The two statements about the application control profile mode that are true include: It uses flow-based scanning techniques, regardless of the inspection mode used.
It uses flow-based scanning techniques, regardless of the inspection mode used.-It can be configured in either flow-based profile-based or proxy-based FortiOS inspection mode.
Application control technologies determines and takes action against network traffic based on the application that generated the traffic. Application control uses protocol decoders with signatures that analyze network traffic to detect application traffic, even if the traffic uses nonstandard ports or protocols.
Proxy-based inspection reconstructs content passing through the FortiGate unit and inspects the content for security threats, or. Flow-based inspection, that takes a snapshot of content packets and uses pattern matching to identify security threats in the content.
Therefore, the correct answer is as given above
learn more about Proxy-based inspection: https://brainly.com/question/14403686
#SPJ1
The complete question goes thus:
Which two statements about the application control profile mode are true?
It uses flow-based scanning techniques, regardless of the inspection mode used.
-It cannot be used in conjunction with IPS scanning.
-It can scan only unsecure protocols.
-It can be configured in either flow-based profile-based or proxy-based FortiOS inspection mode.