00:00

QUESTION 6

Which command will enable debugging for the FortiWeb user tracking feature?

Correct Answer: B

QUESTION 7

Which two objects are required to configure a server policy in reverse proxy mode without content routing? (Choose two.)

Correct Answer: BC

QUESTION 8

When is it possible to use a self-signed certificate, rather than one purchased from a commercial certificate authority?

Correct Answer: C

QUESTION 9

Refer to the exhibit.
FCP_FWB_AD-7.4 dumps exhibit
Attack ID20000010is brute force logins.
Which statement is accurate about the potential attack?

Correct Answer: D

QUESTION 10

Refer to the exhibits.
FCP_FWB_AD-7.4 dumps exhibit
FCP_FWB_AD-7.4 dumps exhibit
What will happen when a client attempts a mousedown cross-site scripting (XSS) attack against the sitehttp://my.blog.org/userl1/blog.phpand FortiWeb is enforcing the highlighted signature?

Correct Answer: D