Questions for the FCP FWB AD 7 4 were updated on : Nov 23 ,2025
Refer to the exhibit.
FortiADC is applying SNAT to all inbound traffic going to the servers.
When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which
belongs to FortiADC. This setup is breaking all connectivity and genuine clients are not able to access
the servers.
What can the administrator do to avoid this problem? (Choose two.)
C, D
Explanation:
Place FortiWeb in front of FortiADC: This configuration change places FortiWeb between the client
and FortiADC, so that FortiWeb can directly inspect and protect the incoming traffic before FortiADC
applies SNAT (Source Network Address Translation). By placing FortiWeb in front, it will have access
to the real client IP addresses, and it will be able to properly identify and handle attack traffic
without blocking legitimate client traffic.
Enable and configure the Use X-Forwarded-For setting on FortiWeb: This setting allows FortiWeb to
extract the original client IP address from the X-Forwarded-For header in the HTTP request, which is
inserted by FortiADC when performing SNAT. With this setting enabled, FortiWeb will be able to
block traffic based on the original client IP address rather than the SNATed IP address (192.0.2.1),
preserving the accuracy of the security measures.
Which three security features must you configure on FortiWeb to protect API connections? (Choose
three.)
B, C, E
Explanation:
Machine learning (ML)-based API protection: ML-based API protection helps detect and mitigate
abnormal behavior in API traffic, such as bot attacks or abuse, by learning and adapting to normal
traffic patterns.
API schema validation: API schema validation ensures that the API requests conform to the defined
schema (e.g., checking the structure, fields, and types in the API calls). This helps prevent attacks like
XML or JSON injection by ensuring only valid requests are processed.
API user key enforcement: Enforcing API user key authentication requires clients to provide valid API
keys, ensuring only authorized users can access the API. This is crucial for controlling access to the
API.
In which two operating modes can FortiWeb modify HTTP packets? (Choose two.)
B, D
Explanation:
Virtual proxy: In virtual proxy mode, FortiWeb acts as an intermediary between clients and the
server, and it can modify HTTP packets. It performs various security checks, such as inspecting and
filtering HTTP traffic before forwarding it to the web server.
Reverse proxy: In reverse proxy mode, FortiWeb sits between the client and the server, handling
incoming requests from clients, modifying or inspecting HTTP packets as needed, and forwarding
them to the backend servers.
How are bot machine learning (ML) models different from API or anomaly detection models?
A
Explanation:
Bot ML models analyze multiple connections over time instead of analyzing each connection as a
single unit: This is the key distinction. Bot ML models focus on analyzing patterns over a period of
time, looking at behavioral patterns across multiple requests or connections from the same source to
identify potential bot activity. Unlike traditional anomaly detection or API models that may focus on
single connections or individual transactions, bot detection typically examines aggregated behavior
to identify patterns indicative of bots, such as high-frequency requests or unusual traffic flows.
Refer to the exhibit.
Which statement is true?
B
Explanation:
In the diagram, FortiWeb is positioned between the client and the server, handling encrypted HTTPS
traffic from the client and sending unencrypted HTTP traffic to the server. This indicates that
FortiWeb is performing SSL offloading, which means it is decrypting the HTTPS traffic from the client,
inspecting it, and then re-encrypting the traffic before forwarding it to the server.
When is it possible to use a self-signed certificate, rather than one purchased from a commercial
certificate authority?
C
Explanation:
A self-signed certificate is useful when all the devices in your network can be configured to trust it. In
this case, if your enterprise's computers trust the internal Active Directory or Certificate Authority
(CA) server that signed the certificate, the self-signed certificate can be used internally for HTTPS
connections without raising trust issues.
Which two objects are required to configure a server policy in reverse proxy mode without content
routing? (Choose two.)
B, C
Explanation:
Protected hostname: In reverse proxy mode, the protected hostname refers to the domain or
hostname that FortiWeb will protect. It specifies which hostname FortiWeb is acting as a reverse
proxy for, and is required for the server policy configuration.
Virtual server: A virtual server is a logical representation of a web server that FortiWeb handles. It's
required to configure how traffic is routed to the protected resources in reverse proxy mode.
What are two results of enabling monitor mode on FortiWeb? (Choose two.)
A, D
Explanation:
It does not affect denial-of-service (DoS) protection profile actions to rate limit traffic: Monitor mode
allows FortiWeb to monitor traffic without impacting the protection profile actions, including rate
limiting in the DoS protection profiles. Traffic will still be subjected to DoS protection actions like rate
limiting, but FortiWeb will not block traffic unless a violation occurs.
It overrides all usual profile actions. FortiWeb accepts all requests and generates alert email or log
messages only for violations: In monitor mode, FortiWeb will allow all traffic through and generate
logs or alerts for any violations, but it will not take active actions like blocking requests or redirecting
traffic. This allows you to observe the traffic patterns and potential threats without disrupting normal
operations.
Refer to the exhibit.
What can you conclude from this support vector machine (SVM) plot of a potential bot connection?
D
Explanation:
In the SVM plot of potential bot activity, you can see that the sample value (orange) is significantly
different from the average value (green) and the maximum value (blue) in most of the metrics. This
suggests unusual or abnormal behavior, indicating that the connection might be a bot. Typically, bots
exhibit patterns that diverge from normal user activity, such as higher frequencies of certain types of
requests, abnormal throughput, or an unusual pattern of HTTP requests (such as requests without
referers or excessive TCP connections).
Review the following configuration:
Which result would you expect from this configuration setting?
B
Explanation:
In the configuration, the command set sample-limit-by-ip 0 disables the sample limit for any specific
IP address. This means that during the machine learning (ML) running phase, FortiWeb will not limit
the number of samples it accepts from the same IP address. Setting this to 0 effectively removes any
restrictions on the number of samples from a given IP address.
An administrator notices multiple IP addresses attempting to log in to an application frequently,
within a short time period. They suspect attackers are attempting to guess user passwords for a
secure application.
What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic
through?
B
Explanation:
The best way to limit brute force login attacks on FortiWeb is to configure a brute force login custom
policy. FortiWeb provides the ability to detect and mitigate brute force login attempts by
automatically limiting the number of failed login attempts within a specific time period. This
approach allows you to block or rate limit suspicious IP addresses while still allowing legitimate users
access, based on your configuration.
Which two statements about running a vulnerability scan are true? (Choose two.)
A, C
Explanation:
You should run the vulnerability scan during a maintenance window: Running a vulnerability scan
during a maintenance window minimizes the risk of affecting normal operations. Scans can be
resource-intensive and may cause disruptions if run during peak hours or when the system is in use.
You should run the vulnerability scan in a test environment: It is important to run the vulnerability
scan in a test environment first to avoid unintended disruptions on the live system. This helps to
identify potential issues or false positives without impacting production systems.
Which two items can be defined in a FortiWeb XML Protection Rule? (Choose two.)
B, D
Explanation:
XML Schema: In FortiWeb, XML protection rules allow you to define an XML Schema to validate the
structure and content of incoming XML documents. This helps protect against attacks like XML
injection by ensuring that only well-formed XML requests are processed.
Request URL: You can define a request URL as part of an XML protection rule to specify the URL
pattern for which the rule should apply. This allows you to apply different XML protection rules to
different endpoints or resources based on the URL.
What are two possible impacts of a DoS attack on your web server? (Choose two.)
B, C
Explanation:
The web application is unable to accept any more connections because of network socket
exhaustion: A Denial of Service (DoS) attack often floods the web server with an overwhelming
number of requests, leading to network socket exhaustion. This can prevent the server from
accepting new legitimate connections, effectively disrupting service.
The web application server is unable to accept new client sessions due to memory exhaustion: DoS
attacks can consume a significant amount of server memory, causing memory exhaustion. This
results in the web application being unable to accept new client sessions or handle requests
properly.
In SAML deployments, which server contains user authentication credentials (username/password)?
A
Explanation:
In SAML (Security Assertion Markup Language) deployments, the Identity Provider (IdP) is
responsible for storing and managing user authentication credentials, such as usernames and
passwords. The IdP authenticates the user and then issues a SAML assertion to the Service Provider
(SP), which allows the user to access services without needing to re-enter credentials.