Refer to the exhibit.
Review the intrusion prevention system (IPS) profile signature settings shown in the exhibit.

What do you conclude when adding the FTP.Login.Failed signature to the IPS sensor profile?
Refer to the exhibit.
Review the intrusion prevention system (IPS) profile signature settings shown in the exhibit.
What do you conclude when adding the FTP.Login.Failed signature to the IPS sensor profile?
Referencing the provided exhibit, traffic matching the FTP.Login.Failed signature will be allowed and logged. While the IPS profile setting indicates an overall 'Block' action for the profile, the specific action assigned to the FTP.Login.Failed signature is 'Pass', which means this particular signature's related traffic will not be blocked but rather allowed and logged as per the settings shown in the exhibit.
The correct answer is C, take a look at the 7.2 Security study guide page 394: Select Block to silently drop traffic matching any of the signatures included in the entry. So, while the default action would be 'Pass' for this signature the administrator is specifically overriding that to set the Block action. To use the default action the setting would have to be 'Default'.
Correct answer is C beacause IPS action is set to block, if action is set to default it will allow the traffic.
Answer A reference http://docs.fortinet.com/document/fortigate/6.0.0/handbook/240599/application-control
I didn't understand this application Control link if the theme is IPS... The right answer is C
I didn't understand this application Control link if the theme is IPS... The right answer is C
allow but final is block by IPS
C. Traffic matching the signature will be silently dropped and logged. Reference and download study guide: https://ebin.pub/fortinet-fortigate-security-study-guide-for-fortios-72.html
C is the correct answer
C Select Block to silently drop traffic matching any of the signatures included in the entry.
Answer is C: A bit misleading with the IPS signature set to PASS but the following explanation helps: When blocking the signature as an 'IPS Signature and Filter' with the action set to 'block', the default IPS signature action is set to 'pass'. In this case, it will give precedence to the block action of the 'IPS Signature and Filter' and traffic will be blocked, even though the actual IPS signature action is set to 'pass'. https://www.examtopics.com/exams/fortinet/nse4-fgt-7-2/view/13/