Practice Free FCP_FWB_AD-7.4 Exam Online Questions
Which of the following FortiWeb features is part of the mitigation tools against OWASP A4 threats?
- A . Sensitive info masking
- B . Session Management
- C . Poison Cookie detection
- D . Brute Force blocking
During FortiWeb deployment, which feature can be used to protect against Distributed Denial of Service (DDoS) attacks?
- A . Server pools
- B . Intrusion Prevention System (IPS)
- C . Load balancing
- D . Rate limiting
What is a drawback of TLS 1.3?
- A . It requires powerful hardware for processing.
- B . It can break transparent inspection.
- C . It can have a slower connection initiation.
- D . It has a worse encryption algorithm.
In FortiWeb, which component is responsible for handling incoming traffic and applying security policies?
- A . FortiGate
- B . Server pool
- C . Web Application Firewall (WAF)
- D . FortiManager
In order for FortiWeb to provide the best possible protection for servers, how should you deploy it?
- A . In-line, without FortiGate, deployed in true transparent mode.
- B . In-line, in front of FortiGate, deployed in offline protection mode.
- C . In a one-arm topology, deployed in transparent mode.
- D . In-line, behind FortiGate, deployed in reverse proxy mode.
When FortiWeb triggers a redirect action, which two HTTP codes does it send to the client to inform the browser of the new URL? (Choose two.)
- A . 404
- B . 301
- C . 403
- D . 302
Which administrative access method must be enabled on a FortiGate interface to allow APs to connect and function?
- A . Security Fabric
- B . SSH
- C . HTTPS
- D . Forti Telemetry
What must you do with your FortiWeb logs to ensure PCI DSS compliance?
- A . Compress them into a .zip file format
- B . Enable masking of sensitive data
- C . Store in an off-site location
- D . Erase them every two weeks
Which algorithm is used to build mathematical models for bot detection?
- A . HCM
- B . SVN
- C . SVM
- D . HMM
What is an advantage of utilizing machine learning for web application security compared to rule-based approaches?
- A . Adaptability to evolving attack patterns
- B . Faster response time to threats
- C . Simplicity in configuration and management
- D . Lower computational resource utilization