Fortinet FCP_FWB_AD-7.4 Practice Exams
Last updated on Apr 06,2025 - Exam Code: FCP_FWB_AD-7.4
- Exam Name: FCP - FortiWeb 7.4 Administrator
- Certification Provider: Fortinet
- Latest update: Apr 06,2025
Which two statements about background rogue scanning are correct? (Choose two.)
- A . A dedicated radio configured for background scanning can support the connection of wireless clients
- B . When detecting rogue APs, a dedicated radio configured for background scanning can suppress the rogue AP
- C . Background rogue scanning requires DARRP to be enabled on the AP instance
- D . A dedicated radio configured for background scanning can detect rogue devices on all other channels in its configured frequency band.
Which two FortiWeb operation modes support machine learning? (Choose two.)
- A . Transparent proxy
- B . Offline protection
- C . True transparent proxy
- D . Reverse proxy
What benefit does Auto Learning provide?
- A . Automatically builds rules sets
- B . FortiWeb scans all traffic without taking action and makes recommendations on rules
- C . Automatically identifies and blocks suspicious IPs
- D . Automatically blocks all detected threats
Which HTTP response code is commonly used to indicate a permanent redirection in application delivery?
- A . 200 OK
- B . 301 Moved Permanently
- C . 404 Not Found
- D . 500 Internal Server Error
You are deploying FortiWeb 5.6.0 in an Amazon Web Services cloud.
Which 2 lines of this initial setup via CLI are incorrect? (Choose two.)
- A . 6
- B . 9
- C . 3
- D . 2
When configuring threat mitigation features for a web application, what is the primary purpose of rate limiting?
- A . Preventing brute force attacks
- B . Identifying malicious IP addresses
- C . Encrypting sensitive data
- D . Optimizing web server performance
How does your FortiWeb configuration differ if the FortiWeb is upstream of the SNAT device instead of downstream of the SNAT device?
- A . FortiWeb must be set for Transparent Mode
- B . You must enable "Add" X-Forwarded-For: instead of the "Use" X-Forwarded-For: option.
- C . You must enable the "Use" X-Forwarded-For: option.
- D . No special configuration required
You’ve configured an authentication rule with delegation enabled on FortiWeb.
What happens when a user tries to access the web application?
- A . FortiWeb replies with a HTTP challenge of behalf of the server, the if the user authenticates successfully, FortiWeb allows the request and also includes credentials in the request that it forwards to the web app
- B . FrotiWeb redirects users to a FortiAuthenticator page, then if the user authenticates successfully, FortiGate signals to FortiWeb to allow access to the web app
- C . FortiWeb forwards the HTTP challenge from the server to the client, then monitors the reply, allowing access if the user authenticates successfully
- D . ForitWeb redirects the user to the web app’s authentication page
Refer to the exhibit.
How does FortiWeb generate this support vector machine (SVM) model?
- A . It is constantly updated through observed traffic after the ML model has been built by FortiWeb.
- B . It uses data received during the collection phase of the machine learning (ML) process.
- C . It downloads information periodically from FortiGuard.
- D . It uses the XML file imported by the administrator.
What is the primary goal of bot detection and mitigation in web application security?
- A . Accelerating web application performance
- B . Ensuring user privacy
- C . Identifying and blocking malicious bots
- D . Enhancing user authentication