Certbus > Fortinet > Fortinet Certification > NSE6_FWB-6.4 > NSE6_FWB-6.4 Online Practice Questions and Answers

NSE6_FWB-6.4 Online Practice Questions and Answers

Questions 4

Which implementation is best suited for a deployment that must meet compliance criteria?

A. SSL Inspection with FortiWeb in Transparency mode

B. SSL Offloading with FortiWeb in reverse proxy mode

C. SSL Inspection with FrotiWeb in Reverse Proxy mode

D. SSL Offloading with FortiWeb in Transparency Mode

Browse 56 Q&As
Questions 5

Refer to the exhibit.

FortiWeb is configured to block traffic from Japan to your web application server. However, in the logs, the administrator is seeing traffic allowed from one particular IP address which is geo-located in Japan. What can the administrator do to solve this problem? (Choose two.)

A. Manually update the geo-location IP addresses for Japan.

B. If the IP address is configured as a geo reputation exception, remove it.

C. Configure the IP address as a blacklisted IP address.

D. If the IP address is configured as an IP reputation exception, remove it.

Browse 56 Q&As
Questions 6

An e-commerce web app is used by small businesses. Clients often access it from offices behind a router, where clients are on an IPv4 private network LAN. You need to protect the web application from denial of service attacks that use request floods.

What FortiWeb feature should you configure?

A. Enable "Shared IP" and configure the separate rate limits for requests from NATted source IPs.

B. Configure FortiWeb to use "X-Forwarded-For:" headers to find each client's private network IP, and to block attacks using that.

C. Enable SYN cookies.

D. Configure a server policy that matches requests from shared Internet connections.

Browse 56 Q&As
Questions 7

Refer to the exhibit.

Many legitimate users are being identified as bots. FortiWeb bot detection has been configured with the settings shown in the exhibit. The FortiWeb administrator has already verified that the current model is accurate.

What can the administrator do to fix this problem, making sure that real bots are not allowed through FortiWeb?

A. Change Model Type to Strict

B. Change Action under Action Settings to Alert

C. Disable Dynamically Update Model

D. Enable Bot Confirmation

Browse 56 Q&As
Questions 8

Refer to the exhibit.

Based on the configuration, what would happen if this FortiWeb were to lose power? (Choose two.)

A. Traffic that passes between port5 and port6 will be inspected.

B. Traffic will be interrupted between port3 and port4.

C. All traffic will be interrupted.

D. Traffic will pass between port5 and port6 uninspected.

Browse 56 Q&As
Questions 9

How does FortiWeb protect against defacement attacks?

A. It keeps a complete backup of all files and the database.

B. It keeps hashes of files and periodically compares them to the server.

C. It keeps full copies of all files and directories.

D. It keeps a live duplicate of the database.

Browse 56 Q&As
Questions 10

In Reverse proxy mode, how does FortiWeb handle traffic that does not match any defined policies?

A. Non-matching traffic is allowed

B. non-Matching traffic is held in buffer

C. Non-matching traffic is Denied

D. Non-matching traffic is rerouted to FortiGate

Browse 56 Q&As
Questions 11

What role does FortiWeb play in ensuring PCI DSS compliance?

A. It provides the ability to securely process cash transactions.

B. It provides the required SQL server protection.

C. It provides the WAF required by PCI.

D. It provides credit card processing capabilities.

Browse 56 Q&As
Questions 12

You are using HTTP content routing on FortiWeb. You want requests for web application A to be forwarded to a cluster of web servers, which all host the same web application. You want requests for web application B to be forwarded to a different, single web server.

Which statement about this solution is true?

A. The server policy applies the same protection profile to all of its protected web applications.

B. You must put the single web server in to a server pool, in order to use it with HTTP content routing.

C. You must chain policies so that requests for web application A go to the virtual server for policy A, and requests for web application B go to the virtual server for policy B.

D. Static or policy-based routes are not required.

Browse 56 Q&As
Questions 13

What key factor must be considered when setting brute force rate limiting and blocking?

A. A single client contacting multiple resources

B. Multiple clients sharing a single Internet connection

C. Multiple clients from geographically diverse locations

D. Multiple clients connecting to multiple resources

Browse 56 Q&As
Questions 14

Which is true about HTTPS on FortiWeb? (Choose three.)

A. For SNI, you select the certificate that FortiWeb will present in the server pool, not in the server policy.

B. After enabling HSTS, redirects to HTTPS are no longer necessary.

C. In true transparent mode, the TLS session terminator is a protected web server.

D. Enabling RC4 protects against the BEAST attack, but is not recommended if you configure FortiWeb to only offer TLS 1.2.

E. In transparent inspection mode, you select which certificate that FortiWeb will present in the server pool, not in the server policy.

Browse 56 Q&As
Questions 15

Which two statements about running a vulnerability scan are true? (Choose two.)

A. You should run the vulnerability scan during a maintenance window.

B. You should run the vulnerability scan in a test environment.

C. Vulnerability scanning increases the load on FortiWeb, so it should be avoided.

D. You should run the vulnerability scan on a live website to get accurate results.

Browse 56 Q&As
Questions 16

What is one of the key benefits of the FortiGuard IP reputation feature?

A. It maintains a list of private IP addresses.

B. It provides a document of IP addresses that are suspect, so that administrators can manually update their blacklists.

C. It is updated once per year.

D. It maintains a list of public IPs with a bad reputation for participating in attacks.

Browse 56 Q&As
Questions 17

FortiWeb offers the same load balancing algorithms as FortiGate.

Which two Layer 7 switch methods does FortiWeb also offer? (Choose two.)

A. Round robin

B. HTTP session-based round robin

C. HTTP user-based round robin

D. HTTP content routes

Browse 56 Q&As
Questions 18

Under what circumstances would you want to use the temporary uncompress feature of FortiWeb?

A. In the case of compression being done on the FortiWeb, to inspect the content of the compressed file

B. In the case of the file being a .MP3 music file

C. In the case of compression being done on the web server, to inspect the content of the compressed file.

D. In the case of the file being an .MP4 video

Browse 56 Q&As
Exam Code: NSE6_FWB-6.4
Exam Name: Fortinet NSE 6 - FortiWeb 6.4
Last Update: Apr 24, 2024
Questions: 56 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99