Podcast
Questions and Answers
What is required for the Learn Mode firewall policy?
What is required for the Learn Mode firewall policy?
- Source interfaces must have device identification enabled (correct)
- FortiGate must send security logs to FortiAnalyzer
- The security policy action must be set to ACCEPT
- All of the above
What can be used to apply protection and enforcement of security in the firewall policy?
What can be used to apply protection and enforcement of security in the firewall policy?
- Security profiles
- Intrusion detection
- Virtual patching
- All of the above (correct)
What is the purpose of the MEA on FortiManager in relation to the learn mode firewall policy?
What is the purpose of the MEA on FortiManager in relation to the learn mode firewall policy?
- To create security policies
- To enforce security
- To monitor traffic
- To review learn mode firewall policy logs (correct)
In which mode is the learn mode security policy available?
In which mode is the learn mode security policy available?
What is a requirement for creating a new learn mode security policy?
What is a requirement for creating a new learn mode security policy?
What can be used to apply protection in the firewall policy for I-IoT application sensors?
What can be used to apply protection in the firewall policy for I-IoT application sensors?
What can the security policy action be set to in the learn mode firewall policy?
What can the security policy action be set to in the learn mode firewall policy?
What does the learn mode firewall policy use the prefixes fields in?
What does the learn mode firewall policy use the prefixes fields in?
What is used to review learn mode firewall policy logs?
What is used to review learn mode firewall policy logs?
What can be achieved using a unified policy for protection and enforcement of security?
What can be achieved using a unified policy for protection and enforcement of security?
What is required for Learn mode to be available?
What is required for Learn mode to be available?
What can FortiManager administrators do based on the analyzed traffic?
What can FortiManager administrators do based on the analyzed traffic?
What is recommended to protect the different ICS environments and limit the propagation of attacks?
What is recommended to protect the different ICS environments and limit the propagation of attacks?
What does FortiGate create to stop threats from propagating between ICS network 1 and ICS network 2?
What does FortiGate create to stop threats from propagating between ICS network 1 and ICS network 2?
What does placing FortiGate devices at strategic points within the ICS network allow?
What does placing FortiGate devices at strategic points within the ICS network allow?
What specific functionality does FortiGate have for ICS and SCADA?
What specific functionality does FortiGate have for ICS and SCADA?
What does FortiGate provide for applications and devices from major ICS manufacturers?
What does FortiGate provide for applications and devices from major ICS manufacturers?
What does the specific protocol support enable FortiGate to do?
What does the specific protocol support enable FortiGate to do?
What does a more proactive approach allow for ICS networks and their processes and protocols?
What does a more proactive approach allow for ICS networks and their processes and protocols?
What is the first line of defense in protecting the ICS side?
What is the first line of defense in protecting the ICS side?
Flashcards are hidden until you start studying