Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCP_FGT_AD-7.4 Questions and Answers

Question # 6

Refer to the exhibits, which show the system performance output and the default configuration of high memory usage thresholds in a FortiGate.

Based on the system performance output, what can be the two possible outcomes? (Choose two.)

A.

FortiGate will start sending all files to FortiSandbox for inspection.

B.

FortiGate has entered conserve mode.

C.

Administrators cannot change the configuration.

D.

Administrators can access FortiGate onlythrough the console port.

Full Access
Question # 7

What are three key routing principles in SD-WAN? (Choose three.)

A.

By default. SD-WAN members are skipped if they do not have a valid route to the destination

B.

By default. SD-WAN rules are skipped if only one route to the destination is available

C.

By default. SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member

D.

SD-WAN rules have precedence over any other type of routes

E.

Regular policy routes have precedence over SD-WAN rules

Full Access
Question # 8

Refer to the exhibits.

An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).

What must the administrator do to synchronize the address object?

A.

Change the csf setting on Local-FortiGate (root) to sec fabric-object-unification default.

B.

Change the csf setting on both devices to sec downscream-access enable.

C.

Change the csf setting on ISFW (downstream) to sec auchorizacion-requesc-cype certificace.

D.

Change the csf setting on ISFW (downstream) to sec configuration-sync local.

Full Access
Question # 9

Refer to the exhibit.

FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt.

What is the most likely reason for this situation?

A.

The Service DNS is required in the firewall policy.

B.

The user is using an incorrect user name.

C.

The Remote-users group is not added to the Destination.

D.

No matching user account exists for this user.

Full Access
Question # 10

Which statement about the deployment of the Security Fabric in a multi-VDOM environment is true?

A.

Downstream devices can connect to the upstream device from any of their VDOMs

B.

Each VDOM in the environment can be part of a different Security Fabric

C.

VDOMs without ports with connected devices are not displayed in the topology

D.

Security rating reports can be run individually for each configured VDOM

Full Access
Question # 11

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

B.

The browser does not trust the certificate used by FortiGate for SSL inspection

C.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

D.

The matching firewall policy is set to proxy inspection mode

Full Access
Question # 12

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Full Access
Question # 13

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.)

A.

If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.

B.

If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.

C.

If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP

D.

If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.

Full Access
Question # 14

A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.

All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.

Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)

A.

Enable Dead Peer Detection

B.

Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.

C.

Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.

D.

Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.

Full Access
Question # 15

A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.

Which IPsec Wizard template must the administrator apply?

A.

Remote Access

B.

Site to Site

C.

Dial up User

D.

iHub-and-Spoke

Full Access
Question # 16

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)

A.

The issuer must be a public CA

B.

The CA extension must be set to TRUE

C.

The Authority Key Identifier must be of type SSL

D.

The keyUsage extension must be set to

Full Access
Question # 17

Which three methods are used by the collector agent for AD polling? (Choose three.)

A.

WinSecLog

B.

WMI

C.

NetAPI

D.

FSSO REST API

E.

FortiGate polling

Full Access
Question # 18

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.

Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)

A.

Allow & Warning

B.

Trust & Allow

C.

Allow

D.

Block & Warning

E.

Block

Full Access
Question # 19

Refer to the exhibit.

Which two statements are true about the routing entries in this database table? (Choose two.)

A.

All of the entries in the routing database table are installed in the FortiGate routing table.

B.

The port2 interface is marked as inactive.

C.

Both default routes have different administrative distances.

D.

The default route on porc2 is marked as the standby route.

Full Access
Question # 20

An administrator manages a FortiGate model that supports NTurbo.

How does NTurbo enhance performance for flow-based inspection?

A.

NTurbo offloads traffic to the content processor.

B.

NTurbo creates two inspection sessions on the FortiGate device.

C.

NTurbo buffers the whole file and then sends it to the antivirus engine.

D.

NTurbo creates a special data path to redirect traffic between the IPS engine its ingress and egress interfaces.

Full Access
Question # 21

Refer to the exhibit.

Why did FortiGate drop the packet?

A.

11 matched an explicitly configured firewall policy with the action DENY

B.

It failed the RPF check.

C.

The next-hop IP address is unreachable.

D.

It matched the default implicit firewall policy

Full Access
Question # 22

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)

A.

Manual with load balancing

B.

Lowest Cost (SLA) with load balancing

C.

Best Quality with load balancing

D.

Lowest Quality (SLA) with load balancing

E.

Lowest Cost (SLA) without load balancing

Full Access
Question # 23

Refer to the exhibit showing a FortiGuard connection debug output.

Based on the output, which two facts does the administrator know about the FortiGuard connection? (Choose two.)

A.

One server was contacted to retrieve the contract information.

B.

There is at least one server that lost packets consecutively.

C.

A local FortiManaqer is one of the servers FortiGate communicates with.

D.

FortiGate is using default FortiGuard communication settings.

Full Access
Question # 24

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall policies configuration VIP configuration and IP pool configuration on the FortiGate device

The WAN (port1) interface has the IP address 10.200. l. 1/24 The LAN (port3) interface has the IP address 10.0.1.254/24

The first firewall policy has NAT enabled using the IP pool The second firewall policy is configured with a VIP as the destination address.

Which IP address will be used to source NAT (SNAT) the internet traffic coming from a workstation with the IP address 10.0.1.10?

A.

10.200.1.1

B.

10.200.1.10

C.

10.0.1.254

D.

10.200.1.100

Full Access
Question # 25

An administrator is configuring an IPsec VPN between site A and site В. The Remote Gateway setting in both sites has been configured as Static IP Address.

For site A, the local quick mode selector is 192.168.1.0/24 and the remote quick mode selector is 192.168.2.0/24.

Which subnet must the administrator configure for the local quick mode selector for site B?

A.

192.168.3.0/24

B.

192.168.0.0/8

C.

192.168.2.0/24

D.

192.168.1.0/24

Full Access
Question # 26

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

A.

The host field in the HTTP header.

B.

The server name indication (SNI) extension in the client hello message.

C.

The subject alternative name (SAN) field in the server certificate.

D.

The subject field in the server certificate.

E.

The serial number in the server certificate.

Full Access