Question 26
What other consideration must you take into account when configuring Defacement protection?
Question 27
How can you mitigate attacks on authentication processes in a web application? (Select all that apply)
Question 28
Which of the following is a common attack vector that API protection aims to mitigate?
Question 29
An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application.
What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?
What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?
Question 30
What is a common technique to mitigate Cross-Site Scripting (XSS) attacks in web applications?
