<< Prev Question Next Question >>

Question 11/50

You have enabled logging on your FortiGate device for Event logs and all Security logs, and you have set up logging to use the FortiGate local disk.
What is the default behavior when the local disk is full?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (50q)
Question 1: An administrator needs to increase network bandwidth and pro...
Question 2: Which of the following statements is true regarding SSL VPN ...
Question 3: Refer to the exhibits. (Exhibit) The SSL VPN connection fail...
Question 4: What is the effect of enabling auto-negotiate on the phase 2...
Question 5: Which two protocols are used to enable administrator access ...
Question 6: Refer to the exhibit. (Exhibit) According to the certificate...
Question 7: View the exhibit: (Exhibit) Which the FortiGate handle web p...
Question 8: Refer to the FortiGuard connection debug output. (Exhibit) B...
Question 9: Which three pieces of information does FortiGate use to iden...
Question 10: Refer to the exhibit showing a debug flow output. (Exhibit) ...
Question 11: You have enabled logging on your FortiGate device for Event ...
Question 12: View the exhibit. (Exhibit) Which of the following statement...
Question 13: What inspection mode does FortiGate use if it is configured ...
Question 14: Refer to the exhibit, which contains a static route configur...
Question 15: Which three statements about security associations (SA) in I...
Question 16: Refer to the exhibit. (Exhibit) The Root and To_Internet VDO...
Question 17: Which two statements are correct about SLA targets? (Choose ...
Question 18: Examine the exhibit, which contains a virtual IP and firewal...
Question 19: When browsing to an internal web server using a web-mode SSL...
Question 20: Which CLI command allows administrators to troubleshoot Laye...
Question 21: To complete the final step of a Security Fabric configuratio...
Question 22: Which of the following statements about central NAT are true...
Question 23: What types of traffic and attacks can be blocked by a web ap...
Question 24: Which two settings can be separately configured per VDOM on ...
Question 25: Which three methods are used by the collector agent for AD p...
Question 26: Which Security rating scorecard helps identify configuration...
Question 27: Refer to the exhibit. (Exhibit) Given the interfaces shown i...
Question 28: Refer to the exhibit. (Exhibit) Given the security fabric to...
Question 29: Which two statements are true about collector agent standard...
Question 30: Refer to the exhibit. (Exhibit) In the network shown in the ...
Question 31: What is the primary FortiGate election process when the HA o...
Question 32: Refer to the exhibit. (Exhibit) Based on the administrator p...
Question 33: An administrator is configuring an Ipsec between site A and ...
Question 34: Refer to the exhibit. (Exhibit) Which contains a session lis...
Question 35: NGFW mode allows policy-based configuration for most inspect...
Question 36: Which two VDOMs are the default VDOMs created when FortiGate...
Question 37: Which statement about the policy ID number of a firewall pol...
Question 38: Refer to the exhibit. (Exhibit) The exhibits show a network ...
Question 39: Which three criteria can a FortiGate use to look for a match...
Question 40: Which two statements about antivirus scanning mode are true?...
Question 41: Which of the following statements correctly describes FortiG...
Question 42: Refer to the exhibits. (Exhibit) The exhibits show the SSL a...
Question 43: A network administrator wants to set up redundant IPsec VPN ...
Question 44: Which two statements ate true about the Security Fabric rati...
Question 45: Examine the two static routes shown in the exhibit, then ans...
Question 46: Refer to the exhibits. (Exhibit) Exhibit A shows system perf...
Question 47: Refer to the exhibit. (Exhibit) The exhibit shows a CLI outp...
Question 48: Which three criteria can a FortiGate use to look for a match...
Question 49: Which statements best describe auto discovery VPN (ADVPN). (...
Question 50: Refer to the web filter raw logs. (Exhibit) Based on the raw...