110 likes | 124 Views
PassQuestion has created Fortinet NSE 6 - FortiWeb 6.1 NSE6_FWB-6.1 Practice Test Questions that can be used for your best preparation and ensure your final success.
E N D
NSE6_FWB-6.1 Free Questions NSE6_FWB-6.1 Free Questions Fortinet NSE 6 - FortiWeb 6.1 Fortinet NSE 6 - FortiWeb 6.1 https://www.passquestion.com/ https://www.passquestion.com/NSE6_FWB-6.1 NSE6_FWB-6.1.html .html
Question 1 Question 1 What role does FortiWeb play in ensuring PCI DSS compliance? What role does FortiWeb play in ensuring PCI DSS compliance? A. It provides the ability to securely process cash transactions. A. It provides the ability to securely process cash transactions. B. It provides the required SQL server protection. B. It provides the required SQL server protection. C. It provides the WAF required by PCI. C. It provides the WAF required by PCI. D. It provides credit card processing capabilities. D. It provides credit card processing capabilities. Answer: D Answer: D
Question 2 Question 2 What can an administrator do if a client has been incorrectly period blocked? What can an administrator do if a client has been incorrectly period blocked? A. Nothing, it is not possible to override a period block. A. Nothing, it is not possible to override a period block. B. Manually release the ID address from the temporary blacklist. B. Manually release the ID address from the temporary blacklist. C. Force a new IP address to the client. C. Force a new IP address to the client. D. Disconnect the client from the network. D. Disconnect the client from the network. Answer: B Answer: B
Question 3 Question 3 How does FortiWeb protect against defacement attacks? How does FortiWeb protect against defacement attacks? A. It keeps a complete backup of all files and the database. A. It keeps a complete backup of all files and the database. B. It keeps hashes of files and periodically compares them to the server. B. It keeps hashes of files and periodically compares them to the server. C. It keeps full copies of all files and directories. C. It keeps full copies of all files and directories. D. It keeps a live duplicate of the database. D. It keeps a live duplicate of the database. Answer: B Answer: B
Question 4 Question 4 What is one of the key benefits of the FortiGuard IP reputation feature? What is one of the key benefits of the FortiGuard IP reputation feature? A. It maintains a list of private IP addresses. A. It maintains a list of private IP addresses. B. It provides a document of IP addresses that are suspect, so that administrators can B. It provides a document of IP addresses that are suspect, so that administrators can manually update their blacklists. manually update their blacklists. C. It is updated once per year. C. It is updated once per year. D. It maintains a list of public IPs with a bad reputation for participating in attacks. D. It maintains a list of public IPs with a bad reputation for participating in attacks. Answer: D Answer: D
Question 5 Question 5 Which statement about local user accounts is true? Which statement about local user accounts is true? A. They are best suited for large environments with many users. A. They are best suited for large environments with many users. B. They cannot be used for site publishing. B. They cannot be used for site publishing. C. They must be assigned, regardless of any other authentication. C. They must be assigned, regardless of any other authentication. D. They can be used for SSO. D. They can be used for SSO. Answer: D Answer: D
Question 6 Question 6 Which algorithm is used to build mathematical models for bot detection? Which algorithm is used to build mathematical models for bot detection? A. HCM A. HCM B. SVN B. SVN C. SVM C. SVM D. HMM D. HMM Answer: C Answer: C
Question 7 Question 7 When is it possible to use a self-signed certificate, rather than one purchased from a commercial When is it possible to use a self-signed certificate, rather than one purchased from a commercial certificate authority? certificate authority? A. If you are a small business or home office A. If you are a small business or home office B. If you are an enterprise whose employees use only mobile devices B. If you are an enterprise whose employees use only mobile devices C. If you are an enterprise whose resources do not need security C. If you are an enterprise whose resources do not need security D. If you are an enterprise whose computers all trust your active directory or other CA server D. If you are an enterprise whose computers all trust your active directory or other CA server Answer: C Answer: C
Question 8 Question 8 True transparent proxy mode is best suited for use in which type of environment? True transparent proxy mode is best suited for use in which type of environment? A. New networks where infrastructure is not yet defined A. New networks where infrastructure is not yet defined B. Flexible environments where you can easily change the IP addressing scheme B. Flexible environments where you can easily change the IP addressing scheme C. Small office to home office environments C. Small office to home office environments D. Environments where you cannot change the IP addressing scheme D. Environments where you cannot change the IP addressing scheme Answer: D Answer: D
Question 9 Question 9 What must you do with your FortiWeb logs to ensure PCI DSS compliance? What must you do with your FortiWeb logs to ensure PCI DSS compliance? A. Store in an off-site location A. Store in an off-site location B. Erase them every two weeks B. Erase them every two weeks C. Enable masking of sensitive data C. Enable masking of sensitive data D. Compress them into a .zip file format D. Compress them into a .zip file format Answer: C Answer: C
Question 10 Question 10 When viewing the attack logs on FortiWeb, which client IP address is shown when you When viewing the attack logs on FortiWeb, which client IP address is shown when you are using XFF header rules? are using XFF header rules? A. FortiGate public IP A. FortiGate public IP B. FortiWeb IP B. FortiWeb IP C. FortiGate local IP C. FortiGate local IP D. Client real IP D. Client real IP Answer: D Answer: D