Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

FCP_FWB_AD-7.4 Exam Dumps - FCP - FortiWeb 7.4 Administrator

Go to page:
Question # 4

Which high availability mode is commonly used to integrate with a traffic distributer like FortiADC?

A.

Cold standby

B.

Load sharing

C.

Active-Active

D.

Active-Passive

Full Access
Question # 5

Which two functions does the first layer of the FortiWeb anomaly machine learning (ML) analysis mechanism perform? (Choose two.)

A.

Determines whether an anomaly is a real attack or just a harmless anomaly that should be ignored

B.

Determines a probability model behind every parameter and HTTP method passing through FortiWeb

C.

Determines whether traffic is an anomaly, based on observable features overtime

D.

Determines if a detected threat is a false-positive or not

Full Access
Question # 6

Which two objects are required to configure a server policy in reverse proxy mode without content routing? (Choose two.)

A.

Site publishing

B.

Protected hostname

C.

Virtual server

D.

Server pool

Full Access
Question # 7

Which is an example of a cross-site scripting (XSS) attack?

A.

SELECT username FROM accounts WHERE username='admin';-- ' AND password='password';

B.

C.

SELECT username FROM accounts WHERE username='XSS' ' AND password='alert("http://badurl.com")';

D.

Full Access
Question # 8

Which three stages are part of creating a machine learning (ML) bot detection algorithm? (Choose three.)

A.

Model building

B.

Model running

C.

Model verification

D.

Sample collecting

E.

Model Bayesian analysis

Full Access
Go to page: