Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > Fortinet > Fortinet Network Security Expert > FCP_FGT_AD-7.4

FCP_FGT_AD-7.4 FCP - FortiGate 7.4 Administrator Question and Answers

Question # 4

Refer to the exhibit.

Which statement about this firewall policy list is true?

A.

The Implicit group can include more than one deny firewall policy.

B.

The firewall policies are listed by ID sequence view.

C.

The firewall policies are listed by ingress and egress interfaces pairing view.

D.

LAN to WAN. WAN to LAN. and Implicit are sequence grouping view lists.

Full Access
Question # 5

Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)

A.

Pre-shared key and certificate signature as authentication methods

B.

Extended authentication (XAuth)to request the remote peer to provide a username and password

C.

Extended authentication (XAuth) for faster authentication because fewer packets are exchanged

D.

No certificate is required on the remote peer when you set the certificate signature as the authentication method

Full Access
Question # 6

Refer to the exhibit.

Based on the routing database shown in the exhibit which two conclusions can you make about the routes? (Choose two.)

A.

There will be eight routes active in the routing table

B.

The port1 and port2 default routes are active in the routing table

C.

The port3 default route has the highest distance

D.

The port3 default route has the lowest metric

Full Access
Question # 7

A FortiGate administrator is required to reduce the attack surface on the SSL VPN portal.

Which SSL timer can you use to mitigate a denial of service (DoS) attack?

A.

SSL VPN dcls-hello-timeout

B.

SSL VPN http-request-header-timeout

C.

SSL VPN login-timeout

D.

SSL VPN idle-timeout

Full Access
Question # 8

What are three key routing principles in SD-WAN? (Choose three.)

A.

By default. SD-WAN members are skipped if they do not have a valid route to the destination

B.

By default. SD-WAN rules are skipped if only one route to the destination is available

C.

By default. SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member

D.

SD-WAN rules have precedence over any other type of routes

E.

Regular policy routes have precedence over SD-WAN rules

Full Access
Question # 9

Refer to the exhibit.

Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?

A.

All traffic from a source IP to a destination IP is sent to the same interface.

B.

Traffic is sent to the link with the lowest latency.

C.

Traffic is distributed based on the number of sessions through each interface.

D.

All traffic from a source IP is sent to the same interface

Full Access
Question # 10

Refer to the exhibit showing a debug flow output.

What two conclusions can you make from the debug flow output? (Choose two.)

A.

The debug flow is for ICMP traffic.

B.

A firewall policy allowed the connection.

C.

A new traffic session was created.

D.

The default route is required to receive a reply.

Full Access
Question # 11

Refer to the exhibit.

Examine the intrusion prevention system (IPS) diagnostic command shown in the exhibit.

If option 5 is used with the IPS diagnostic command and the outcome is a decrease in the CPU usage, what is the correct conclusion?

A.

The IPS engine is blocking all traffic.

B.

The IPS engine is inspecting a high volume of traffic.

C.

The IPS engine is unable to prevent an intrusion attack.

D.

The IPS engine will continue to run in a normal state.

Full Access
Question # 12

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Full Access
Question # 13

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration.

An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2.

The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver.

Which two configuration changes can the administrator make to the policy to deny Webserver access for Remote-User2? (Choose two.)

A.

Enable match-vip in the Deny policy.

B.

Set the Destination address as Webserver in the Deny policy.

C.

Disable match-vip in the Deny policy.

D.

Set the Destination address as Deny_IP in the Allow_access policy.

Full Access
Question # 14

A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.

All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.

Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)

A.

Enable Dead Peer Detection

B.

Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.

C.

Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.

D.

Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.

Full Access
Question # 15

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.

Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

A.

On HQ-FortiGate, disable Diffie-Helman group 2.

B.

On Remote-FortiGate, set port2 as Interface.

C.

On both FortiGate devices, set Dead Peer Detection to On Demand.

D.

On HQ-FortiGate, set IKE mode to Main (ID protection).

Full Access
Question # 16

What is the primary FortiGate election process when the HA override setting is disabled?

A.

Connected monitored ports > Priority > System uptime > FortiGate serial number

B.

Connected monitored ports > System uptime > Priority > FortiGate serial number

C.

Connected monitored ports > Priority > HA uptime > FortiGate serial number

D.

Connected monitored ports > HA uptime > Priority > FortiGate serial number

Full Access
Question # 17

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)

A.

The issuer must be a public CA

B.

The CA extension must be set to TRUE

C.

The Authority Key Identifier must be of type SSL

D.

The keyUsage extension must be set to

Full Access
Question # 18

Refer to the exhibit.

FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt.

What is the most likely reason for this situation?

A.

The Service DNS is required in the firewall policy.

B.

The user is using an incorrect user name.

C.

The Remote-users group is not added to the Destination.

D.

No matching user account exists for this user.

Full Access
Question # 19

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

A.

The host field in the HTTP header.

B.

The server name indication (SNI) extension in the client hello message.

C.

The subject alternative name (SAN) field in the server certificate.

D.

The subject field in the server certificate.

E.

The serial number in the server certificate.

Full Access
Question # 20

Refer to the exhibits.

The SSL VPN connection fails when a user attempts to connect to it.

What should the user do to successfully connect to the SSL VPN?

A.

Change the SSL VPN portal to the tunnel.

B.

Change the idle timeout.

C.

Change the server IP address.

D.

Change the SSL VPN port on the client.

Full Access
Question # 21

Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

A.

Enable the parameter Never Timeout in the admin profiles

B.

Increase the admintimeout value under config system accprofile super_admin.

C.

Increase the admintimeout value under config system global

D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Full Access
Question # 22

How can you disable RPF checking?

A.

Disable src-check on the interface level settings

B.

Unset fail-alert-interfaces on the interface level settings.

C.

Disable fail-detect on the interface level settings.

D.

Disable strict-src-check under system settings.

Full Access
Question # 23

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.

Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)

A.

Allow & Warning

B.

Trust & Allow

C.

Allow

D.

Block & Warning

E.

Block

Full Access
Question # 24

Refer to the exhibit showing a FortiGuard connection debug output.

Based on the output, which two facts does the administrator know about the FortiGuard connection? (Choose two.)

A.

One server was contacted to retrieve the contract information.

B.

There is at least one server that lost packets consecutively.

C.

A local FortiManaqer is one of the servers FortiGate communicates with.

D.

FortiGate is using default FortiGuard communication settings.

Full Access
Question # 25

Refer to the exhibit.

Why did FortiGate drop the packet?

A.

11 matched an explicitly configured firewall policy with the action DENY

B.

It failed the RPF check.

C.

The next-hop IP address is unreachable.

D.

It matched the default implicit firewall policy

Full Access