Fortinet FCP_FWB_AD-7.4 FCP - FortiWeb 7.4 Administrator Exam Practice Test

Page: 1 / 14
Total 36 questions
Question 1

Which high availability (HA) mode uses gratuitous Address Resolution Protocol (ARP) to advertise a failover event to neighboring network devices?



Answer : B

In Active-Passive high availability (HA) mode, the active unit is responsible for handling traffic while the passive unit remains idle, ready to take over in case of a failure. When a failover occurs, the active unit sends out gratuitous ARP messages to notify neighboring devices about the change in the active unit's IP address. This ensures that the network devices update their ARP tables and can forward traffic to the new active unit.


Question 2

Refer to the exhibit.

What is true about this FortiWeb device? (Choose two.)



Answer : B

It was upgraded to a different version after initial installation: The device has multiple partitions with different firmware versions (6.4.0 and 6.4.1), indicating that it was upgraded after the initial installation from version 6.4.0 to 6.4.1.


Question 3

Which command will enable debugging for the FortiWeb user tracking feature?



Answer : B

To enable debugging for the user tracking feature in FortiWeb, you would use the command diagnose debug application user-tracking 7. This command enables debugging for the user-tracking application and sets the debug level to 7, providing detailed logs for troubleshooting.


Question 4

Which Layer 7 routing method does FortiWeb support?



Answer : D

FortiWeb is a Web Application Firewall (WAF) designed to protect web applications from various threats. Among its features, FortiWeb supports Layer 7 routing methods, which operate based on the content of the HTTP/HTTPS traffic.

HTTP Content Routing refers to the capability of directing incoming web traffic to specific backend servers based on characteristics found within the HTTP requests, such as URL paths, headers, or other content. This allows for more granular and efficient distribution of traffic, ensuring that requests are handled by the appropriate servers based on their content.

Analysis of Options:

A . URL policy routing: While this term suggests routing decisions based on URL policies, it is not a standard term used in FortiWeb's documentation. FortiWeb's content routing encompasses URL-based decisions, making this option less precise.

B . OSPF (Open Shortest Path First): This is a Layer 3 routing protocol used for IP routing within an Autonomous System. It operates at the network layer and is not related to Layer 7 routing methods.

C . BGP (Border Gateway Protocol): Another Layer 3 routing protocol, BGP is used for routing between Autonomous Systems on the internet. It does not pertain to Layer 7 or application-layer routing.

D . HTTP content routing: This aligns with FortiWeb's capabilities to make routing decisions based on the content of HTTP requests, such as URL paths, headers, or other application-layer data. This is a Layer 7 routing method supported by FortiWeb.

Therefore, the correct answer is D. HTTP content routing.


FortiWeb 7.2.6 Administration Guide: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' cloud.orange-business.com

FortiWeb Data Sheet: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' Exclusive Networks

FortiWeb on OCB-FE - Installation and Deployment Guide: 'FortiWeb provides advanced Layer 7 load balancing and authentication offload services.' cloud.orange-business.com

These references confirm that FortiWeb supports HTTP content routing as a Layer 7 routing method.

Question 5

Which is an example of a cross-site scripting (XSS) attack?



Answer : B

Cross-Site Scripting (XSS) is a type of web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. This can lead to session hijacking, credential theft, or redirection to malicious sites. XSS attacks typically exploit vulnerabilities in web applications that fail to properly sanitize user input.

Here's an analysis of the given options:

A . SELECT username FROM accounts WHERE username='admin';-- ' AND password='password';

This is an example of SQL Injection (SQLi) rather than XSS. It manipulates SQL queries to bypass authentication, not execute JavaScript in a user's browser.

B .

This is a classic XSS attack.

It uses an tag with a non-existent src attribute.

The onerror event triggers when the image fails to load, executing alert(document.cookie);, which can expose session cookies.

This method is commonly used for stealing cookies or executing arbitrary scripts.

C . SELECT username FROM accounts WHERE username='XSS' ' AND password='alert('http://badurl.com')';

This is neither a valid SQL injection nor a valid XSS attack.

The syntax suggests an incorrect SQL query rather than JavaScript execution in a browser.

D . <IMG SRC='xss.png'>

This is not a valid XSS attack unless there is an additional event handler like onload, onerror, or onmouseover executing JavaScript.

By itself, it just loads an image and does not execute any malicious script.

Thus, Option B is the correct answer as it represents a real-world XSS attack technique.


OWASP XSS Guide: https://owasp.org/www-community/attacks/xss/

Fortinet XSS Protection Documentation: https://docs.fortinet.com/

Question 6

Which two functions does the first layer of the FortiWeb anomaly machine learning (ML) analysis mechanism perform? (Choose two.)



Answer : B, C

The first layer of the FortiWeb anomaly machine learning (ML) analysis mechanism focuses on analyzing traffic and creating a probability model for parameters and HTTP methods to detect potential anomalies. It also assesses traffic patterns over time to determine whether certain behavior is anomalous. These functions are key to understanding and classifying traffic before further analysis is done.


Question 7

What can a FortiWeb administrator do if a client has been incorrectly period blocked?



Answer : B

If a client has been incorrectly blocked due to a period block, the FortiWeb administrator can manually release the IP address from the blocklist. This allows the client to access the application again before the block expires naturally.


Page:    1 / 14   
Total 36 questions