Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

FCSS_EFW_AD-7.4 Questions and Answers

Question # 6

What action can be taken on a FortiGate to block traffic using IPS protocol decoders, focusing on network transmission patterns and application signatures?

A.

Use the DNS filter to block application signatures and protocol decoders.

B.

Use application control to limit non-URL-based software handling.

C.

Enable application detection-based SD-WAN rules.

D.

Configure a web filter profile in flow mode.

Full Access
Question # 7

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.

The ISDB limits access by URL and domain.

Full Access
Question # 8

Refer to the exhibit, which shows a revision history window in the FortiManager device layer.

The IT team is trying to identify the administrator responsible for the most recent update in the FortiGate device database.

Which conclusion can you draw about this scenario?

A.

This retrieved process was automatically triggered by a Remote FortiGate Directly (via CLI) script.

B.

The user script_manager is an API user from the Fortinet Developer Network (FDN) retrieving a configuration.

C.

To identify the user who created the event, check it on the Configuration and Installation widget on FortiGate within the FortiManager device layer.

D.

Find the user in the FortiManager system logs and use the type=script command to find the administrator user in the user field.

Full Access
Question # 9

Refer to the exhibits. The exhibits show a network topology, a firewall policy, and an SSL/SSH inspection profile configuration.

Why is FortiGate unable to detect HTTPS attacks on firewall policy ID 3 targeting the Linux server?

A.

The administrator must set the policy to inspection mode to analyze the HTTPS packets as expected.

B.

The administrator must enable HTTPS in the protocol port mapping of the deep- inspection SSL/SSH inspection profile.

C.

The administrator must enable SSL inspection of the SSL server and upload the certificate of the Linux server website to the SSL/SSH inspection profile.

D.

The administrator must enable cipher suites in the SSL/SSH inspection profile to decrypt the message.

Full Access
Question # 10

A company's guest internet policy, operating in proxy mode, blocks access to Artificial Intelligence Technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.

Which configuration changes are required for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443 when full SSL inspection is active in the guest policy?

A.

Add a URL wildcard domain to the website CA certificate and use it in the SSL/SSH Inspection Profile.

B.

In the Protocol Port Mapping section of the SSL/SSH Inspection Profile, enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports.

C.

To analyze nonstandard ports in web filter profiles, use TLSv1.3 in the SSL/SSH Inspection Profile.

D.

Administrators can block traffic on nonstandard ports by enabling the SNI check in the SSL/SSH Inspection Profile.

Full Access
Question # 11

Refer to the exhibit, which shows a network diagram.

An administrator would like to modify the MED value advertised from FortiGate_1 to a BGP neighbor in the autonomous system 30.

What must the administrator configure on FortiGate_1 to implement this?

A.

route-map-out

B.

network-import-check

C.

prefix-list-out

D.

distribute-list-out

Full Access
Question # 12

An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.

What two conclusions can the administrator draw? (Choose two.)

A.

The suspicious packet is related to a cluster that has VDOMs enabled.

B.

The network includes FortiGate devices configured with the FGSP protocol.

C.

The suspicious packet is related to a cluster with a group-id value lower than 255.

D.

The suspicious packet corresponds to port 7 on a FortiGate device.

Full Access
Question # 13

Refer to the exhibit, which shows the HA status of an active-passive cluster.

An administrator wants FortiGate_B to handle the Core2 VDOM traffic.

Which modification must the administrator apply to achieve this?

A.

The administrator must disable override on FortiGate_A.

B.

The administrator must change the priority from 100 to 160 for FortiGate_B.

C.

The administrator must change the load balancing method on FortiGate_B.

D.

The administrator must change the priority from 128 to 200 for FortiGate_B.

Full Access
Question # 14

Refer to the exhibit, which shows a network diagram showing the addition of site 2 with an overlapping network segment to the existing VPN IPsec connection between the hub and site 1.

Which IPsec phase 2 configuration must an administrator make on the FortiGate hub to enable equal-cost multi-path (ECMP) routing when multiple remote sites connect with overlapping subnets?

A.

Set route-overlap to either use-new or use-old

B.

Set net-device to ecmp

C.

Set single-source to enable

D.

Set route-overlap to allow

Full Access
Question # 15

An administrator received a FortiAnalyzer alert that a 1 ТВ disk filled up in a day. Upon investigation, they found thousands of unusual DNS log requests, such as JHCMQK.website.com, with no answers. They later discovered that DNS exfiltration was occurring through both UDP and TLS.

How can the administrator prevent this data theft technique?

A.

Create an inline-CASB to protect against DNS exfiltration.

B.

Configure a File Filter profile to prevent DNS exfiltration.

C.

Enable DNS Filter to protect against DNS exfiltration.

D.

Use an IPS profile and DNS exfiltration-related signatures.

Full Access
Question # 16

Refer to the exhibit, which shows a partial troubleshooting command output.

An administrator is extensively using IPsec on FortiGate. Many tunnels show information similar to the output shown in the exhibit.

What can the administrator conclude?

A.

IPsec SAs cannot be offloaded.

B.

The two IPsec SAs, inbound and outbound, are copied to the NPU.

C.

Only the outbound IPsec SA is copied to the NPU.

D.

Only the inbound IPsec SA is copied to the NPU.

Full Access
Question # 17

Refer to the exhibit, which contains a partial command output.

The administrator has configured BGP on FortiGate. The status of this new BGP configuration is shown in the exhibit.

What configuration must the administrator consider next?

A.

Configure a static route to 100.65.4.1.

B.

Configure the local AS to 65300.

C.

Contact the remote peer administrator to enable BGP

D.

Enable ebgp-enforce-multihop.

Full Access