An organization decided to decommission a deployed FortiWeb instance on Google Cloud.
What is the most efficient way to delete the FortiWeb instance and all of its dependent resources?
Google Cloud Deployment Manager manages the lifecycle of deployments and their dependent resources, enabling efficient and clean deletion of FortiWeb instances and all associated resources in one operation.
Your organization has decided to deploy a Fortinet web application firewall (WAF) in Google Cloud.
Why would the organization choose FotiWeb Cloud over FortiWeb VM?
FortiWeb Cloud is a fully managed web application firewall service, ideal for organizations seeking a cloud-native, hands-off WAF deployment without the need to manage virtual appliances.
An administrator has been tasked with modifying their organization's existing active-passive high-availability (HA) FortiGate cluster and turn it into an active-active HA cluster.
Which two behavior changes will the administrator see in the cluster after the change? (Choose two.)
Active-active HA does not require a dedicated HA communication port as each member handles traffic independently.
In active-active mode, cluster members operate more independently and do not present as a single logical device like in active-passive mode.
Refer to the exhibit.

Which two types of traffic flow must the FortiGate cluster inspect, if the client at 198.51.100.10 sends traffic to the Workload A instance? (Choose two.)
South-bound traffic refers to traffic coming from outside the network (the client 198.51.100.10) into the internal environment.
East-bound traffic refers to traffic moving laterally within the internal network, such as between VPCs or workloads, which the FortiGate cluster can inspect for internal threats.
You need to deploy a new Windows server in Google Cloud to offload web traffic from an existing web server in a different zone.
As the customer, which two actions must you take to secure the new ComputeEngine instance? (Choose two.)
Assigning firewall rules controls network traffic to the instance, protecting it from unauthorized access.
Configuring IAM to limit administrative access ensures only authorized users can manage the Windows server, enhancing security.
Gracia
10 hours agoMiesha
9 days ago