NSE4 · Question #286
NSE4 Question #286: Real Exam Question with Answer & Explanation
The correct answer is A: Encrypted protocols can be scanned through the use of the SSL proxy.. Administrators can control encrypted data transfer by enabling SSL/TLS inspection (SSL proxy) to decrypt and scan protocols, using DLP rules to block encrypted files, and employing Application Control to monitor and alert on encrypted protocol usage.
Question
The transfer of encrypted files or the use of encrypted protocols between users and servers on the internet can frustrate the efforts of administrators attempting to monitor traffic passing through the FortiGate unit and ensuring user compliance to corporate rules. Which of the following items will allow the administrator to control the transfer of encrypted data through the FortiGate unit? (Select all that apply.)
Options
- AEncrypted protocols can be scanned through the use of the SSL proxy.
- BDLP rules can be used to block the transmission of encrypted files.
- CFirewall authentication can be enabled in the firewall policy, preventing the use of encrypted
- DApplication control can be used to monitor the use of encrypted protocols; alerts can be sent to
Explanation
Administrators can control encrypted data transfer by enabling SSL/TLS inspection (SSL proxy) to decrypt and scan protocols, using DLP rules to block encrypted files, and employing Application Control to monitor and alert on encrypted protocol usage.
Common mistakes.
- C. Firewall authentication ensures that only authorized users can pass traffic through the firewall, but it does not inherently prevent or control the type of encrypted protocols those authenticated users choose to employ once access is granted.
Concept tested. FortiGate Encrypted Traffic Control
Reference. https://docs.fortinet.com/document/fortigate/7.4.0/administration-guide/526779/ssl-ssh-inspection
Topics
Community Discussion
No community discussion yet for this question.