How do you configure a FortiGate to do traffic shaping of P2P traffic, such as BitTorrent?
Which file names will match the *.tiff file name pattern configured in a data leak prevention filter? (Choose two.)
An administrator has configured a dialup IPsec VPN with XAuth. Which method statement best describes this scenario?
View the exhibit.VDOM1 is operating is transparent mode VDOM2 is operating in NAT Route mode. There is an inter-VDOM link between both VDOMs. A client workstation with the IP address 10.0.1.10/24 is connected to port2. A web server with the IP address 10.200.1.2/24 is connected to port1.What is required in the FortiGate configuration to route and allow connections from the client workstation to the web server? (Choose two.)
Which component of FortiOS performs application control inspection?
A FortiGate interface is configured with the following commands:What statements about the configuration are correct? (Choose two.)