An administrator has learned that some of the corporate web servers were exploited using SQL injection attacks.
What should the administrator do to verify their web servers are not susceptible to the exploits?
Refer to the exhibit.
The exhibit shows the first few lines of three scripts, and a virtual server configuration leveraging these scripts.
Based on the way FortiADC prioritizes script execution, in what order will the scripts execute?
An administrator wants to implement load balancing persistence by configuring FortiADC to prefix the server ID to an existing cookie sent by the back-end servers.
Which persistence method should the administrator use?
Refer to the exhibit.
FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.
What must the administrator do to avoid this problem? (Choose two.)
Which two statements about Layer 7 application delivery control are true? (Choose two.)