[2022年02月] 合格させるNSE6_FWB-6.1試験一発合格、最新のNSE6_FWB-6.1 の提供する試験問題 [Q10-Q27]

Share

[2022年02月] 合格させるNSE6_FWB-6.1試験一発合格、最新のNSE6_FWB-6.1 JPNTestの提供する試験問題

NSE 6 Network Security Specialist問題集でNSE6_FWB-6.1試験の完全版解答試験学習ガイド

質問 10
True transparent proxy mode is best suited for use in which type of environment?

  • A. Environments where you cannot change the IP addressing scheme
  • B. New networks where infrastructure is not yet defined
  • C. Small office to home office environments
  • D. Flexible environments where you can easily change the IP addressing scheme

正解: A

解説:
Does not require changes to the IP address scheme of the network. Requests are destined for a web server and not the FortiWeb appliance. This operation mode supports the same feature set as True Transparent Proxy mode.

 

質問 11
What can an administrator do if a client has been incorrectly period blocked?

  • A. Force a new IP address to the client.
  • B. Disconnect the client from the network.
  • C. Nothing, it is not possible to override a period block.
  • D. Manually release the ID address from the temporary blacklist.

正解: D

解説:
Block Period
Enter the number of seconds that you want to block the requests. The valid range is 1-3,600 seconds. The default value is 60 seconds.
This option only takes effect when you choose Period Block in Action.
Note: That's a temporary blacklist so you can manually release them from the blacklist.

 

質問 12
What role does FortiWeb play in ensuring PCI DSS compliance?

  • A. It provides the WAF required by PCI.
  • B. It provides the ability to securely process cash transactions.
  • C. It provides credit card processing capabilities.
  • D. It provides the required SQL server protection.

正解: C

解説:
FortiWeb protects against attacks that lead to sensitive data exposure such as SQL Injection and other injection types. Additionally, FortiWeb inspects all web server outgoing traffic for sensitive data such as Social Security numbers, credit card numbers and other predefined or custom based sensitive data.

 

質問 13
Which two statements about running a vulnerability scan are true? (Choose two.)

  • A. You should run the vulnerability scan on a live website to get accurate results.
  • B. Vulnerability scanning increases the load on FortiWeb, so it should be avoided.
  • C. You should run the vulnerability scan in a test environment.
  • D. You should run the vulnerability scan during a maintenance window.

正解: C,D

解説:
Should the Vulnerability Scanner allow it, SVMS will set the scan schedule (or schedules) to run in a maintenance window. SVMS will advise Client of the scanner's ability to complete the scan(s) within the maintenance window.
Vulnerabilities on live web sites. Instead, duplicate the web site and its database in a test environment.
Reference:
https://help.fortinet.com/fweb/552/Content/FortiWeb/fortiweb-admin/vulnerability_scans.htm

 

質問 14
You are using HTTP content routing on FortiWeb. You want requests for web application A to be forwarded to a cluster of web servers, which all host the same web application. You want requests for web application B to be forwarded to a different, single web server.
Which statement about this solution is true?

  • A. You must put the single web server in to a server pool, in order to use it with HTTP content routing.
  • B. Static or policy-based routes are not required.
  • C. You must chain policies so that requests for web application A go to the virtual server for policy A, and requests for web application B go to the virtual server for policy B.
  • D. The server policy applies the same protection profile to all of its protected web applications.

正解: B

 

質問 15
Review the following configuration:

What is the expected result of this configuration setting?

  • A. When machine learning (ML) is in its running phase, FortiWeb will accept an unlimited number of samples from the same source IP address.
  • B. When machine learning (ML) is in its collecting phase, FortiWeb will not accept any samples from any source IP addresses.
  • C. When machine learning (ML) is in its running phase, FortiWeb will accept a set number of samples from the same source IP address.
  • D. When machine learning (ML) is in its collecting phase, FortiWeb will accept an unlimited number of samples from the same source IP address.

正解: D

 

質問 16
What key factor must be considered when setting brute force rate limiting and blocking?

  • A. Multiple clients from geographically diverse locations
  • B. A single client contacting multiple resources
  • C. Multiple clients connecting to multiple resources
  • D. Multiple clients sharing a single Internet connection

正解: C

 

質問 17
Which two statements about the anti-defacement feature on FortiWeb are true? (Choose two.)

  • A. Anti-defacement can redirect users to a backup web server, if it detects a change.
  • B. Anti-defacement downloads a copy of your website to RAM, in order to restore a clean image, if it detects defacement.
  • C. Anti-defacement does not make a backup copy of your databases.
  • D. FortiWeb will only check to see if there are changes on the web server; it will not download the whole file each time.

正解: C,D

解説:
Anti-defacement backs up web pages only, not databases.
If it detects any file changes, the FortiWeb appliance will download a new backup revision.

 

質問 18
Refer to the exhibit.

Based on the configuration, what would happen if this FortiWeb were to lose power? (Choose two.)

  • A. Traffic that passes between port5 and port6 will be inspected.
  • B. Traffic will pass between port5 and port6 uninspected.
  • C. All traffic will be interrupted.
  • D. Traffic will be interrupted between port3 and port4.

正解: B,D

 

質問 19
Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)

  • A. No Special configuration is required; connectivity will be re-established after the set timeout.
  • B. Place FortiWeb in front of FortiADC.
  • C. Enable the Use X-Forwarded-For setting on FortiWeb.
  • D. Enable the Add X-Forwarded-For setting on FortiWeb.

正解: C,D

解説:
Configure your load balancer to insert or append to an X-Forwarded-For:, X-Real-IP:, or other HTTP X-header. Also configure FortiWeb to find the original attacker's or client's IP address in that HTTP header

 

質問 20
In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)

  • A. Transparent inspection
  • B. Offline protection
  • C. Reverse proxy
  • D. True transparent proxy

正解: B,D

解説:
FortiWeb appliances operating in offline protection mode or either of the transparent modes

 

質問 21
Which algorithm is used to build mathematical models for bot detection?

  • A. HCM
  • B. HMM
  • C. SVN
  • D. SVM

正解: D

解説:
FortiWeb uses SVM (Support Vector Machine) algorithm to build up the bot detection model

 

質問 22
......

正真正銘のベスト材料はNSE6_FWB-6.1オンライン練習試験:https://www.jpntest.com/shiken/NSE6_FWB-6.1-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡