FortiWeb Interview Questions and Answers [FREQUENTLY ASK]
FortiWeb-Interview-Questions-and-Answers-ACTE

FortiWeb Interview Questions and Answers [FREQUENTLY ASK]

Last updated on 18th Nov 2021, Blog, Interview Questions

About author

Muhila (Firewall Checkpoint & Fortigate )

Muhila is a Firewall Checkpoint & Fortigate developer with 7+ years of strong experience in using emerging technologies, such as machine learning (ML) and neuro-linguistic programming (NLP) and experience in C# and VB.NET to edit recordings or create custom tests.

(5.0) | 19589 Ratings 2729

If you are preparing for FortiWeb Interview, then you are at the right place. Today, we will cover some mostly asked FortiWeb Interview Questions, which will boost your confidence. FortiWeb is a web application firewall (WAF) that protects web applications and APIs from attacks that target known and unknown exploits and helps maintain compliance with regulations. Therefore, FortiWeb professionals need to encounter interview questions on FortiWeb for different enterprise FortiWeb job roles. The following discussion offers an overview of different categories of interview questions related to FortiWeb to help aspiring enterprise FortiWeb Professionals.


    Subscribe For Free Demo

    1. What is FortiWeb?

    Ans:

      FortiWeb is a Firewall service powered by the web application (WAF) which provides safety to any applications hosted on the web from threats that target these web servers. Using multi-layered and correlated detection techniques; FortiWeb secures applications from known vulnerabilities. FortiWeb hardware and virtual machine platforms are available for small & medium scale, large enterprises, as well as service providers.

    2. How FortiWeb protects the server from threats?

    Ans:

      FortiWeb’s HTTP firewall and denial-of-service (DoS) attack prevention technologies secure our web applications from attack. It uses complex methodologies to offer bidirectional security against complicated risks similar to SQL injection, across the site scripting (XSS) attacks; FortiWeb also defends against threats like identity theft, financial fraud, and corporate espionage. FortiWeb offers the tools needed to monitor and enforce regulations, industry best practices, and internal security policies, including firewalling and patching requirements.

    3.Where FortiWeb fits in the Architecture layout?

    Ans:

      FortiWeb is deployed as a one-arm to fit pology but is more commonly positioned in line to intercept all incoming client connections and redistribute them to servers. FortiWeb has TCP and HTTP-specific firewalling capabilities. Since FortiWeb is not designed to provide security to non HTTP/HTTPS web applications, it can be deployed behind a firewall such as FortiGate that focuses on safety for other protocols, including FTP and SSH. Once FortiWeb is used, it can configure from a web browser or terminal emulator on the central computer.

    4. What is HPKP in FortiWeb?

    Ans:

      Enabling HTTP Public Key Pinning (HPKP), FortiWeb inserts a header into the server’s response header field when handling client requests. The inserted header specifies an exclusive cryptographic public key, with which the client accesses the server. Specifying a public key for accessing the web server lessens the chances of the MITM risks with fake certificates and compromised CAs.

    5. What is OCSP Stapling?

    Ans:

      FortiWeb supports OCSP (Online Certificate Status Protocol) stapling, an alternative method to OCSP in which the certificate holder occasionally requests the revocation status of certificates of servers from OCSP servers and attaches the time-stamped response to the initial SSL/TLS handshake between clients and servers. This relocates the resource load of checking the revocation status of certificates from the client to the presenter of the certificate and reduces the total number of queries to OCSP servers.

    6. Does FortiWeb protect against Credential Stuffing?

    Ans:

      FortiWeb now protects against credential stuffing attacks. Enabling Credential Stuffing Defense, username, and password credentials in a web server login attempt are processed in the database to verify whether it is a spilled username/password pair or not. Using this feature requires FortiGuard.

    7. What is Active-Active High Availability?

    Ans:

      Up to eight FortiWebs can be deployed as an Active-Active HA cluster in Reverse Proxy or True Transparent Proxy modes. The master unit in the cluster distributes all incoming traffic to other cluster members, including itself according to the specified load-balancing algorithm: packet source IP, least number of processing connections, or round-robin.

    8. What are the HTTP Protocol Constraints?

    Ans:

      Seventeen new HTTP protocol constraints have been added in the updated versions of FortiWeb. Eight of them are added to govern the specific HTTP/2 header fields, they are:

    • Illegal Connection Preface
    • Illegal Frame Type
    • Illegal Frame Flags
    • Initial Window Size
    • Header Compression Table Size
    • Header List Size
    • Frame Size
    • Number of Concurrent Streams
    • The others are as following:
    • Redundant HTTP Headers
    • Maximum URL Parameter Name Length
    • Maximum URL Parameter Value Length
    • Illegal Character in Parameter Name
    • Unlawful Character in Parameter Value
    • NULL Character in URL
    • Unlawful Character in URL
    • Malformed URL
    • illicit Size Chunk
    • Additionally, in the Web UI page of HTTP Protocol Constraints, a new table column named HTTP Protocol Support has been introduced to indicate the HTTP version that a constraint can be applied to.

    9. What are the HTTP Constraint Exceptions?

    Ans:

      Constraint exceptions are, added correspondingly for the five new HTTP constraints:

    • Redundant HTTP Headers
    • Maximum URL Parameter Name Length
    • Maximum URL Parameter Value Length
    • Illegal Character in Parameter Name
    • Unlawful Character in Parameter Value
    • HTTP constraint exceptions can be applied to the packets with specific source IP addresses.

    10. What is FortiWeb archuitecture?

    Ans:

    FortiWeb archuitecture
    FortiWeb archuitecture

    11. What is Site Publishing?

    Ans:

      Site publishing allows Android clients to access Microsoft Exchange servers through Exchange ActiveSync. While a site-publishing rule is, configured for Exchange ActiveSync, single sign-on, authentication cookie & Kerberos authentication are not available, HTTP Basic Authentication is the only method to authenticate the clients.

    12. What is GEO IP?

    Ans:

      Geo IP database is a dedicated database, added to enhance FortiWeb’s GEO IP for identifying exact locations of IPv6 addresses. It is no longer required to periodically upload the GEO IP database. FortiWeb automatically updates the database from the FortiGuard Distribution Servers. The interface of manually uploading of the database is, kept for those deployments that do not have an Internet connection.

    13. What is cookie poisoning?

    Ans:

      The cookie poisoning settings are now a part of the new cookie security policy, which allows administrators to configure additional methods to prevent cookie-based attacks. For example, we can encrypt the cookies issued by a backend server or add security attributes to them.

    14. What is user tracking?

    Ans:

      The new user-tracking feature allows us to track sessions by a user, capture a username to reference in traffic, and attack log messages. We can use this feature to prevent a session fixation attack and set a time period during which FortiWeb blocks requests with a session ID from a timed-out session.

    15. What is the difference between True transparent proxy mode and transparent inspection mode?

    Ans:

      True transparent
      Transparent inspection
      True transparent – Transparent proxies in the traffic reaching on any network port belonging to a Layer 2 bridge, relates to the first appropriate policy, and allows the traffic to pass. FortiWeb logs obstruct, or even modify the violations as per the policy for its safety profile. This mode permits user authentication through HTTP instead of HTTPS.Transparent inspection – Any FortiWeb device asynchronously monitors the traffic reaching its network port, which belongs to the Second Layer Bridge, and applies the device’s first policy, & allows the safe passage of the traffic. FortiWeb obstructs the traffic relating to the matching policy and safety profile, but never modifies it.

    16. What are Advanced SSL settings for server pool members?

    Ans:

      When the operation mode is in reverse proxy, we can select the versions of SSL and TLS and which cipher suites are supported for connections between FortiWeb and an individual server pool member. For true transparent proxy and WCCP modes, these apply to connections between FortiWeb and the server pool member as well as SSL/TLS offloading.

    17. What is threat scoring?

    Ans:

      The threat-scoring feature allows us to configure the policies of signature in any organization to take punitive measures based on various signature violations on any client, instead of a single signature violation. When any client violates a signature in the threat-scoring category, it contributes to a combined threat score. When the combined threat score exceeds the maximum value that is specified, FortiWeb takes action. We can specify the combined threat scores; the calculation is based, on HTTP transactions or sessions, or TCP sessions.

    18. What are the Status and Policy Status dashboards?

    Ans:

      The System Resources widget on the dashboard displays the count of current connections and connections per second for all the policies. Policy Sessions widget and Policy Status dashboard display the count of current connections and connections per second by policy On the Status dashboard, graphs in the Real-Time Monitor widget display total counts for HTTP throughput, attack events, and HTTP hits, in addition to counts for individual policies.

    19. What is a Period block?

    Ans:

      When the operation mode is transparent in the inspection or offline protection and Period Block is the action, FortiWeb takes action against traffic that violates a policy. FortiWeb attempts to block a client that has violated the policy for the length of time, specified by the Block Period.

    20. What is network topology?

    Ans:

    network topology
    network topology

    21. What is DoS?

    Ans:

      Service Denial (DoS) attack or distributed denial-of-service attack (DDoS attack) is an attempt to overpower a web server, making the resources unavailable to its intended users. DoS assaults involve opening a vast number of sessions at various OSI layers and keeping them open as long as possible to overpower the server by consuming its available sockets. Most DoS attacks use automated tools instead of any browsers to create the harmful and enormous number of requests sent to a web server.

    22. What is Botnet?

    Ans:

      A botnet is a threat that utilizes zombies, which were previously infected, distributed globally, to overpower the server directed by the command on control servers. Examples are LOIC, HOIC, and Zeus

    23. What is the reverse proxy mode?

    Ans:

      When the FortiWeb operates a Reverse Proxy manner, it offers start-to-end HTTP/2 security that needs both the clients & HTTP/2 servers running at the back-end. Moreover, when the web servers at the back end do not support HTTP/2, FortiWeb offers the HTTP/2 defense with data change protocols between the HTTP/2 clients & the HTTP/1.1 servers at the back-end. This permits the user to enjoy HTTP/2 benefits without having to upgrade their back web servers.

    24. How does HA choose the active appliance?

    Ans:

      An HA pair might not resume their active and standby roles when the failed appliance resumes responsiveness to the heartbeat. Since the currently active device will be having a greater uploading time than a failed & active device, which has come online, assumes each has the matching number of the available ports, the device which is currently active usually holds its standing as the active device, unless it has been enabled to override. If it is enabled, and the appliance setting of the returning device that is higher, will be selected as the currently active device in the cluster.

    25. What is the Topology for offline protection mode?

    Ans:

      “Out-of-band” is a suitable description for this model. Minimal changes are required, as it does not introduce any latency. FortiWeb monitors traffic received on the data capture port’s network interface and applies the first policy. Because it is not in line with the destination, it does not allow the permitted traffic. FortiWeb logs in and blocks violations according to the matching policy and its protection profile. If FortiWeb detects a malicious request, it sends a TCP RST packet through the blocking port to the web server and client in an attempt to terminate the connection. It does not modify traffic.

    26. Can we delete the admin account?

    Ans:

      Admin is the default administrator account and has no password initially. The admin administrator account exists by default and cannot be deleted. The admin administrator account is similar to any root administrator account. This administrator account always has all the permission to see and modify the options for configuration in FortiWeb devices, including the viewing and modifying of all other admin accounts. Usernames and permissions are not possible to be modified.

    27. What is the Active – passive style?

    Ans:

      FortiWeb is known for active-passive style, i.e., if one device is designated as the active device, where the policies are being applied for all the connections, the second one becomes the passive standby, which initiates the role of an active device and starts processing the assigned tasks only if the active device fails. Both active and standby devices sense breakdown by communicating by the heartbeat link, which connects the two devices in HA pair. Failures are detected when active devices stop responding to a heartbeat from standby devices for a specific time, configured as Heartbeat timeout = Interval in Detection x Threshold in Heartbeat Loss

    28. Can we replicate the external HA configuration without any FortiWeb HA?

    Ans:

      Configuration synchronization offers the ability to replicate the FortiWeb’s configuration from another device without requiring high availability (HA). The arrangement is a unilateral push and not a bilateral arrangement. It adds missing items, overwrites objects whose names match but never removes unique objects on FortiWeb, nor pulls the items from the target to initiate the FortiWeb device.

    29. How to adapt auto-learning to dynamic URLs & unusual parameters?

    Ans:

      Protection settings can be configured with the assistance of auto-learning. Auto-learning teaches plenty of the threats web assets face. It also helps to understand the web applications’ structures and how end-users use them. Most importantly, though, auto-learning helps tailor FortiWeb’s configuration to suit web applications. Auto-learning detects the URLs with the other behaviors of HTTPS or HTTP sessions by observing the traffic passing to the servers. To learn whether the request is legitimate or a potential attack attempt, it performs the following tasks:

    • Evaluate the request to attack signatures
    • Monitors inputs such as cookies and URL parameters
    • Tracks web servers’ response to each request, such as 401 Unauthorized or 500 Internal Server Error
    • Captures the rate of requests for files by IP address and content type
    • By learning from traffic, the FortiWeb appliance suggests appropriate configurations and quickly generates profiles explicitly designed for unique traffic.

    30. What is a private net cloud platform?

    Ans:

    private net cloud platform
    private net cloud platform

    31. How to Configure URL interpreters?

    Ans:

      While using auto-learning, we must define how to intercept the dynamic URLs that include multiple factors in non-standardized ways, like separators (; or #, ) or the factor which is embedded within the URL’s structure. In any web User Interface, these interceptors plug-ins are better known “URL replacers.”

    32. How does FortiWeb recognize data types?

    Ans:

      FortiWeb recognizes the data types of parameters by matching them with regular expressions. Regular expressions are categorized as: Predefined — Regular expressions set included within the firmware. These match common data types and cannot be modified except via FortiGuard, but can be copied and used as the basis for a custom data type. It can be used by both auto-learning profiles and input rules. Custom — Regular expression, that has been configured to detect any data patterns which cannot be recognized by the predefined set. It can be modified and used by input rules, but cannot be used by auto-learning profiles.

    Course Curriculum

    Develop Your Skills with Fortiweb Certification Training

    Weekday / Weekend BatchesSee Batch Details

    33. What are Predefined data types?

    Ans:

      After installation, FortiWeb already has some data type regular expressions that are predefined like default signatures for common data types so that we do not need to write them again. Initial ones are included within the FortiWeb firmware. If FortiWeb is connected to FortiGuard Security Service updates, it can regularly download updates to its predefined data types. This provides new and enhanced data types without any effort. Only we should use the unique signatures in parts of the configuration where they are used according to the organization.

    34. What is your opinion of Fortinet’s FortiGate Firewall?

    Ans:

      The rising tendency towards all-in-one products sounds like a good marketing idea, but when it comes to performance, there is a big gap. It is believed that when it comes to security there should be no negotiation and concession. With all in one box, perfectly synchronized with each other working synergistically, the product is bound to be appreciated. FortiOS released by Fortinet with its range of appliances offers good routing and encryption features by enhancing support for RIP I & II and OSPF.

    35. What is UTM?

    Ans:

      Unified threat management (UTM) is a move toward security management that allows a network administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console. UTM appliances not only combine firewall, gateway anti-virus, and intrusion detection and prevention capabilities into a single platform but also works within themselves interdependently just like a piece of fabric.

    36.What is Security fabric?

    Ans:

      Security Fabric uses FortiTelemetry to connect different security sensors and tools together to collect, coordinate, and respond to malicious behavior anywhere it occurs on the network in real-time. The core of a security fabric is an upstream FortiGate located at the edge of the network, with several FortiGates functioning as Internet Segmentation Firewalls (ISFWs). A security fabric is used to coordinate with the behavior of other Fortinet products in the network, including FortiAnalyzer, FortiManager, FortiClient, FortiClient EMS, FortiWeb, FortiSwitch, and FortiAP.

    37. What is Threat Management?

    Ans:

      Integrated threat management is a complete approach to network security issues that address multiple types of malware, as well as blended threats and spam, and protects from invasion not only at the gateway but also at the endpoint levels.

    38. What is a Next-Generation Firewall?

    Ans:

      Next-Generation Firewall (NGFW) is part of the third generation in firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using an in-line deep packet inspection system (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic examination, website filtering, QoS/bandwidth management, antivirus scrutiny, and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory)

    39. What is the difference between a Next-Generation Firewall vs. Traditional Firewall?

    Ans:

      NGFWs includes typical functions of traditional firewalls such as packet filtering, network and port address translation (NAT), stateful monitoring, with virtual private network (VPN) support. The aim of next-generation firewalls is to include more layers of the OSI model, improving the filtering of network traffic that is dependent on the packet contents. NGFWs perform deeper inspections compared to stateful inspections executed by the first and second-generation firewalls. NGFWs use a more thorough inspection approach, checking packet payloads and matching the signatures for harmful activities such as exploitable attacks and malware.

    40. What is Fortinet FortiWeb architecture?

    Ans:

    Fortinet FortiWeb architecture
    Fortinet FortiWeb architecture

    41. Do you know about Fortinet as an Organization?

    Ans:

      Fortinet is an American MNC with its headquarters in Sunnyvale, California. It develops and markets cybersecurity software, appliances, and services, such as firewalls, anti-virus, intrusion prevention, and endpoint security, among others. It is the fourth-largest network security company by revenue.

    42. Tell us something about Fortinet’s history

    Ans:

      Ken and Michael Xie, each other’s siblings, founded Fortinet in 2000. Fortinet raised about $93 million in funding by 2004 and introduced ten FortiGate appliances. That same year was the beginning of a recurring patent dispute between Fortinet and Trend Micro. The company went public in 2009, raising $156 million through an initial public offering. Throughout the 2000s, Fortinet expanded its product lines, by adding products for wireless access points, sandboxing, and messaging security, among others.

    43.When inspecting and delivering email messages, what does a FortiMail unit do in a transparent mode?

    Ans:

      First, inspect viruses, then Inspect the content of the message payload, then Inspect for spam, followed by performing a routing lookup to decide the next hop in MTA.

    44. What type of firewall is FortiGate?

    Ans:

      Fortinet FortiGate Firewalls are Secure SD-WAN-ready security platforms designed to protect home offices, SMBs, mid-sized, distributed enterprises, and branches.

    45. What are the benefits of the Scalable feature in Fortinet Fabric?

    Ans:

      Fortinet Security Fabric protects any organization from IoT to the Cloud. A complete security strategy needs both in-depth performances and deep inspection along with the breadth i.e. end to end. Security not only needs to scale to meet volume and performance demands, but it also needs to scale itself up laterally, seamlessly tracking and securing data from IoT and endpoints, across the distributed network and data center, and into the cloud. Fortinet Security Fabric provides seamless protection across the distributed enterprise, as well as inspection of packet data, application protocols, and deep analysis of unstructured content at wire speeds.

    46. What does Aware mean in Fortinet Security fabric?

    Ans:

      Security Fabric behaves as a single entity from a Policy and Logging perspective, enabling end-to-end segmentation in order to lessen the risk from advanced threats. We not only need to see data that flows into and out of the network but how that data passes through the network once it is inside the perimeter. Fortinet Security Fabric enables end-to-end network segmentation for deep visibility and inspection of traffic traveling the network, and controls who and what gets to go where thereby minimizing the risk from advanced threats.

    47. What is the method FortiGate unit uses to determine the availability of a web cache using wccp? (web cache communication protocol)

    Ans:

      The web cache sends an “I see you” message, being fetched by the FortiGate unit.

    48. WAN optimization is configured in active or passive mode, when will the remote peer accept an attempt to initiate a tunnel?

    Ans:

      The attempt will be accepted when there is a matching WAN optimization passive rule.

    49. How does FortiMail Administrator Retrieve Email Account Information from an LDAP server instead of configuring this data manually on the unit?

    Ans:

      The Configure of the LDAP profile sections “User query options” and “Authentication” then associates the profile to the domain, which is locally configured.

    50. What is administration guide?

    Ans:

    Administration guide
    Administration guide

    51. When using a sender reputation on a FortiMail unit, which actions can be taken against a source IP address generating spam or invalid E-mail messages?

    Ans:

    • FortiMail Delays the email messages from that source IP address with a temporary failure.
    • FortiMail Rejects the email messages from that source IP address with a permanent failure.
    • FortiMail Quarantines all the email messages from that source IP address

    52. What does the security feature of Fortinet Security Fabric benefit us?

    Ans:

      Global and local risk intelligence and lessening information can be shared across individual products to decrease time to protect. Not only does security need to include powerful security tools for the various places and functions in the network, but true visibility and control need these distinct elements to work together as an integrated security system.

      Fortinet’s Security Fabric behaves as a single collaborative entity from a policy and logging perspective, allowing individual product elements to share global and local risk intelligence and risk mitigation information.

    53. What do we mean by Actionable in Fortinet Security Fabric?

    Ans:

      Big Data cloud systems correlate risk information and network data to deliver into Actionable Threat Intelligence in real-time. It is not enough to sense bad traffic or block malware using distinct security devices. Network administrators need a common set of risk intelligence and centralized orchestration that allows the security to dynamically adapt as a risk is revealed anywhere, not just in our network, but also anywhere in the world. Fortinet’s Big Data cloud systems centralize and correlate risk information and network data and provide actionable threat intelligence to each and every single security device in the network’s security fabric in real-time.

    54.What do we understand about Open APIs in Fortinet Security Fabric?

    Ans:

      Well-defined, open APIs allow leading technology partners to become part of the fabric. Of course, a true security fabric lets us maximize our existing investment in security technologies. That is why Fortinet has developed a series of well-defined, open APIs that allow technology partners to become a part of the Fortinet Security Fabric. Combined, the Fortinet Security Fabric is able to quickly adapt to the evolving network architecture as well as changing the threat landscape.

    55. Why is the idea of a security fabric so important to network security in this current environment?

    Ans:

      In this futuristic era, companies have to deal with a growing list of issues that put incredible strain on their security capabilities, including the Internet of Things, virtualization, SDN, a growing portfolio of interactive applications, and transitioning to cloud-based networking. They also have professionals who expect to be able to access work applications and data from anywhere, at any time, and on the same device, they use to manage their professional lives. Networks have evolved to accommodate these new requirements, becoming more complex, flexible, and powerful. At the same time, securing them has become a lot more complex as well.

    56. What distinguishes Fortinet’s security fabric approach from other vendors’ attempts at an integrated platform?

    Ans:

      Fortinet distinguishes itself from other vendors with intentionally designed integration beginning with a unified operating system, highly optimized hardware and software processing with unmatched zero-day discovery, and a detection approach that combines behavioral detection, machine learning, and hardware virtualization.

      This allows the Fortinet Security Fabric to go beyond what is possible with a traditional signature-based approach to risk protection, or with siloed security technologies that vendors have begun to stitch together using an overlay “platform” method.

    57. How does Fortinet’s Security Fabric benefit Fortinet’s global partner network of distributors and solution providers?

    Ans:

      Because of its significant and complex character, security continues to be one of the largest opportunities for the channel. Partners that can plan, design, deploy and optimize an integrated security system are finding a growing demand for their skills. By combining the traditional security devices and emerging technologies together into an integrated security fabric, associates can help their customers collect and respond to intelligence that is more actionable, synchronize risk responses, and centralize the creation, distribution, and orchestration of their security management and further investigation. This wide visibility and open-standards approach offered by the Fortinet Security Fabric allows the solution providers to implement more automation to focus on the alerts, which matters the most in today’s world.

    58. How is Fortinet’s Fabric-Ready Partner program different from the partner programs we see other vendors promoting?

    Ans:

      Like many other partner programs, Fortinet’s Fabric-Ready Partner Program brings together best-in-class technology alliance partners. Unlike other approaches, Fortinet’s approach actually allows the partners to deliver pre-integrated, end-to-end security offerings ready for deployment in any organization.

    59. An e-mail message, received by the FortiMail unit is subject to the bounce verification, Anti Spam check, under which circumstances?

    Ans:

      The envelope MAIL FROM field contains a null reverse-path when a Bounce Verification key is created and activated.

    60. What is Fortinet FortiWeb 1000D architecture?

    Ans:

    Fortinet FortiWeb 1000D architecture
    Fortinet FortiWeb 1000D architecture

    61. Network Administrator of a FortiMail Unit operating in server mode has been given the requirement to configure disk quotas for all the users of a specific domain. How can the administrator achieve this requirement?

    Ans:

      The network administrator needs to define a disk quota value in a resource profile.

    62. Which operational mode allows the FortiMail unit to operate as a full-featured email server rather than just a mail relay agent?

    Ans:

      In Server Mode, FortiMail, operate as a full-featured email server rather than just a mail relay agent

    Course Curriculum

    Get JOB Oriented Fortiweb Training for Beginners By MNC Experts

    • Instructor-led Sessions
    • Real-life Case Studies
    • Assignments
    Explore Curriculum

    63. What is the one reason for deploying a FortiMail unit in transparent mode?

    Ans:

      If the network administrator deploys the FortiMail unit in transparent mode then DNS records do not necessarily have to be modified

    64.Which SMTP Sessions is defined as incoming?

    Ans:

      SMTP sessions for the protected domain are defined as incoming.

    65. Which back-end servers can be used to provide recipient verification?

    Ans:

      LDAP servers, and SMTP servers.

    66. A System Administrator Is Concerned By The Amount Of Disk Space Being Used To Store Quarantine Email Messages For Non-existent Accounts. Which Techniques Can Be Used On A FortiMail Unit To Prevent Email Messages From Being Quarantined For Non-existent Accounts?

    Ans:

      Recipient Address Verification should be adopted to prevent E-mail messages from being quarantined for non-existent accounts

    67. In The Local Storage Structure Of The Fortimail Unit, What Does The Flash Memory Contain?

    Ans:

      The contents of flash memory in a local structure of the Fortimail unit are– Firmware images with certificates and system configuration

    68. Give me any three differences between traditional and next-generation firewalls?

    Ans:

      Traditional
      Next generation
      It works only from layer 2 to layer 4.It works on layer 2 to layer 7
      Application-level awareness is not supported in the traditional firewall.Application-level awareness is supported in the traditional firewall.
      Traditional firewalls do not support reputation and identity services.Next-generation firewall support reputation and identity services.

    69. Tell me who started Fortinet and when?

    Ans:

      Ken Xie and Micheal Xie are brothers who founded Fortinet in 2000. Fortinet is an American multinational company that develops cybersecurity solutions.

    70. How installation and deployment guide?

    Ans:

    Installation and deployment guide
    Installation and deployment guide

    71. Tell me something about Fortinet’s FortiGate?

    Ans:

      FortiGate was the first and primary product of Fortinet. It is a physical firewall that provides protection against automated visibility and malware to eliminate attacks. FortiGate includes web filtering, automated threat protection, Secure Socket Layer(SSL) inspection, and IPS(Intrusion Prevention System). It also contains Artificial intelligence to detect threats proactively.

    72. Is Fortinet FortiGate a good firewall?

    Ans:

      Whenever someone wants to buy a firewall, he checks whether the firewall provides good security or not. He will also check if the firewall is at a reasonable price or not, as the Fortinet FortiGate firewall offers robust security and comes at an affordable price(starting from 37,987).

    73. Tell something about a traditional firewall?

    Ans:

      A traditional firewall is a network security device that statefully examines the network traffic entering and exiting points within the network based on state, port, and protocol. Traditional firewalls can only track traffic on 2-4 layers; this makes traditional firewalls less effective to provide the protection needed to handle all the advanced cyber threats happening in this digital era.

    74. What do you know about a next-generation firewall?

    Ans:

      A next-generation firewall is not only a network security device that statefully examines the network traffic entering and exiting point within the network based on state, port, and protocol. It also includes many additional features like:

    • Integrated intrusion prevention
    • Application control and awareness
    • Sandbox integration
    • Web filtering
    • Antispam, Antivirus, Anti-malware
    • Advanced threat protection
    • Deep Packet Inception
    • All these features make the next-generation firewall much better when compared to the traditional firewall.

    75. What do you know about Fortinet security fabric?

    Ans:

      Fortinet Security Fabric controls the entire digital attack surface of an organization to reduce the risk. It also provides broad visibility to address many security challenges and eliminates the complexity of supporting multiple point products.

    76.List a few security challenges that Fortinet Security Fabric addresses?

    Ans:

      Fortinet Security Fabric addresses the below security challenges:

    • Expanding attack surface
    • Advanced threat landscape
    • Grater ecosystem complexity
    • Increasing regulatory demands

    77. Why do we have to use Fortinet UTM?

    Ans:

      Many firewalls and router-based hardware are lacking to provide the ability to see the applications that are crossing the network and making decisions based on this data. But Fortinet UTM provides the availability to see the applications that are traversing the network. Due to this information, the administrator can make decisions on whether to deny or allow the traffic.

    78. What is integrated threat management?

    Ans:

      Integrated threat management is a security approach that consolidates various security components within one application or platform for an IT enterprise architecture.

      ITM emerged as a response to increasingly complicated and persistent malicious attacks by hackers and others intent upon damaging systems.

    79. What are the various encryption mechanisms available in Fortigate Firewall?

    Ans:

      Two different encryption mechanisms are available in the Fortigate firewall they are:

      Advanced Encryption Standard

      Data Encryption Standard

    80. What is FortiWeb VirtualEnvironment?

    Ans:

    FortiWeb VirtualEnvironment
    FortiWeb VirtualEnvironment

    81. What do you know about FortiCloud?

    Ans:

      FortiCloud is a platform of Fortinet that delivers security and management services. With FortiCloud, customers can easily connect, protect and deliver their applications and data on-premise and within the cloud.

    82. List the benefits of FortiCloud?

    Ans:

      Three primary benefits of using FortiCloud are:

    • FortiCloud saves us time and resources
    • Offers clear visibility
    • Extended Fabric security

    83. What is FortiOS?

    Ans:

      FortiOS is a purpose-built, security-hardened operating system that controls all the networking and security capabilities within FortiGates across your whole network with one inherent operating system.

    84. What is the operating system used by FortiOS?

    Ans:

      FortiOS uses the Linux operating system kernel and various other free software products licensed under GNU GPL.

    85. Why is FortiAI designed?

    Ans:

      FortiAI is specifically designed for security operations teams for investigating threats. FortiAI uses Artificial neural networks and Artificial Intelligence to detect and analyze threats based upon continuous learning algorithms.

    86. What is the latest version of FortiS?

    Ans:

      The latest version of FortiAI is FortiAI V1.5, released on March 30, 2021.

    87. What are the key features of FortiGate?

    Ans:

      The top five Fortinet FortiGate key features are:

      Security ratings: with the help of security ratings, we can affirm security measures.

      Threat Protection: protects antivirus, web filtering, and malware.

      Anomaly-based detection: anomaly-based detection will investigate the traffic and alerts if it finds any attack behavior.

      Threat Intelligence: threat intelligence protects our network from masked and known threats.

      Automated risk assessment: automated risk assessment examines our network automatically and creates reports.

    88. What is the main purpose of FortiMail in a transport mode?

    Ans:

      When delivering Email messages, the purpose of the Fortimail in a transport mode is to check for any virus, it later checks the content of the message payload, then it inspects for spam. Finally, it performs a routing lookup to determine the next hop within MTA.

    89. Instead of manually configuring the Email data, can the FortiMail administrator get the Email data from the LDAP server?

    Ans:

      Yes, it is possible in the LDAP profile section, go to “User query options” and “authentication”, then connect the profile to the domain that is configured locally.

    90. What is defacement?

    Ans:

    Defacement
    Defacement

    91. List the actions taken against a source IP address that creates invalid or spam E-mail messages when utilizing the sender reputation upon a FortiMail Unit?

    Ans:

      With a temporary failure, Fortimail delays the messages sent by that IP address. With a permanent failure, Fortimail rejects the messages sent by that IP address. Fortimail restrains all the messages sent by that IP address.

    92. Which session of SMTP is defined as incoming?

    Ans:

      Protected domains of SMTP are defined as incoming.

    FortiNet Sample Resumes! Download & Edit, Get Noticed by Top Employers! Download

    93. What is the use of VPN?

    Ans:

      VPN is abbreviated as Virtual Private Network used to mask your IP(Internet Protocol) address. It connects a private connection from a public wi-fi connection. A VPA is a vital tool for anonymity and privacy when you are using the public Internet.

    Are you looking training with Right Jobs?

    Contact Us

    Popular Courses

    Get Training Quote for Free