Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

FCP - FortiWeb 7.4 Administrator Question and Answers

FCP - FortiWeb 7.4 Administrator

Last Update Oct 15, 2025
Total Questions : 36

We are offering FREE FCP_FWB_AD-7.4 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare FCP_FWB_AD-7.4 free exam questions and then go for complete pool of FCP - FortiWeb 7.4 Administrator test questions that will help you more.

FCP_FWB_AD-7.4 pdf

FCP_FWB_AD-7.4 PDF

$42  $104.99
FCP_FWB_AD-7.4 Engine

FCP_FWB_AD-7.4 Testing Engine

$50  $124.99
FCP_FWB_AD-7.4 PDF + Engine

FCP_FWB_AD-7.4 PDF + Testing Engine

$66  $164.99
Questions 1

Refer to the exhibit.

Attack ID20000010is brute force logins.

Which statement is accurate about the potential attack?

Options:

A.  

The attacker has successfully retrieved the credentials to www.example.com.

B.  

www.example.com is running attacks against the client 192.168.1.11.

C.  

The attack has happened 10 times.

D.  

192.168.1.11 is sending suspicious traffic to FortiWeb.

Discussion 0
Questions 2

In SAML deployments, which server contains user authentication credentials (username/password)?

Options:

A.  

Identity provider

B.  

Service provider

C.  

User database

D.  

Authentication client

Discussion 0
Questions 3

Which two objects are required to configure a server policy in reverse proxy mode without content routing? (Choose two.)

Options:

A.  

Site publishing

B.  

Protected hostname

C.  

Virtual server

D.  

Server pool

Discussion 0
Questions 4

An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application.

What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?

Options:

A.  

Blocklist any suspected IPs.

B.  

Configure a brute force login custom policy.

C.  

Rate limit all connections from suspected IP addresses.

D.  

Block the IP address at the border router.

Discussion 0
Questions 5

Refer to the exhibit.

Which statement is true?

Options:

A.  

FortiWeb cannot perform content inspection on the traffic because it is encrypted.

B.  

FortiWeb is decrypting and re-encrypting the traffic.

C.  

The server is not performing any cryptography on the traffic.

D.  

The server is encrypting traffic being sent to the client.

Discussion 0
Questions 6

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers.

When an attack occurs, FortiWeb blocks traffic based on the192.0.2.1source IP address, which belongs to FortiADC. This setup is breaking all connectivity and genuine clients are not able to access the servers.

What can the administrator do to avoid this problem? (Choose two.)

Options:

A.  

Enable and configure the Preserve Client IP setting on the client.

B.  

No special configuration is required; connectivity will be re-established for all clients after the set timeout.

C.  

Place FortiWeb in front of FortiAD

C.  

D.  

Enable and configure the Use X-Forwarded-For setting on FortiWeb.

Discussion 0
Questions 7

Refer to the exhibit.

A FortiWeb device is deployed upstream of a device performing source network address translation (SNAT) or load balancing.

What configuration must you perform on FortiWeb to preserve the original IP address of the client?

Options:

A.  

Enable and configure the Preserve Client IP setting.

B.  

Use a transparent operatingmode on FortiWeb.

C.  

Enable and configure the Add X-Forwarded-For setting.

D.  

Turn off NAT on the FortiWeb.

Discussion 0
Questions 8

What are two results of enabling monitor mode on FortiWeb? (Choose two.)

Options:

A.  

It does not affect denial-of-service (DoS) protection profile actions to rate limit traffic.

B.  

It uses the default action for all profiles and, depending on the configuration, blocks or allows traffic.

C.  

It does not affect any HTML rewriting or redirection actions in web protection profiles.

D.  

It overrides all usual profile actions. FortiWeb accepts all requests and generates alert email or log messages only for violations.

Discussion 0
Questions 9

Which three stages are part of creating a machine learning (ML) bot detection algorithm? (Choose three.)

Options:

A.  

Model building

B.  

Model running

C.  

Model verification

D.  

Sample collecting

E.  

Model Bayesian analysis

Discussion 0
Questions 10

Which high availability mode is commonly used to integrate with a traffic distributer like FortiADC?

Options:

A.  

Cold standby

B.  

Load sharing

C.  

Active-Active

D.  

Active-Passive

Discussion 0