For More Information Please Contact Our Whatsupp +21655255099

Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

NSE6 FWB 6.

4
WhtsAPP : +21655255099

ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy help on exam)

ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay after Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA

=> For more information please contact our Whatsupp +21655255099

ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy
help on exam)

ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay after
Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA

=> For more information please contact our Whatsupp +21655255099


Questions and Answers PDF 1/27

Question: 1

Which two statements about running a vulnerability scan are true? (Choose two.)

A. You should run the vulnerability scan during a maintenance window.


B. You should run the vulnerability scan in a test environment.
C. Vulnerability scanning increases the load on FortiWeb, so it should be avoided.
D. You should run the vulnerability scan on a live website to get accurate results.

Answer: A, B
Explanation:

Should the Vulnerability Scanner allow it, SVMS will set the scan schedule (or schedules) to run in a
maintenance window. SVMS will advise Client of the scanner’s ability to complete the scan(s) within
the maintenance window.
Vulnerabilities on live web sites. Instead, duplicate the web site and its database in a test
environment.
Reference: https://www.trustwave.com/media/17427/trustwave_mss_managed-3rd-party-
vulnerability-scanning.pdf
https://help.fortinet.com/fweb/552/Content/FortiWeb/fortiweb-admin/vulnerability_scans.htm

Question: 2

FortiWeb offers the same load balancing algorithms as FortiGate.


Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)

A. Round robin
B. HTTP session-based round robin
C. HTTP user-based round robin
D. HTTP content routes

Answer: A, D
Explanation:

ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy
help on exam)

ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay
after Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA

=> For more information please contact our Whatsupp +21655255099

www.dumpstoday.com
Questions and Answers PDF 2/27

Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-
guide/399384/defining-your-web-servers
http://fortinet.globalgate.com.ar/pdfs/FortiWeb/FortiWeb_DS.pdf

Question: 3

Which would be a reason to implement HTTP rewriting?

A. The original page has moved to a new URL


B. To replace a vulnerable function in the requested URL
C. To send the request to secure channel
D. The original page has moved to a new IP address

Answer: B
Explanation:

Create a new URL rewriting rule.


Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-
guide/961303/rewriting-redirecting

Question: 4

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb
blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is
breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)

www.dumpstoday.com
Questions and Answers PDF 3/27

A. Enable the Use X-Forwarded-For setting on FortiWeb.


B. No Special configuration is required; connectivity will be re-established after the set timeout.
C. Place FortiWeb in front of FortiADC.
D. Enable the Add X-Forwarded-For setting on FortiWeb.

Answer: A, C
Explanation:

Configure your load balancer to insert or append to an X-Forwarded-For:, X-Real-IP:, or other HTTP X-
header. Also configure FortiWeb to find the original attacker’s or client’s IP address in that HTTP
header
Reference: https://help.fortinet.com/fweb/560/Content/FortiWeb/fortiweb-
admin/planning_topology.htm

Question: 5

Which statement about local user accounts is true?

A. They are best suited for large environments with many users.
B. They cannot be used for site publishing.
C. They must be assigned, regardless of any other authentication.
D. They can be used for SSO.

Answer: B
Explanation:

Question: 6

Refer to the exhibit.

Based on the configuration, what would happen if this FortiWeb were to lose power? (Choose two.)

A. Traffic that passes between port5 and port6 will be inspected.

www.dumpstoday.com
Questions and Answers PDF 4/27

B. Traffic will be interrupted between port3 and port4.


C. All traffic will be interrupted.
D. Traffic will pass between port5 and port6 uninspected.

Answer: B, D
Explanation:

Reference: https://docs.fortinet.com/document/fortiweb/6.3.10/administration-guide/33485/fail-
to-wire-for-power-loss-reboots

Question: 7

Refer to the exhibit.

FortiWeb is configured to block traffic from Japan to your web application server. However, in the
logs, the administrator is seeing traffic allowed from one particular IP address which is geo-located in
Japan.
What can the administrator do to solve this problem? (Choose two.)

A. Manually update the geo-location IP addresses for Japan.


B. If the IP address is configured as a geo reputation exception, remove it.
C. Configure the IP address as a blacklisted IP address.
D. If the IP address is configured as an IP reputation exception, remove it.

Answer: B, C
Explanation:

www.dumpstoday.com
Questions and Answers PDF 5/27

Question: 8

Which algorithm is used to build mathematical models for bot detection?

A. HCM
B. SVN
C. SVM
D. HMM

Answer: C
Explanation:

FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model
Reference: https://docs.fortinet.com/document/fortiweb/6.3.7/administration-
guide/193258/machine-learning

Question: 9

A client is trying to start a session from a page that would normally be accessible only after the client
has logged in.
When a start page rule detects the invalid session access, what can FortiWeb do? (Choose three.)

A. Display an access policy message, then allow the client to continue


B. Redirect the client to the login page
C. Allow the page access, but log the violation
D. Prompt the client to authenticate
E. Reply with a 403 Forbidden HTTP error

Answer: B, C, E
Explanation:

Reference: https://help.fortinet.com/fweb/607/Content/FortiWeb/fortiweb-
admin/specify_urls_to_initiate.htm

Question: 10

Refer to the exhibit.


ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+
Proxy help on exam)

ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,
pay after Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA

=> For more information please contact our Whatsupp +21655255099


Questions and Answers PDF 6/27

Many legitimate users are being identified as bots. FortiWeb bot detection has been configured with
the settings shown in the exhibit. The FortiWeb administrator has already verified that the current
model is accurate.
What can the administrator do to fix this problem, making sure that real bots are not allowed
through FortiWeb?

A. Change Model Type to Strict


B. Change Action under Action Settings to Alert
C. Disable Dynamically Update Model
D. Enable Bot Confirmation

Answer: D

www.dumpstoday.com
Questions and Answers PDF 7/27

Explanation:

Bot Confirmation
If the number of anomalies from a user has reached the Anomaly Count, the system executes Bot
Confirmation before taking actions.
The Bot Confirmation is to confirm if the user is indeed a bot. The system sends RBE (Real Browser
Enforcement) JavaScript or CAPTCHA to the client to double check if it's a real bot.
Reference: https://docs.fortinet.com/document/fortiweb/6.3.1/administration-
guide/600188/configuring-bot-detection-profiles

Question: 11

What can an administrator do if a client has been incorrectly period blocked?

A. Nothing, it is not possible to override a period block.


B. Manually release the ID address from the temporary blacklist.
C. Force a new IP address to the client.
D. Disconnect the client from the network.

Answer: B
Explanation:

Block Period
Enter the number of seconds that you want to block the requests. The valid range is 1–3,600
seconds. The default value is 60 seconds.
This option only takes effect when you choose Period Block in Action.
Note: That’s a temporary blacklist so you can manually release them from the blacklist.
Reference: https://docs.fortinet.com/document/fortiweb/6.3.1/administration-
guide/600188/configuring-bot-detection-profiles

Question: 12

Which regex expression is the correct format for redirecting the URL http://www.example.com?

A. www\.example\.com
B. www.example.com
C. www\example\com
D. www/.example/.com

Answer: B
Explanation:

www.dumpstoday.com
Questions and Answers PDF 8/27

\1://www.company.com/\2/\3
Reference: https://learn.akamai.com/en-us/webhelp/edge-redirector/edge-redirector-guide/GUID-
0C22DFC2-DCC4-42AF-BDB2-9537FBEE03FD.html

Question: 13

When FortiWeb triggers a redirect action, which two HTTP codes does it send to the client to inform
the browser of the new URL? (Choose two.)

A. 403
B. 302
C. 301
D. 404

Answer: B, C
Explanation:

Reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/302

Question: 14

True transparent proxy mode is best suited for use in which type of environment?

A. New networks where infrastructure is not yet defined


B. Flexible environments where you can easily change the IP addressing scheme
C. Small office to home office environments
D. Environments where you cannot change the IP addressing scheme

Answer: B
Explanation:

"Because blocking is not guaranteed to succeed in offline mode, this mode is best used during the
evaluation and planning phase, early in implementation. Reverse proxy is the most popular operating
mode. It can rewrite URLs, offload TLS, load balance, and apply NAT. For very large MSSP, true
transparent mode has a significant advantage. You can drop it in without changing any schemes of
limited IPv4 space–in transparent mode, you don’t need to give IP addresses to the network
interfaces on FortiWeb."

Question: 15
Review the following configuration:

www.dumpstoday.com
Questions and Answers PDF 9/27

What is the expected result of this configuration setting?

A. When machine learning (ML) is in its collecting phase, FortiWeb will accept an unlimited number
of samples from the same source IP address.
B. When machine learning (ML) is in its running phase, FortiWeb will accept an unlimited number of
samples from the same source IP address.
C. When machine learning (ML) is in its collecting phase, FortiWeb will not accept any samples from
any source IP addresses.
D. When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples
from the same source IP address.

Answer: A
Explanation:

Question: 16
Which two statements about the anti-defacement feature on FortiWeb are true? (Choose two.)

A. Anti-defacement can redirect users to a backup web server, if it detects a change.


B. Anti-defacement downloads a copy of your website to RAM, in order to restore a clean image, if it
detects defacement.
C. FortiWeb will only check to see if there are changes on the web server; it will not download the
whole file each time.
D. Anti-defacement does not make a backup copy of your databases.

Answer: C, D
Explanation:

Anti-defacement backs up web pages only, not databases.


If it detects any file changes, the FortiWeb appliance will download a new backup revision.
Reference: https://help.fortinet.com/fweb/551/Content/FortiWeb/fortiweb-
admin/anti_defacement.htm

Question: 17

What must you do with your FortiWeb logs to ensure PCI DSS compliance?

www.dumpstoday.com
Questions and Answers PDF 10/27

A. Store in an off-site location


B. Erase them every two weeks
C. Enable masking of sensitive data
D. Compress them into a .zip file format

Answer: C
Explanation:

Reference: https://docplayer.net/8466775-Fortiweb-web-application-firewall-ensuring-compliance-
for-pci-dss-requirement-6-6-solution-guide.html

Question: 18

What role does FortiWeb play in ensuring PCI DSS compliance?

A. It provides the ability to securely process cash transactions.


B. It provides the required SQL server protection.
C. It provides the WAF required by PCI.
D. It provides credit card processing capabilities.

Answer: C
Explanation:

Question: 19
Refer to the exhibit.

ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy help on
exam)

ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay after Pass
)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA

=> For more information please contact our Whatsupp +21655255099

www.dumpstoday.com
Questions and Answers PDF 11/27

There is only one administrator account configured on FortiWeb. What must an administrator do to
restrict any brute force attacks that attempt to gain access to the FortiWeb management GUI?

A. Delete the built-in administrator user and create a new one.


B. Configure IPv4 Trusted Host # 3 with a specific IP address.
C. The configuration changes must be made on the upstream device.
D. Change the Access Profile to Read_Only.

Answer: B
Explanation:

Reference: https://docs.fortinet.com/document/fortiweb/6.1.1/administration-
guide/397469/preventing-brute-force-logins

Question: 20

What key factor must be considered when setting brute force rate limiting and blocking?

A. A single client contacting multiple resources


B. Multiple clients sharing a single Internet connection

www.dumpstoday.com
Questions and Answers PDF 12/27

C. Multiple clients from geographically diverse locations


D. Multiple clients connecting to multiple resources

Answer: B
Explanation:

https://training.fortinet.com/course/view.php?id=3363 What is one key factor that you must


consider when setting brute force rate limiting and blocking? Multiple clients sharing a single
Internet connection

Question: 21

Refer to the exhibits.

www.dumpstoday.com
Questions and Answers PDF 13/27

FortiWeb is configured in reverse proxy mode and it is deployed downstream to FortiGate. Based on
the configuration shown in the exhibits, which of the following statements is true?

A. FortiGate should forward web traffic to the server pool IP addresses.


B. The configuration is incorrect. FortiWeb should always be located upstream to FortiGate.
C. You must disable the Preserve Client IP setting on FotriGate for this configuration to work.
D. FortiGate should forward web traffic to virtual server IP address.

Answer: D
Explanation:

Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ebe2ce28-
5c66-11eb-b9ad-00505692583a/FortiWeb_6.3.10_Administration_Guide.pdf

Question: 22

When is it possible to use a self-signed certificate, rather than one purchased from a commercial
certificate authority?

A. If you are a small business or home office


B. If you are an enterprise whose employees use only mobile devices
C. If you are an enterprise whose resources do not need security
D. If you are an enterprise whose computers all trust your active directory or other CA server

Answer: D
Explanation:

www.dumpstoday.com
Questions and Answers PDF 14/27

Question: 23

In which scenario might you want to use the compression feature on FortiWeb?

A. When you are serving many corporate road warriors using 4G tablets and phones
B. When you are offering a music streaming service
C. When you want to reduce buffering of video streams
D. Never, since most traffic today is already highly compressed

Answer: A
Explanation:

https://training.fortinet.com/course/view.php?id=3363
When might you want to use the compression feature on FortiWeb? When you are serving many
road warriors who are using 4G tablets and phones

Question: 24

The FortiWeb machine learning (ML) feature is a two-phase analysis mechanism.


Which two functions does the first layer perform? (Choose two.)

A. Determines whether an anomaly is a real attack or just a benign anomaly that should be ignored
B. Builds a threat model behind every parameter and HTTP method
C. Determines if a detected threat is a false-positive or not
D. Determines whether traffic is an anomaly, based on observed application traffic over time

Answer: B, D
Explanation:

The first layer uses the Hidden Markov Model (HMM) and monitors access to the application and
collects data to build a mathematical model behind every parameter and HTTP method.
Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-
guide/193258/machine-learning

Question: 25

In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)

A. Offline protection
B. Transparent inspection
C. True transparent proxy

www.dumpstoday.com
Questions and Answers PDF 15/27

D. Reverse proxy

Answer: CD
Explanation:

Reference: https://help.fortinet.com/fweb/541/Content/FortiWeb/fortiweb-
admin/planning_topology.htm

Question: 26

When viewing the attack logs on FortiWeb, which client IP address is shown when you are using XFF
header rules?

A. FortiGate public IP
B. FortiWeb IP
C. FortiGate local IP
D. Client real IP

Answer: D
Explanation:

When an XFF header reaches Alteon from a client, Alteon removes all the content from the header
and injects the client IP address. Alteon then forwards the header to the server.
Reference: https://support.radware.com/app/answers/answer_view/a_id/20925/~/modifying-the-
client-ip-address-in-the-xff-header-using-httpmod

Question: 27

Which three statements about HTTPS on FortiWeb are true? (Choose three.)

A. For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server
policy.
B. After enabling HSTS, redirects to HTTPS are no longer necessary.
C. In true transparent mode, the TLS session terminator is a protected web server.
D. Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb
to only offer TLS 1.2.
E. In transparent inspection mode, you select which certificate that FortiWeb will present in the
server pool, not in the server policy.

Answer: C, D, E
Explanation:

www.dumpstoday.com
Questions and Answers PDF 16/27

Reference: https://docs.fortinet.com/document/fortiweb/6.3.0/administration-
guide/742465/supported-cipher-suites-protocol-versions

Question: 28

What is one of the key benefits of the FortiGuard IP reputation feature?

A. It maintains a list of private IP addresses.


B. It provides a document of IP addresses that are suspect, so that administrators can manually
update their blacklists.
C. It is updated once per year.
D. It maintains a list of public IPs with a bad reputation for participating in attacks.

Answer: D
Explanation: our WhatsApp +21655255099

FortiGuard IP Reputation service assigns a poor reputation, including virus-infected clients and
malicious spiders/crawlers.
Reference: https://docs.fortinet.com/document/fortiweb/6.1.1/administration-
guide/137271/blacklisting-whitelisting-clients

Question: 29

How does FortiWeb protect against defacement attacks?

A. It keeps a complete backup of all files and the database.


B. It keeps hashes of files and periodically compares them to the server.
C. It keeps full copies of all files and directories.
D. It keeps a live duplicate of the database.

Answer: B
Explanation:

The anti-defacement feature examines a web site’s files for changes at specified time intervals. If it
detects a change that could indicate a defacement attack, the FortiWeb appliance can notify you and
quickly react by automatically restoring the web site contents to the previous backup.
Reference: https://help.fortinet.com/fweb/551/Content/FortiWeb/fortiweb-
admin/anti_defacement.htm

Question: 30

You are using HTTP content routing on FortiWeb. You want requests for web application A to be

www.dumpstoday.com
Questions and Answers PDF 17/27

forwarded to a cluster of web servers, which all host the same web application. You want requests
for web application B to be forwarded to a different, single web server.
Which statement about this solution is true?

A. The server policy applies the same protection profile to all of its protected web applications.
B. You must put the single web server in to a server pool, in order to use it with HTTP content
routing.
C. You must chain policies so that requests for web application A go to the virtual server for policy A,
and requests for web application B go to the virtual server for policy B.
D. Static or policy-based routes are not required.

Answer: D
Explanation:

Question: 31

When generating a protection configuration from an auto learning report what critical step must you
do before generating the final protection configuration?

A. Restart the FortiWeb to clear the caches


B. Drill down in the report to correct any false positives.
C. Activate the report to create t profile
D. Take the FortiWeb offline to apply the profile

Answer: B
Explanation:

Question: 32

How does an ADOM differ from a VDOM?

A. ADOMs do not have virtual networking


B. ADOMs improve performance by offloading some functions.
C. ADOMs only affect specific functions, and do not provide full separation like VDOMs do.
D. Allows you to have 1 administrator for multiple tenants

Answer: A
Explanation:

Question: 33

www.dumpstoday.com
Questions and Answers PDF 18/27

You are configuring FortiAnalyzer to store logs from FortiWeb.

Which is true?

A. FortiAnalyzer will store antivirus and DLP archives from FortiWeb.


B. You must enable ADOMs on FortiAnalyzer.
C. To store logs from FortiWeb 6.4, on FortiAnalyzer, you must select “FrotiWeb 6.1”.
D. FortiWeb will query FortiAnalyzer for reports, instead of generating them locally.

Answer: B
Explanation:

Question: 34

Which of the following would be a reason for implementing rewrites?

A. Page has been moved to a new URL


B. Page has been moved to a new IP address
C. Replace vulnerable functions.
D. Send connection to secure channel

Answer: C
Explanation:

Question: 35

A client is trying to start a session from a page that should normally be accessible only after they
have logged in.

When a start page rule detects the invalid session access, what can FortiWeb do? (Choose three.)

A. Reply with a “403 Forbidden” HTTP error


B. Allow the page access, but log the violation
C. Automatically redirect the client to the login page
D. Display an access policy message, then allow the client to continue, redirecting them to their
requested page
E. Prompt the client to authenticate

Answer: A,B,C
Explanation:

www.dumpstoday.com
Questions and Answers PDF 19/28

Question: 36

Which is true about HTTPS on FortiWeb? (Choose three.)

A. For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server
policy.
B. After enabling HSTS, redirects to HTTPS are no longer necessary.
C. In true transparent mode, the TLS session terminator is a protected web server.
D. Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb
to only offer TLS 1.2.
E. In transparent inspection mode, you select which certificate that FortiWeb will present in the
server pool, not in the server policy.

Answer: A,C,E
Explanation:

Question: 37

Which of the following is true about Local User Accounts?

A. Must be assigned regardless of any other authentication


B. Can be used for Single Sign On
C. Can be used for site publishing
D. Best suited for large environments with many users

Answer: C
Explanation:

Question: 38

In which operation mode(s) can FortiWeb modify HTTP packets? (Choose two.)

A. Transparent Inspection
B. Offline protection
C. True transparent proxy
D. Reverse proxy

Answer: CD
Explanation:

www.dumpstoday.com
Questions and Answers PDF 20/28

Question: 36

What other consideration must you take into account when configuring Defacement protection

A. Use FortiWeb to block SQL Injections and keep regular backups of the Database
B. Also incorporate a FortiADC into your network
C. None. FortiWeb completely secures the site against defacement attacks
D. Configure the FortiGate to perform Anti-Defacement as well

Answer: A
Explanation:

Question: 40

Under what circumstances would you want to use the temporary uncompress feature of FortiWeb?

A. In the case of compression being done on the FortiWeb, to inspect the content of the compressed
file
B. In the case of the file being a .MP3 music file
C. In the case of compression being done on the web server, to inspect the content of the
compressed file.
D. In the case of the file being an .MP4 video

Answer: C
Explanation:

Question: 41

You are deploying FortiWeb 6.4 in an Amazon Web Services cloud. Which 2 lines of this initial setup
via CLI are incorrect? (Choose two.)

www.dumpstoday.com
Questions and Answers PDF 21/27

our WhatsApp +21655255099


A. 6
B. 9
C. 3
D. 2

Answer: A,C
Explanation:

Question: 42

How does offloading compression to FortiWeb benefit your network?

A. free up resources on the database server


B. Free up resources on the web server
C. reduces file size on the client’s storage
D. free up resources on the FortiGate

Answer: B
Explanation:

Question: 43

www.dumpstoday.com
Questions and Answers PDF 22/27

When the FortiWeb is configured in Reverse Proxy mode and the FortiGate is configured as an SNAT
device, what IP address will the FortiGate’s Real Server configuration point at?

A. Virtual Server IP on the FortiGate


B. Server’s real IP
C. FortiWeb’s real IP
D. IP Address of the Virtual Server on the FortiWeb

Answer: A
Explanation:

Question: 44

How does your FortiWeb configuration differ if the FortiWeb is upstream of the SNAT device instead
of downstream of the SNAT device?

A. You must enable the “Use” X-Forwarded-For: option.


B. FortiWeb must be set for Transparent Mode
C. No special configuration required
D. You must enable “Add” X-Forwarded-For: instead of the “Use” X-Forwarded-For: option.

Answer: D
Explanation:

Question: 45

You are using HTTP content routing on FortiWeb. Requests for web app A should be forwarded to a
cluster of web servers which all host the same web app. Requests for web app B should be forwarded
to a different, single web server.

Which is true about the solution?

A. Static or policy-based routes are not required.


B. To achieve HTTP content routing, you must chain policies: the first policy accepts all traffic, and
forwards requests for web app A to the virtual server for policy A. It also forwards requests for web
app B to the virtual server for policy B. Policy A and Policy B apply their app-specific protection
profiles, and then distribute that app’s traffic among all members of the server farm.
C. You must put the single web server into a server pool in order to use it with HTTP content routing.
D. The server policy applies the same protection profile to all its protected web apps.

Answer: B
Explanation:

www.dumpstoday.com
Questions and Answers PDF 23/27

Question: 46

In Reverse proxy mode, how does FortiWeb handle traffic that does not match any defined policies?

A. Non-matching traffic is allowed


B. non-Matching traffic is held in buffer
C. Non-matching traffic is Denied
D. Non-matching traffic is rerouted to FortiGate

Answer: C
Explanation:

Question: 47

You’ve configured an authentication rule with delegation enabled on FortiWeb.

What happens when a user tries to access the web application?

A. FrotiWeb redirects users to a FortiAuthenticator page, then if the user authenticates successfully,
FortiGate signals to FortiWeb to allow access to the web app
B. ForitWeb redirects the user to the web app’s authentication page
C. FortiWeb forwards the HTTP challenge from the server to the client, then monitors the reply,
allowing access if the user authenticates successfully
D. FortiWeb replies with a HTTP challenge of behalf of the server, the if the user authenticates
successfully, FortiWeb allows the request and also includes credentials in the request that it forwards
to the web app

Answer: A
Explanation:

Question: 48

When integrating FortiWeb and FortiAnalyzer, why is the selection for FortiWeb Version critical?
(Choose two)

A. Defines Log file format


B. Defines communication protocol
C. Defines Database Schema
D. Defines Log storage location

www.dumpstoday.com
Questions and Answers PDF 24/27

Answer: A,D
Explanation:

Question: 49

What role does FortiWeb play in ensuring PCI DSS compliance?

A. PCI specifically requires a WAF


B. Provides credit card processing capabilities
C. Provide ability to securely process cash transactions
D. Provides load balancing between multiple web servers

Answer: A
Explanation:

FortiWeb helps you meet all PCI requirements, but PCI now specifically recommends using a WAF,
and developing remediations against the top 10 vulnerabilities, according to OWASP.

Question: 50

Which operation mode does not require additional configuration in order to allow FTP traffic to your
web server?

A. Offline Protection
B. Transparent Inspection
C. True Transparent Proxy
D. Reverse-Proxy

Answer: B
Explanation:

Question: 51

Which implementation is best suited for a deployment that must meet compliance criteria?

A. SSL Inspection with FortiWeb in Transparency mode


B. SSL Offloading with FortiWeb in reverse proxy mode
C. SSL Inspection with FrotiWeb in Reverse Proxy mode
D. SSL Offloading with FortiWeb in Transparency Mode

www.dumpstoday.com
Questions and Answers PDF 25/27

Answer: C
Explanation:

Question: 52

Which of the following FortiWeb features is part of the mitigation tools against OWASP A4 threats?

A. Sensitive info masking


B. Poison Cookie detection
C. Session Management
D. Brute Force blocking

Answer: C
Explanation:

Question: 53

What capability can FortiWeb add to your Web App that your Web App may or may not already
have?

A. Automatic backup and recovery


B. High Availability our WhatsApp +21655255099
C. HTTP/HTML Form Authentication
D. SSL Inspection

Answer: C
Explanation:

Question: 54

An e-commerce web app is used by small businesses. Clients often access it from offices behind a
router, where clients are on an IPv4 private network LAN. You need to protect the web application
from denial of service attacks that use request floods.

What FortiWeb feature should you configure?

A. Enable “Shared IP” and configure the separate rate limits for requests from NATted source IPs.
B. Configure FortiWeb to use “X-Forwarded-For:” headers to find each client’s private network IP, and
to block attacks using that.
C. Enable SYN cookies.

www.dumpstoday.com
Questions and Answers PDF 26/27

D. Configure a server policy that matches requests from shared Internet connections.

Answer: C
Explanation:

Question: 55

Under which circumstances does FortiWeb use its own certificates? (Choose Two)

A. Secondary HTTPS connection to server where FortiWeb acts as a client


B. HTTPS to clients
C. HTTPS access to GUI
D. HTTPS to FortiGate

Answer: A,C
Explanation:

Question: 56

What benefit does Auto Learning provide?

A. Automatically identifies and blocks suspicious IPs


B. FortiWeb scans all traffic without taking action and makes recommendations on rules
C. Automatically builds rules sets
D. Automatically blocks all detected threats

Answer: C
Explanation:

ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+
Proxy help on exam)

ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,
pay after Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA

=> For more information please contact our Whatsupp +21655255099

www.dumpstoday.com
Questions and Answers PDF 27/27

Thank You for your purchase


Fortinet NSE6_FWB-6.4 Exam Question & Answers
Fortinet NSE 6 - FortiWeb 6.4 Exam

ALL Voucher Fortinet exam availabe (NSE4 NSE5 NSE6 NSE7 )+ DUMPS valid 100% or (Voucher+Proxy
help on exam)

ALL Cisco Exam proxy avaible now => CCNA or CCNP ( ENCOR ,SCOR ,ENRASI..Help on exam ,pay after
Pass)
PALO ALTO (PCNSE ,PCNSA) , AZURE(900,104,700,500 MS ....) Voucher + proxy all exam AZURE
Exam proxy avaible now for CISA CISM ITILV4 PALO PMP CISCO FORTINET VM COMPTIA
#CISA #CISM #PCNSE #ITILV4 #PCNSA #COMTIA

=> For more information please contact our Whatsupp +21655255099

www.dumpstoday.com

You might also like