Which command will enable debugging for the FortiWeb user tracking feature?
Correct Answer:
B
Which two objects are required to configure a server policy in reverse proxy mode without content routing? (Choose two.)
Correct Answer:
BC
When is it possible to use a self-signed certificate, rather than one purchased from a commercial certificate authority?
Correct Answer:
C
Refer to the exhibit.
Attack ID20000010is brute force logins.
Which statement is accurate about the potential attack?
Correct Answer:
D
Refer to the exhibits.

What will happen when a client attempts a mousedown cross-site scripting (XSS) attack against the sitehttp://my.blog.org/userl1/blog.phpand FortiWeb is enforcing the highlighted signature?
Correct Answer:
D