Refer to the exhibit, which shows the packet capture output of a three-way handshake between FortiGate and FortiManager Cloud.What two conclusions can you draw from the exhibit? (Choose two.)
Refer to the exhibit, which shows a LAN interface connected from FortiGate to two FortiSwitch devices.What two conclusions can you draw from the corresponding LAN interface? (Choose two.)
Refer to the exhibit, which shows the HA status of an active-passive cluster.An administrator wants FortiGate_B to handle the Core2 VDOM traffic.Which modification must the administrator apply to achieve this?
During the maintenance window, an administrator must sniff all the traffic going through a specific firewall policy, which is handled by NP6 interfaces. The output of the sniffer trace provides just a few packets.Why is the output of sniffer trace limited?
Refer to the exhibit, which shows a network diagram.An administrator would like to modify the MED value advertised from FortiGate_1 to a BGP neighbor in the autonomous system 30.What must the administrator configure on FortiGate_1 to implement this?
An administrator received a FortiAnalyzer alert that a 1 ТВ disk filled up in a day. Upon investigation, they found thousands of unusual DNS log requests, such as JHCMQK.website.com, with no answers. They later discovered that DNS exfiltration was occurring through both UDP and TLS.How can the administrator prevent this data theft technique?