Free NSE6_FWB-6.4 Exam Braindumps (page: 7)

Page 6 of 15

Refer to the exhibits.





FortiWeb is configured in reverse proxy mode and it is deployed downstream to FortiGate. Based on the configuration shown in the exhibits, which of the following statements is true?

  1. FortiGate should forward web traffic to the server pool IP addresses.
  2. The configuration is incorrect. FortiWeb should always be located upstream to FortiGate.
  3. You must disable the Preserve Client IP setting on FotriGate for this configuration to work.
  4. FortiGate should forward web traffic to virtual server IP address.

Answer(s): D


Reference:

https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ebe2ce28- 5c66-11eb-b9ad-00505692583a/FortiWeb_6.3.10_Administration_Guide.pdf



When is it possible to use a self-signed certificate, rather than one purchased from a commercial certificate authority?

  1. If you are a small business or home office
  2. If you are an enterprise whose employees use only mobile devices
  3. If you are an enterprise whose resources do not need security
  4. If you are an enterprise whose computers all trust your active directory or other CA server

Answer(s): D



In which scenario might you want to use the compression feature on FortiWeb?

  1. When you are serving many corporate road warriors using 4G tablets and phones
  2. When you are offering a music streaming service
  3. When you want to reduce buffering of video streams
  4. Never, since most traffic today is already highly compressed

Answer(s): A

Explanation:

https://training.fortinet.com/course/view.php?id=3363 When might you want to use the compression feature on FortiWeb? When you are serving many road warriors who are using 4G tablets and phones



The FortiWeb machine learning (ML) feature is a two-phase analysis mechanism.
Which two functions does the first layer perform? (Choose two.)

  1. Determines whether an anomaly is a real attack or just a benign anomaly that should be ignored
  2. Builds a threat model behind every parameter and HTTP method
  3. Determines if a detected threat is a false-positive or not
  4. Determines whether traffic is an anomaly, based on observed application traffic over time

Answer(s): B,D

Explanation:

The first layer uses the Hidden Markov Model (HMM) and monitors access to the application and collects data to build a mathematical model behind every parameter and HTTP method.


Reference:

https://docs.fortinet.com/document/fortiweb/6.3.0/administration- guide/193258/machine-learning






Post your Comments and Discuss Fortinet NSE6_FWB-6.4 exam with other Community members:

NSE6_FWB-6.4 Discussions & Posts