Fortinet NSE 6 - FortiWeb 6.1 v1.0

Page:    1 / 2   
Exam contains 33 questions

Which two statements about running a vulnerability scan are true? (Choose two.)

  • A. You should run the vulnerability scan during a maintenance window.
  • B. You should run the vulnerability scan in a test environment.
  • C. Vulnerability scanning increases the load on FortiWeb, so it should be avoided.
  • D. You should run the vulnerability scan on a live website to get accurate results.

Answer : AB

Should the Vulnerability Scanner allow it, SVMS will set the scan schedule (or schedules) to run in a maintenance window. SVMS will advise Client of the scannerג€™s ability to complete the scan(s) within the maintenance window.
Vulnerabilities on live web sites. Instead, duplicate the web site and its database in a test environment.

FortiWeb offers the same load balancing algorithms as FortiGate.
Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)

  • A. Round robin
  • B. HTTP session-based round robin
  • C. HTTP user-based round robin
  • D. HTTP content routes

Answer : AD


Which would be a reason to implement HTTP rewriting?

  • A. The original page has moved to a new URL
  • B. To replace a vulnerable function in the requested URL
  • C. To send the request to secure channel
  • D. The original page has moved to a new IP address

Answer : A

Create a new URL rewriting rule.

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)

  • A. Enable the Use X-Forwarded-For setting on FortiWeb.
  • B. No Special configuration is required; connectivity will be re-established after the set timeout.
  • C. Place FortiWeb in front of FortiADC.
  • D. Enable the Add X-Forwarded-For setting on FortiWeb.

Answer : AD

Configure your load balancer to insert or append to an X-Forwarded-For:, X-Real-IP:, or other HTTP X-header. Also configure FortiWeb to find the original attackerג€™s or clientג€™s IP address in that HTTP header

Which statement about local user accounts is true?

  • A. They are best suited for large environments with many users.
  • B. They cannot be used for site publishing.
  • C. They must be assigned, regardless of any other authentication.
  • D. They can be used for SSO.

Answer : D

You can configure the Remedy Single Sign-On server to authenticate TrueSight Capacity Optimization users as local users.

Refer to the exhibit.

Based on the configuration, what would happen if this FortiWeb were to lose power? (Choose two.)

  • A. Traffic that passes between port5 and port6 will be inspected.
  • B. Traffic will be interrupted between port3 and port4.
  • C. All traffic will be interrupted.
  • D. Traffic will pass between port5 and port6 uninspected.

Answer : BD


Refer to the exhibit.

FortiWeb is configured to block traffic from Japan to your web application server. However, in the logs, the administrator is seeing traffic allowed from one particular IP address which is geo-located in Japan.
What can the administrator do to solve this problem? (Choose two.)

  • A. Manually update the geo-location IP addresses for Japan.
  • B. If the IP address is configured as a geo reputation exception, remove it.
  • C. Configure the IP address as a blacklisted IP address.
  • D. If the IP address is configured as an IP reputation exception, remove it.

Answer : AC

IP reputation leverages many techniques for accurate, early, and frequently updated identification of compromised and malicious clients so you can block attackers before they target your servers.
IP blacklisting is a method used to filter out illegitimate or malicious IP addresses from accessing your networks. Blacklists are lists containing ranges of or individual IP addresses that you want to block.

Which algorithm is used to build mathematical models for bot detection?

  • A. HCM
  • B. SVN
  • C. SVM
  • D. HMM

Answer : C

FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model

A client is trying to start a session from a page that would normally be accessible only after the client has logged in.
When a start page rule detects the invalid session access, what can FortiWeb do? (Choose three.)

  • A. Display an access policy message, then allow the client to continue
  • B. Redirect the client to the login page
  • C. Allow the page access, but log the violation
  • D. Prompt the client to authenticate
  • E. Reply with a 403 Forbidden HTTP error

Answer : BCE


Refer to the exhibit.

Many legitimate users are being identified as bots. FortiWeb bot detection has been configured with the settings shown in the exhibit. The FortiWeb administrator has already verified that the current model is accurate.
What can the administrator do to fix this problem, making sure that real bots are not allowed through FortiWeb?

  • A. Change Model Type to Strict
  • B. Change Action under Action Settings to Alert
  • C. Disable Dynamically Update Model
  • D. Enable Bot Confirmation

Answer : D


Bot Confirmation -
If the number of anomalies from a user has reached the Anomaly Count, the system executes Bot Confirmation before taking actions.
The Bot Confirmation is to confirm if the user is indeed a bot. The system sends RBE (Real Browser Enforcement) JavaScript or CAPTCHA to the client to double check if it's a real bot.

What can an administrator do if a client has been incorrectly period blocked?

  • A. Nothing, it is not possible to override a period block.
  • B. Manually release the ID address from the temporary blacklist.
  • C. Force a new IP address to the client.
  • D. Disconnect the client from the network.

Answer : B


Block Period -
Enter the number of seconds that you want to block the requests. The valid range is 1ג€"3,600 seconds. The default value is 60 seconds.
This option only takes effect when you choose Period Block in Action.
Note: Thatג€™s a temporary blacklist so you can manually release them from the blacklist.

Which regex expression is the correct format for redirecting the URL

  • A. www\.example\.com
  • B.
  • C. www\example\com
  • D. www/.example/.com

Answer : B


When FortiWeb triggers a redirect action, which two HTTP codes does it send to the client to inform the browser of the new URL? (Choose two.)

  • A. 403
  • B. 302
  • C. 301
  • D. 404

Answer : BC


True transparent proxy mode is best suited for use in which type of environment?

  • A. New networks where infrastructure is not yet defined
  • B. Flexible environments where you can easily change the IP addressing scheme
  • C. Small office to home office environments
  • D. Environments where you cannot change the IP addressing scheme

Answer : D

Does not require changes to the IP address scheme of the network. Requests are destined for a web server and not the FortiWeb appliance. This operation mode supports the same feature set as True Transparent Proxy mode.

Review the following configuration:

What is the expected result of this configuration setting?

  • A. When machine learning (ML) is in its collecting phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
  • B. When machine learning (ML) is in its running phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
  • C. When machine learning (ML) is in its collecting phase, FortiWeb will not accept any samples from any source IP addresses.
  • D. When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples from the same source IP address.

Answer : A

Page:    1 / 2   
Exam contains 33 questions

Talk to us!

Have any questions or issues ? Please dont hesitate to contact us

Certlibrary doesn't offer Real Microsoft Exam Questions.
Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.