Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > NSE 7 Network Security Architect > NSE7_EFW-7.0

NSE7_EFW-7.0 Fortinet NSE 7 - Enterprise Firewall 7.0 Question and Answers

Question # 4

View the exhibit, which contains the partial output of an IKE real-time debug, and then answer the question below.

The administrator does not have access to the remote gateway. Based on the debug output, what configuration changes can the administrator make to the local gateway to resolve the phase 1 negotiation error?

A.

Change phase 1 encryption to 3DES and authentication to SHA128.

B.

Change phase 1 encryption to AES128 and authentication to SHA512.

C.

Change phase 1 encryption to AESCBC and authentication to SHA2.

D.

Change phase 1 encryption to AES256 and authentication to SHA256.

Full Access
Question # 5

View the exhibit, which contains the partial output of an IKE real-time debug, and then answer the question below.

Why didn’t the tunnel come up?

A.

The pre-shared keys do not match.

B.

The remote gateway’s phase 2 configuration does not match the local gateway’s phase 2 configuration.

C.

The remote gateway’s phase 1 configuration does not match the local gateway’s phase 1 configuration.

D.

The remote gateway is using aggressive mode and the local gateway is configured to use man mode.

Full Access
Question # 6

Refer to the exhibit, which shows the output of a diagnose command.

What can be concluded about the debug output in this scenario?

A.

Servers with a negative TZ value are less preferred for rating requests.

B.

There is a natural correlation between the value in the Packets field and the value in the Weight field.

C.

FortiGate used 64.26.151.37 as the initial server to validate its contract.

D.

The first server provided to FortiGate when it performed a DNS query looking for a list of rating servers, was 121.111.236.179.

Full Access
Question # 7

In which two ways does FortiManager function when it is deployed as a local FDS? (Choose two.)

A.

It provides VM license validation services.

B.

It supports rating requests from non-FortiGate devices.

C.

It caches available firmware updates for unmanaged devices.

D.

It can be configured as an update server, a rating server, or both.

Full Access
Question # 8

Refer to the exhibits.

Which contain the partial configurations of two VPNs on FortiGate.

An administrator has configured two VPNs for two different user groups. Users who are in the Users-2 group are not able to connect to the VPN. After running a diagnostics command, the administrator discovered that FortiGate is not matching the user-2 VPN for members of the Users-2 group.

Which two changes must administrator make to fix the issue? (Choose two.)

A.

Use different pre-shared keys on both VPNs

B.

Enable Mode Config on both VPNs.

C.

Set up specific peer IDs on both VPNs.

D.

Change to aggressive mode on both VPNs.

Full Access
Question # 9

Refer to the exhibit, which shows a session table entry.

Which statement about FortiGate behavior relating to this session is true?

A.

FortiGate redirected the client to the captive portal to authenticate, so that a correct policy match could be made.

B.

FortiGate forwarded this session without any inspection.

C.

FortiGate is performing security profile inspection using the CPU. Most Voted

D.

FortiGate applied only IPS inspection to this session.

Full Access
Question # 10

A FortiGate device has the following LDAP configuration:

The administrator executed the ‘dsquery’ command in the Windows LDAp server 10.0.1.10, and got the following output:

>dsquery user –samid administrator

“CN=Administrator, CN=Users, DC=trainingAD, DC=training, DC=lab”

Based on the output, what FortiGate LDAP setting is configured incorrectly?

A.

cnid.

B.

username.

C.

password.

D.

dn.

Full Access
Question # 11

Examine the output from the 'diagnose debug authd fsso list' command; then answer the question below.

# diagnose debug authd fsso list —FSSO logons-IP: 192.168.3.1 User: STUDENT Groups: TRAININGAD/USERS Workstation: INTERNAL2. TRAINING. LAB The IP address 192.168.3.1 is NOT the one used by the workstation INTERNAL2. TRAINING. LAB.

What should the administrator check?

A.

The IP address recorded in the logon event for the user STUDENT.

B.

The DNS name resolution for the workstation name INTERNAL2. TRAINING. LAB.

C.

The source IP address of the traffic arriving to the FortiGate from the workstation INTERNAL2. TRAINING. LAB.

D.

The reserve DNS lookup forthe IP address 192.168.3.1.

Full Access
Question # 12

What is the purpose of an internal segmentation firewall (ISFW)?

A.

It inspects incoming traffic to protect services in the corporate DMZ.

B.

It is the first line of defense at the network perimeter.

C.

It splits the network into multiple security segments to minimize the impact of breaches.

D.

It is an all-in-one security appliance that is placed at remote sites to extend the enterprise network.

Full Access
Question # 13

Refer to the exhibit, which shows a partial routing table.

Assuming all the appropriate firewall policies are configured, which two pings will FortiGate route? (Choose two.)

A.

Source IP address: 10.1.0.10. Destination IP address: 10.64.1.52

B.

Source IPaddress: 10.72.3.52. Destination IP address: 10.1.0.254

C.

Source IPaddress: 10.10.4.24, Destination IPaddress: 10.72.3.20

D.

Source IPaddress: 10.73.9.10, Destination IPaddress: 10.72.3.15

Full Access
Question # 14

An LDAP user cannot authenticate against a FortiGate device. Examine the real time debug output shown in the exhibit when the user attempted the authentication; then answer the question below.

Based on the output in the exhibit, what can cause this authentication problem?

A.

User student is not found in the LDAP server.

B.

User student is using a wrong password.

C.

The FortiGate has been configured with the wrong password for the LDAP administrator.

D.

The FortiGate has been configured with the wrong authentication schema.

Full Access
Question # 15

What does the dirty flag mean in a FortiGate session configured for NGFW policy mode?

A.

The existing session table entry has been updated with the app_id and the firewall policy table needs to be checked for a match.

B.

The application or URL category is unknown and needs to be rescanned by the IPS engine to try to identify the Layer 7 details.

C.

The URL category for this session has been updated by FortiGuard and the session needs to be checked against the policy again to ensure proper web filtering is applied.

D.

Traffic has been identified as coming from an application that is not allowed and the relevant replacement message needs to be displayed to the user, if configured.

Full Access
Question # 16

Examine the following traffic log; then answer the question below.

date-20xx-02-01 time=19:52:01 devname=master device_id="xxxxxxx" log_id=0100020007 type=event subtype=system pri critical vd=root service=kemel status=failure msg="NAT port is exhausted."

What does the log mean?

A.

There is not enough available memory in the system to create a new entry in the NAT port table.

B.

The limit for the maximum number of simultaneous sessions sharing the same NAT port has been reached.

C.

FortiGate does not have any available NAT port for a new connection.

D.

The limit for the maximum number of entries in the NAT port table has been reached.

Full Access
Question # 17

Which two configuration settings change the behavior for content-inspected traffic while FortiGate is in conserve mode? (Choose two.)

A.

IPS failopen

B.

mem failopen

C.

AV failopen

D.

UTM failopen

Full Access
Question # 18

Which two configuration commands change the default behavior for content-inspected traffic while FortiGate is in conserve mode? (Choose two.)

A.

set av-failopen off

B.

set av-failopen pass

C.

set fail-open enable

D.

set ips fail-open disable

Full Access
Question # 19

View the exhibit, which contains the output of diagnose sys session stat, and then answer the question below.

Which statements are correct regarding the output shown? (Choose two.)

A.

There are 0 ephemeral sessions.

B.

All the sessions in the session table are TCP sessions.

C.

No sessions have been deleted because of memory pages exhaustion.

D.

There are 166 TCP sessions waiting to complete the three-way handshake.

Full Access
Question # 20

Which statement about protocol options is true?

A.

Protocol options allows administrators a streamlined method to instruct FortiGate to block all sessions corresponding to disabled protocols.

B.

Protocol options allows administrators the ability to configure the Any setting for all enabled protocols which provides the most efficient use of system resources.

C.

Protocol options allow administrators to configure a maximum number of sessions for each configured protocol.

D.

Protocol options allows administrators to configure which Layer 4 port numbers map to upper-layer protocols, such as HTTP, SMTP, FTP, and so on.

Full Access
Question # 21

Examine the output of the ‘get router info ospf neighbor’ command shown in the exhibit; then answer the question below.

Which statements are true regarding the output in the exhibit? (Choose two.)

Refer to the exhibit, which shows the output of a debug command.

Which statement about the output is true?

A.

TheOSPF routers with the IDs 0.0.0.69 and 0.0.0.117 are both designated routers for the war. l network.

B.

The OSPF router with the ID 0.0.0.2 is the designated router for the ToRemote network.

C.

The local FortiGate is the designated router for the wan1 network.

D.

The interface ToRemote is a point-to-point OSPF network.

Full Access
Question # 22

Which configuration can be used to reduce the number of BGP sessions in an IBGP network?

A.

Neighbor range

B.

Route reflector

C.

Next-hop-self

D.

Neighbor group

Full Access
Question # 23

Refer to the exhibit, which contains a TCL script configuration on FortiManager.

An administrator has configured the TCL script on FortiManager, but failed to apply any changes to the managed device after being executed.

Why did the TCL script fail to make any changes to the managed device?

A.

Changes in an interface configuration can only be done by CLI script.

B.

The TCL script must start with #include <>.

C.

Incomplete commands are ignored in TCL scripts.

D.

The TCL command run_cmd has not been created.

Full Access
Question # 24

Refer to exhibit, which contains the output of a BGP debug command.

Which statement explains why the state of the 10.200.3.1 peer is Connect?

A.

The local router is receiving BGP keepalives from the remote peer, but the local peer has not received the OpenConfirm yet.

B.

The TCP session to 10.200.3.1 has not completed the three-way handshake.

C.

The local router is receiving the BGP keepalives from the peer, but it has not received a BGP prefix yet.

D.

The local router has received the BGP prefixes from the remote peer.

Full Access