Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Public Cloud Security > FCP_FWB_AD-7.4

FCP_FWB_AD-7.4 FCP - FortiWeb 7.4 Administrator Question and Answers

Question # 4

When is it possible to use a self-signed certificate, rather than one purchased from a commercial certificate authority?

A.

If you are an enterprise whose employees use only mobile devices

B.

If you are a small business or home office

C.

If you are an enterprise whose computers all trust the active directory or CA server that signed the certificate

D.

If you are an enterprise whose resources do not need security or https connections

Full Access
Question # 5

In SAML deployments, which server contains user authentication credentials (username/password)?

A.

Identity provider

B.

Service provider

C.

User database

D.

Authentication client

Full Access
Question # 6

Which Layer 7 routing method does FortiWeb support?

A.

URL policy routing

B.

OSPF

C.

BGP

D.

HTTPcontent routing

Full Access
Question # 7

Which two items can be defined in a FortiWeb XML Protection Rule? (Choose two.)

A.

API key

B.

IXML Schema

C.

Web protection profile

D.

Request URL

Full Access
Question # 8

Refer to the exhibit.

What is true about this FortiWeb device? (Choose two.)

A.

It has 41% of the disk available for logging.

B.

It was upgraded to a different version after initial installation.

C.

It is currently running version 6.4.0.

D.

It is currently running version 6.4.1.

Full Access
Question # 9

What is the difference between an API gateway protection schema and a machine learning (ML) API protection schema?

A.

An API gateway protection schema does not allow authentication.

B.

An API gateway protection schema handles response bodies.

C.

An API gateway protection schema supports data types other than string.

D.

An API gateway protection schema cannot change without administrator intervention.

Full Access
Question # 10

How are bot machine learning (ML) models different from API or anomaly detection models?

A.

Bot ML models analyze multiple connections overtime instead analyzing each connection as a single unit.

B.

Bot ML models detect only anomalies and not actual threats.

C.

Bot ML models inspect more types of connection properties.

D.

Bot ML models do not update models periodically from new data.

Full Access