protection
B. Transparent Inspection
C. True Transparent Proxy
D. Reverse-Proxy
Answer: B
Explanation:
Question: 51
Which implementation is best suited for a deployment that must meet compliance criteria?
www.dumpstoday.com
Questions and Answers PDF 25/27
Answer: C
Explanation:
Question: 52
Which of the following FortiWeb features is part of the mitigation tools against OWASP A4 threats?
Answer: C
Explanation:
Question: 53
What capability can FortiWeb add to your Web App that your Web App may or may not already
have?
Answer: C
Explanation:
Question: 54
An e-commerce web app is used by small businesses. Clients often access it from offices behind a
router, where clients are on an IPv4 private network LAN. You need to protect the web application
from denial of service attacks that use request floods.
A. Enable “Shared IP” and configure the separate rate limits for requests from NATted source IPs.
B. Configure FortiWeb to use “X-Forwarded-For:” headers to find each client’s private network IP, and
to block attacks using that.
C. Enable SYN cookies.
www.dumpstoday.com
Questions and Answers PDF 26/27
D. Configure a server policy that matches requests from shared Internet connections.
Answer: C
Explanation:
Question: 55
Under which circumstances does FortiWeb use its own certificates? (Choose Two)
Answer: A,C
Explanation:
Question: 56
Answer: C
Explanation:
ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+
Proxy help on exam)
ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,
pay after Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA
www.dumpstoday.com
Questions and Answers PDF 27/27
ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy
help on exam)
ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay after
Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA
www.dumpstoday.com