Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Review the following configuration:

What are two routing behaviors that you can expect on FortiWeb after this configuration change? (Choose two.)

A.

Non-HTTP traffic routed through the FortiWeb is allowed.

B.

IPv6 routing is enabled.

C.

Non-HTTP traffic destined to the FortiWeb virtual server IP address is dropped.

D.

Only ICMP traffic is allowed. All other traffic is dropped.

Full Access
Question # 5

An attacker attempts to send an SQL injection attack containing the known attack string 'root'; -- through an API call.

Which FortiWeb inspection feature will be able to detect this attack the quickest?

A.

API gateway rule

B.

Known signatures

C.

Machine learning(ML)-based API protection—anomaly detection

D.

ML-based API protection—threat detection

Full Access
Question # 6

Which three stages are part of creating a machine learning (ML) bot detection algorithm? (Choose three.)

A.

Model building

B.

Model running

C.

Model verification

D.

Sample collecting

E.

Model Bayesian analysis

Full Access
Question # 7

What is the difference between an API gateway protection schema and a machine learning (ML) API protection schema?

A.

An API gateway protection schema does not allow authentication.

B.

An API gateway protection schema handles response bodies.

C.

An API gateway protection schema supports data types other than string.

D.

An API gateway protection schema cannot change without administrator intervention.

Full Access
Question # 8

Refer to the exhibit.

Attack ID20000010is brute force logins.

Which statement is accurate about the potential attack?

A.

The attacker has successfully retrieved the credentials to www.example.com.

B.

www.example.com is running attacks against the client 192.168.1.11.

C.

The attack has happened 10 times.

D.

192.168.1.11 is sending suspicious traffic to FortiWeb.

Full Access
Question # 9

How are bot machine learning (ML) models different from API or anomaly detection models?

A.

Bot ML models analyze multiple connections overtime instead analyzing each connection as a single unit.

B.

Bot ML models detect only anomalies and not actual threats.

C.

Bot ML models inspect more types of connection properties.

D.

Bot ML models do not update models periodically from new data.

Full Access
Question # 10

In SAML deployments, which server contains user authentication credentials (username/password)?

A.

Identity provider

B.

Service provider

C.

User database

D.

Authentication client

Full Access