A. Checking SSL certificate expiration
B. Testing SSL connections from different devices
C. Reviewing SSL/TLS handshake logs
D. Disabling all encryption protocols
A. Detecting malicious JavaScript code
B. Encrypting data at rest
C. Controlling the sources of content that a web page can load
D. Preventing SQL injection attacks
A. Provides load balancing between multiple web servers
B. Provide ability to securely process cash transactions
C. PCI specifically requires a WAF
D. Provides credit card processing capabilities
A. Enhancing data security by encrypting cached content
B. Accelerating content delivery to end-users
C. Reducing server load by serving cached content
D. Automatically blocking malicious requests
A. Protecting against DDoS attacks
B. Optimizing website performance
C. Preventing SQL injection attacks
D. Enforcing secure authentication
A. Optimizing web server performance
B. Encrypting sensitive data
C. Identifying malicious IP addresses
D. Preventing brute force attacks
A. Upstream link rate, the connection rate for the client to the AP
B. The channel utilization of the channel the client is using
C. The receive signal strength (RSS) of the client at the AP
D. Downstream link rate, the connection rate for the AP to the client
A. IP whitelisting
B. HTTP referrer headers
C. OAuth 2.0 tokens
D. Session cookies
A. In reverse-proxy mode, the traffic is denied.
B. In transparent mode, the traffic is passed through.
C. In offline protection mode, the traffic is dropped with a TCP reset.
D. In true transparent mode, ip-forward should be enabled to deny the traffic.
A. When the available bandwidth is low.
B. When the file is too big for the FortiWeb buffer.
C. When the server is too heavily tasked.
D. When the client Internet connections are slow.