You are using HTTP content routing on FortiWeb. You want requests for web application A to be
forwarded to a cluster of web servers, which all host the same web application. You want requests
for web application B to be forwarded to a different, single web server.
Which statement about this solution is true?
How does FortiWeb protect against defacement attacks?
The anti-defacement feature examines a web sites files for changes at specified time intervals. If it
detects a change that could indicate a defacement attack, theFortiWebappliancecan notify you and
quickly react by automatically restoring the web site contents to the previous backup.
What is one of the key benefits of the FortiGuard IP reputation feature?
FortiGuard IP Reputation service assigns a poor reputation, including virus-infected clients and
Which three statements about HTTPS on FortiWeb are true? (Choose three.)
A, C, E
When viewing the attack logs on FortiWeb, which client IP address is shown when you are using XFF
When an XFF header reaches Alteon from a client, Alteon removes all the content from the header
and injects the client IP address. Alteon then forwards the header to the server.
In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)
FortiWebappliances operating in offline protection mode or either of the transparent modes
The FortiWeb machine learning (ML) feature is a two-phase analysis mechanism.
Which two functions does the first layer perform? (Choose two.)
The first layer uses the Hidden Markov Model (HMM) and monitors access to the application and
collects data to build a mathematical model behind every parameter and HTTP method.
In which scenario might you want to use the compression feature on FortiWeb?
FortiWebmight expend resources compressing responses that have already been compressed by the
When is it possible to use a self-signed certificate, rather than one purchased from a commercial
This can include SSL/TLS certificates, code signing certificates, and S/MIME certificates. The reason
why theyre considered different from traditional certificate-authority signed certificates is that
theyre created, issued, and signed by the company or developer who is responsible for the website
or software being signed. This is why self-signed certificates are considered unsafe for public-facing
websites and applications.
Refer to the exhibits.
FortiWeb is configured in reverse proxy mode and it is deployed downstream to FortiGate. Based on
the configuration shown in the exhibits, which of the following statements is true?