多选题 Which of the following statements about central NAT are true? (Choose two.)

A、 IP tool references must be removed from existing firewall policies before enabling central NAT .
B、 Central NAT can be enabled or disabled from the CLI only.
C、 Source NAT, using central NAT, requires at least one central SNAT policy.
D、 Destination NAT, using central NAT, requires a VIP object as the destination address in a firewall.
下载APP答题
由4l***v8提供 分享 举报 纠错

相关试题

单选题 Refer to the exhibits.By default, FortiGate is configured to use HTTPS when performing live web filtering with FortiGuard servers. Which CLI command will cause FortiGate to use an unreliable protocol to communicate with FortiGuard servers for live web filtering?

A、set fortiguard-anycast disable
B、set webfilter-force-off disable
C、set webfilter-cache disable
D、set protocol tcp

单选题 An administrator wants to configure timeouts for users. Regardless of the userTMs behavior, the timer should start as soon as the user authenticates and expire after the configured value. Which timeout option should be configured on FortiGate?

A、auth-on-demand
B、soft-timeout
C、idle-timeout
D、new-session
E、hard-timeout

单选题 If Internet Service is already selected as Source in a firewall policy, which other configuration objects can be added to the Source filed of a firewall policy?

A、IP address
B、Once Internet Service is selected, no other object can be added
C、User or User Group
D、FQDN address

单选题 Based on the exhibit, which configuration change can the administrator make to allow Twitter while blocking all other social networking sites?

A、On the FortiGuard Category Based Filter configuration, set Action to Warning for Social Networking
B、On the Static URL Filter configuration, set Type to Simple
C、On the Static URL Filter configuration, set Action to Exempt.
D、On the Static URL Filter configuration, set Action to Monitor.

单选题 An administrator does not want to report the logon events of service accounts to FortiGate. What setting on the collector agent is required to achieve this?

A、Add the support of NTLM authentication
B、Add user accounts to Active Directory (AD).
C、Add user accounts to the FortiGate group fitter.
D、Add user accounts to the Ignore User List.

单选题 On FortiGate, which type of logs record information about traffic directly to and from the FortiGate management IP addresses?

A、System event logs
B、Forward traffic logs
C、Local traffic logs
D、Security logs

单选题 What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?

A、It limits the scanning of application traffic to the DNS protocol only.
B、It limits the scanning of application traffic to use parent signatures only.
C、It limits the scanning of application traffic to the browser-based technology category only
D、It limits the scanning of application traffic to the application category only.

单选题 Refer to the exhibits. The exhibits show the firewall policies and the objects used in the firewall policies. The administrator is using the Policy Lookup feature and has entered the search criteria shown in the exhibit. Which policy will be highlighted, based on the input criteria?

A、Policy with ID 4.
B、Policy with ID 5.
C、Policies with ID 2 and 3
D、Policy with ID 4