Question 26

What other consideration must you take into account when configuring Defacement protection?
  • Question 27

    How can you mitigate attacks on authentication processes in a web application? (Select all that apply)
  • Question 28

    Which of the following is a common attack vector that API protection aims to mitigate?
  • Question 29

    An administrator notices multiple IP addresses attempting to log in to an application frequently, within a short time period. They suspect attackers are attempting to guess user passwords for a secure application.
    What is the best way to limit this type of attack on FortiWeb, while still allowing legitimate traffic through?
  • Question 30

    What is a common technique to mitigate Cross-Site Scripting (XSS) attacks in web applications?