Free FCP_FWB_AD-7.4 Sample Questions — FCP - FortiWeb 7.4 Administrator

Free FCP_FWB_AD-7.4 sample questions for the FCP - FortiWeb 7.4 Administrator exam. No account required: study at your own pace.

Want an interactive quiz? Take the full FCP_FWB_AD-7.4 practice test

Looking for more? Click here to get the full PDF with 24+ practice questions for $4 for offline study and deeper preparation.

Question 1

You are using HTTP content routing on FortiWeb. You want requests for web application A to be forwarded to a cluster of web servers, which all host the same web application. You want requests for web application B to be forwarded to a different, single web server. Which statement regarding this solution is true?

  • A. You must chain policies so that all requests go to the virtual server for policy A first, and then redirect requests for web application B to go to the virtual server for policy B
  • B. You must create static routes on the FortiWeb to allow these requests
  • C. You must put the single web server for application B into a server pool and use it with HTTP content routing
  • D. The server policy always applies the same web protection profile to both web application A and web application B
Show Answer
Correct Answer:
C. You must put the single web server for application B into a server pool and use it with HTTP content routing
Question 2

Which two items can be defined in a FortiWeb XML Protection Rule? (Choose two.)

  • A. API key
  • B. XML Schema
  • C. Web protection profile
  • D. Request URL
Show Answer
Correct Answer:
  • B. XML Schema
  • D. Request URL
Question 3

Which two functions does the first layer of the FortiWeb anomaly machine learning (ML) analysis mechanism perform? (Choose two.)

  • A. Determines whether an anomaly is a real attack or just a harmless anomaly that should be ignored
  • B. Determines a probability model behind every parameter and HTTP method passing through FortiWeb
  • C. Determines whether traffic is an anomaly, based on observable features over time
  • D. Determines if a detected threat is a false-positive or not
Show Answer
Correct Answer:
  • B. Determines a probability model behind every parameter and HTTP method passing through FortiWeb
  • C. Determines whether traffic is an anomaly, based on observable features over time
Question 4

An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application. What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?

  • A. Blocklist any suspected IPs
  • B. Configure a brute force login custom policy
  • C. Rate limit all connections from suspected IP addresses
  • D. Block the IP address at the border router
Show Answer
Correct Answer:
C. Rate limit all connections from suspected IP addresses
Question 5

You can configure FortiWeb to send traffic to third-party IPS/IDS devices through network interfaces for traffic monitoring. Which two operation modes support this feature? (Choose two.)

  • A. Transparent proxy
  • B. Reverse proxy
  • C. Offline protection
  • D. True transparent proxy
Show Answer
Correct Answer:
  • B. Reverse proxy
  • D. True transparent proxy

Aced these? Get the Full Exam

Download the complete FCP_FWB_AD-7.4 study bundle with 24+ questions in a single printable PDF.