New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Fortinet NSE6_FAD-6.2 Fortinet NSE 6 - FortiADC 6.2 Exam Practice Test

Demo: 9 questions
Total 30 questions

Fortinet NSE 6 - FortiADC 6.2 Questions and Answers

Question 1

An administrator is managing a web site that uses specialized servers for streaming, in addition to servers that handle HTTP traffic.

To make sure that specialized servers handle the streaming traffic, what FortiADC capacity should they use?

Options:

A.

Persistence rules

B.

Content routing

C.

Dynamic load balancing

D.

HTTP compression

Question 2

An administrator has configured all the back end servers with a maximum warm-up state rate.

Under which two conditions is the maximum rate enforced by FortiADC? (Choose two.)

Options:

A.

As long as a server keeps replying to the health Check

B.

When multiple health check methods have been configured for a server and some of them are failing but at least one is up.

C.

When the status of a server is set to Enabled from Maintain of Disabled

D.

During a warm-up period, when a server is back online after a health check downtime

Question 3

A FortiADC administrator wants to offload SSL encryption and decryption of web traffic to lessen overhead on the real servers, while maintaining SSL encryption with the client.

Which must be true to allow FortiADC to provide this capability?

Options:

A.

The real server pool must be configured for SSL

B.

The virtual server must be configured to perform content routing

C.

The real server certificate and private key must be installed on FortiADC

D.

The virtual server must use a TCPS application profile

Question 4

Refer to the exhibit.

The exhibit shows the Basic andGeneral tabs of a virtual server configuration.

Why is the Scripting option not available?

Options:

A.

Scripting is not supported when using a RADIUS profile

B.

Scripting is not supported when using round robin load balancing

C.

Scripting is not supported on Layer 7 type virtual servers.

Question 5

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.

What must the administrator do to avoid this problem? (Choose two.)

Options:

A.

Enable the Use X-Forwarded-For setting on FortiWeb.

B.

No Special configuration is required; connectivity will be re-established after the set timeout.

C.

Place FortiWeb in front of FortiADC.

D.

Enable the Add X-Forwarded-For setting on FortiWeb.

Question 6

Which two statements about virtual tunneling for outbound link load balancing are true? (Choose two.)

Options:

A.

Link policies are used to specify which traffic is sent through each virtual tunnel.

B.

Each virtual tunnel can contain no more than three IP tunnel.

C.

Two dispatch algorithms are supported weighted round robin and source destination hash.

D.

A virtual tunnel can combine point to point and multipoint IP tunnels.

Question 7

Which are two advantages of TCP multiplexing? (Choose two.)

Options:

A.

it reduces the number of TCP sessions that the server

B.

it allows FortiADC to balance a client TCP connection among multiple servers

C.

A new client connection does not need to wait for a new FortiADC-to-server connection

D.

It reduces the number of TCP sessions that clients need to establish

Question 8

An administrator has learned that some of the corporate web servers were exploited using SQL injection attacks.

What should the administrator do to verify their web servers are not susceptible to the exploits?

Options:

A.

Configure WVS

B.

Configure a database health check

C.

Configure DNSSEC

D.

Configure SSLi

Question 9

Which two statements about FortiADC logs are true? (Choose two.)

Options:

A.

They can be stored on FortiCloud.

B.

They can be uploaded automatically to an FTP server.

C.

Only logs with seventy level equal to or greater than that configured log Severity level are generated.

D.

They can record events related to security features.

Demo: 9 questions
Total 30 questions