Which of the following would be a reason for implementing rewrites?
A. Page has been moved to a new URL
B. Page has been moved to a new IP address
C. Replace vulnerable functions.
D. Send connection to secure channel
When viewing the attack logs on your FortiWeb, which IP Address is shown for the client when using XFF Header rules?
A. FortiGate's public IP
B. FortiGate's local IP
C. FortiWeb's IP
D. Client's real IP
What other consideration must you take into account when configuring Defacement protection A. Use FortiWeb to block SQL Injections and keep regular backups of the Database
B. Also incorporate a FortiADC into your network
C. None. FortiWeb completely secures the site against defacement attacks
D. Configure the FortiGate to perform Anti-Defacement as well
Under what circumstances would you want to use the temporary uncompress feature of FortiWeb?
A. In the case of compression being done on the FortiWeb, to inspect the content of the compressed file
B. In the case of the file being a .MP3 music file
C. In the case of compression being done on the web server, to inspect the content of the compressed file.
D. In the case of the file being an .MP4 video
How does offloading compression to FortiWeb benefit your network?
A. free up resources on the database server
B. Free up resources on the web server
C. reduces file size on the client's storage
D. free up resources on the FortiGate
What role does FortiWeb play in ensuring PCI DSS compliance?
A. PCI specifically requires a WAF
B. Provides credit card processing capabilities
C. Provide ability to securely process cash transactions
D. Provides load balancing between multiple web servers
Which operation mode does not require additional configuration in order to allow FTP traffic to your web server?
A. Offline Protection
B. Transparent Inspection
C. True Transparent Proxy
D. Reverse-Proxy
Which implementation is best suited for a deployment that must meet compliance criteria?
A. SSL Inspection with FortiWeb in Transparency mode
B. SSL Offloading with FortiWeb in reverse proxy mode
C. SSL Inspection with FrotiWeb in Reverse Proxy mode
D. SSL Offloading with FortiWeb in Transparency Mode
Reverse-proxy mode is best suited for use in which type of environment?
A. New networks where infrastructure is not yet defined
B. Environments where you cannot change your IP addressing scheme
C. Flexible environments where you can easily change the IP addressing scheme
D. Small Office/Home Office environments
An e-commerce web app is used by small businesses. Clients often access it from offices behind a router,
where clients are on an IPv4 private network LAN. You need to protect the web application from denial of
service attacks that use request floods.
What FortiWeb feature should you configure?
A. Enable "Shared IP" and configure the separate rate limits for requests from NATted source IPs.
B. Configure FortiWeb to use "X-Forwarded-For:" headers to find each client's private network IP, and to block attacks using that.
C. Enable SYN cookies.
D. Configure a server policy that matches requests from shared Internet connections.