Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Fortinet FCSS_EFW_AD-7.6 Dumps

Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Questions and Answers

Question 1

Refer to the exhibit, which shows the ADVPN network topology and partial BGP configuration.

as

as

Which two parameters must an administrator configure in the config neighbor range for spokes shown in the exhibit? (Choose two.)

Options:

A.

set max-neighbor-num 2

B.

set neighbor-group advpn

C.

set route-reflector-client enable

D.

set prefix 172.16.1.0 255.255.255.0

Question 2

Which two recommendations prevent invalid paths when using zero phase 2 selectors?

Options:

A.

Routing protocols

B.

Exact selectors

C.

Aggregate IPsec

D.

Assign tunnel IP

Question 3

Refer to the exhibit.

A pre-run CLI template that is used in zero-touch provisioning (ZTP) and low-touch provisioning (LTP) with FortiManager is shown.

as

The template is not assigned even though the configuration has already been installed on FortiGate.

What is true about this scenario?

Options:

A.

The administrator did not assign the template correctly when adding the model device because pre-CLI templates remain permanently assigned to the firewall

B.

Pre-run CLI templates are automatically unassigned after their initial installation

C.

Pre-run CLI templates for ZTP and LTP must be unassigned manually after the first installation to avoid conflicting error objects when importing a policy package

D.

The administrator must use post-run CLI templates that are designed for ZTP and LTP

Question 4

Refer to the exhibit, which shows a partial troubleshooting command output.

An administrator is extensively using IPsec on FortiGate. Many tunnels show information similar to the output shown in the exhibit.

What can the administrator conclude?

Options:

A.

IPsec SAs cannot be offloaded.

B.

The two IPsec SAs, inbound and outbound, are copied to the NPU.

C.

Only the outbound IPsec SA is copied to the NPU.

D.

Only the inbound IPsec SA is copied to the NPU.

Question 5

Which two statements about the LAN interface connection are correct?

Options:

A.

802.3ad

B.

SD-WAN

C.

FortiLink

D.

Enable STP

Question 6

Refer to the exhibit.

A LAN interface connected from FortiGate to two FortiSwitch devices is shown.

Which two statements about the LAN interface connection shown in the exhibit are correct? (Choose two.)

Options:

A.

The LAN interface must use an 802.3ad type interface.

B.

FortiGate is using an SD-WAN-type interface to connect to one FortiSwitch device with MCLAG.

C.

The connection is using a FortiLink interface.

D.

You must enable Spanning Tree Protocol (STP) or Rapid STP (RSTP) on FortiGate and FortiSwitch to avoid layer 2 loopbacks.

Question 7

Refer to the exhibits.

as

as

The Administrators section of a root FortiGate device and the Security Fabric Settings section of a downstream FortiGate device are shown.

When prompted to sign in with Security Fabric in the downstream FortiGate device, a user enters the AdminSSO credentials.

What is the next status for the user?

Options:

A.

The user is prompted to create an SSO administrator account for AdminSSO.

B.

The user receives an authentication failure message.

C.

The user accesses the downstream FortiGate with super_admin_readonly privileges.

D.

The user accesses the downstream FortiGate with super_admin privileges.

Question 8

Refer to the exhibits. The exhibits show a network topology, a firewall policy, and an SSL/SSH inspection profile configuration.

as

Why is FortiGate unable to detect HTTPS attacks on firewall policy ID 3 targeting the Linux server?

Options:

A.

The administrator must set the policy to inspection mode to analyze the HTTPS packets as expected.

B.

The administrator must enable HTTPS in the protocol port mapping of the deep- inspection SSL/SSH inspection profile.

C.

The administrator must enable SSL inspection of the SSL server and upload the certificate of the Linux server website to the SSL/SSH inspection profile.

D.

The administrator must enable cipher suites in the SSL/SSH inspection profile to decrypt the message.

Question 9

Refer to the exhibit.

The routing tables of FortiGate_A and FortiGate_B are shown. FortiGate_A and FortiGate_B are in the same autonomous system.

The administrator wants to dynamically add only route 172.16.1.248/30 on FortiGate_A.

What must the administrator configure?

Options:

A.

The prefix 172.16.1.248/30 in the BGP Networks section on FortiGate_B

B.

A BGP route map out for 172.16.1.248/30 on FortiGate_B

C.

Enable Redistribute Connected in the BGP section on FortiGate_B.

D.

A BGP route map in for 172.16.1.248/30 on FortiGate_A

Question 10

How can FortiGate analyze HTTPS traffic on non-standard port 8443?

Options:

A.

Proxy mode

B.

TLS 1.2

C.

Add 443 and 8443 mapping

D.

Enable IPS

Question 11

Which two features can you use to segment an enterprise network?

Options:

A.

IPsec

B.

ZTNA

C.

VDOM

D.

VLAN

Question 12

Refer to the exhibits.

as

The configuration of a user ' s Windows PC, which has a default MTU of 1500 bytes, along with FortiGate interfaces set to an MTU of 1000 bytes, and the results of PC1 pinging server 172.16.0.254 are shown.

Why is the user in Windows PC1 unable to ping server 172.16.0.254 and is seeing the message: Packet needs to be fragmented but DF set?

Options:

A.

Option ip.flags.mf must be set to enable on FortiGate. The user has to adjust the ping MTU to 1000 to succeed.

B.

Fragmented packets must be encrypted. To connect any application successfully, the user must install the Fortinet_CA certificate in the Microsoft Management Console.

C.

FortiGate honors the do not fragment bit and the packets are dropped. The user has to adjust the ping MTU to 972 to succeed.

D.

The user must trigger different traffic because path MTU discovery techniques do not recognize ICMP payloads.

Question 13

The IT department discovered during the last network migration that all zero phase selectors in phase 2 IPsec configurations impacted network operations.

What are two valid approaches to prevent this during future migrations? (Choose two.)

Options:

A.

Use routing protocols to specify allowed subnets over the tunnel.

B.

Configure an IPsec-aggregate to create redundancy between each firewall peer.

C.

Clearly indicate to the VPN which segments will be encrypted in the phase two selectors.

D.

Configure an IP address on the IPsec interface of each firewall to establish unique peer connections and avoid impacting network operations.

Question 14

An administrator is setting up an ADVPN configuration and wants to ensure that peer IDs are not exposed during VPN establishment.

Which protocol can the administrator use to enhance security?

Options:

A.

Use IKEv2, which encrypts peer IDs and prevents exposure.

B.

Opt for SSL VPN web mode because it does not use peer IDs at all.

C.

Choose IKEv1 aggressive mode because it simplifies peer identification.

D.

Stick with IKEv1 main mode because it offers better performance.

Question 15

How can you ensure the corporate FortiGate learns the 192.168.1.0/24 network?

Options:

A.

Add static route

B.

Enable RIP

C.

Implement OSPF over IPsec

D.

Add network locally

Question 16

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

The administrator must configure the BGP section of FortiGate A to give internet access to the enterprise network.

Which command must the administrator use to establish a connection with the internet service provider?

Options:

A.

config neighbor

B.

config redistribute bgp

C.

config router route-map

D.

config redistribute ospf

Question 17

Why does FortiGate_B not show ICMP sessions when running: get system session list | grep icmp in an FGSP cluster?

Options:

A.

session-pickup is disabled

B.

session-pickup-connectionless is disabled

C.

FGSP is misconfigured

D.

ICMP is unsupported

Question 18

Which two statements about IKEv2 are true if an administrator decides to implement IKEv2 in the VPN topology? (Choose two.)

Options:

A.

It includes stronger Diffie-Hellman (DH) groups, such as Elliptic Curve (ECP) groups.

B.

It supports interoperability with devices using IKEv1.

C.

It exchanges a minimum of two messages to establish a secure tunnel.

D.

It supports the extensible authentication protocol (EAP).

Question 19

You are using Virtual eXtensible LAN (VXLAN) extensively on FortiGate. Which specialized acceleration hardware must you use to improve FortiGate performance? (Choose one answer)

Options:

A.

NP7

B.

SP5

C.

СР9

D.

NTurbo

Question 20

How does configuring tcp-mss-sender and tcp-mss-receiver affect TCP packets?

Options:

A.

Header

B.

Payload

C.

Allow

D.

Fragment

Question 21

Refer to the exhibits.

The routing tables of FortiGate_A and FortiGate_B, and a network topology are shown.

Why does FortiGate_B have only one external route available to 100.75.5.1/32?

Options:

A.

rf c-1583-compatible is not set to enable on FortiGate_B.

B.

The subnet 10.0.11.0/24 is not located in the FortiGate_B area.

C.

FortiGate_A advertises only one external route to FortiGate_B

D.

The route to 100.75.5.1/32 shown on FortiGate B has the lowest cost.

Question 22

To secure your enterprise network traffic, which step does FortiGate perform first, when handling the first packets of a session? (Choose one answer)

Options:

A.

Installation of the session key in the network processor (NP)

B.

Decryption

C.

A reverse path forwarding (RPF) check

D.

IP integrity header checking

Question 23

Refer to the exhibit, which shows a command output.

as

FortiGate_A and FortiGate_B are members of an FGSP cluster in an enterprise network.

While testing the cluster using the ping command, the administrator monitors packet loss and found that the session output on FortiGate_B is as shown in the exhibit.

What could be the cause of this output on FortiGate_B?

Options:

A.

The session synchronization is encrypted.

B.

session-pickup-connectionless is set to disable on FortiGate_B.

C.

FortiGate_B is configured in passive mode.

D.

FortiGate_A and FortiGate_B have the same standalone-group-id value.

Question 24

Which two approaches facilitate efficient ADVPN deployment?

Options:

A.

VPN Manager enable

B.

Best link only

C.

Loopback

D.

IPsec templates

Question 25

Which action should you take after applying a block-all IPS profile that caused applications to stop working?

Options:

A.

Disable IPS

B.

Use monitor mode

C.

Enable flow mode

D.

Remove server targets

Question 26

Refer to the exhibit, which contains a partial command output.

as

The administrator has configured BGP on FortiGate. The status of this new BGP configuration is shown in the exhibit.

What configuration must the administrator consider next?

Options:

A.

Configure a static route to 100.65.4.1.

B.

Configure the local AS to 65300.

C.

Contact the remote peer administrator to enable BGP

D.

Enable ebgp-enforce-multihop.

Question 27

Refer to the exhibit.

A FortiGate segmented into VDOMs is shown. You must ensure effective and accelerated internet access for all of the VDOMs in this enterprise network. How can you achieve this? (Choose one answer)

Options:

A.

Connect a physical interface from each VDOM to the root VDOM.

B.

Create VDOM links.

C.

Configure network processing unit (NPU) vlinks.

D.

Create VLANs over network processing unit (NPU) vlinks.

Question 28

An administrator wants to scale the IBGP sessions and optimize the routing table in an IBGP network.

Which parameter should the administrator configure?

Options:

A.

network-import-check

B.

ibgp-enforce-multihop

C.

neighbor-group

D.

route-reflector-client

Question 29

What is the initial step performed by FortiGate when handling the first packets of a session?

Options:

A.

Installation of the session key in the network processor (NP)

B.

Data encryption and decryption

C.

Security inspections such as ACL, HPE, and IP integrity header checking

D.

Offloading the packets directly to the content processor (CP)

Question 30

What must be done for RIP routes to propagate into OSPF?

Options:

A.

Enable on FortiGate_A

B.

Enable on FortiGate_B

C.

Disable RIP

D.

Static route

Question 31

Refer to the exhibit, which shows the FortiGuard Distribution Network of a FortiGate device.

FortiGuard Distribution Network on FortiGate

as

An administrator is trying to find the web filter database signature on FortiGate to resolve issues with websites not being filtered correctly in a flow-mode web filter profile.

Why is the web filter database version not visible on the GUI, such as with IPS definitions?

Options:

A.

The web filter database is stored locally, but the administrator must run over CLI diagnose autoupdate versions.

B.

The web filter database is stored locally on FortiGate, but it is hidden behind the GUI. It requires enabling debug mode to make it visible.

C.

The web filter database is not hosted on FortiGate: FortiGate queries FortiGuard or FortiManager for web filter ratings on demand.

D.

The web filter database is only accessible after manual syncing with a valid FDS server using diagnose test update info.

Question 32

What does the command set forward-domain < domain_ID > in a transparent VDOM interface do?

Options:

A.

It configures the interface to prioritize traffic based on the domain ID, enhancing quality of service for specified VLANs.

B.

It isolates traffic within a specific VLAN by assigning a broadcast domain to an interface based on the VLAN ID.

C.

It restricts the interface to managing traffic only from the specified VLAN, effectively segregating network traffic.

D.

It assigns a unique domain ID to the interface, allowing it to operate across multiple VLANs within the same VDOM.

Question 33

A vulnerability scan report has revealed that a user has generated traffic to the website example.com (10.10.10.10) using a weak SSL/TLS version supported by the HTTPS web server.

What can the firewall administrator do to block all outdated SSL/TLS versions on any HTTPS web server to prevent possible attacks on user traffic?

Options:

A.

Configure the unsupported SSL version and set the minimum allowed SSL version in the HTTPS settings of the SSL/SSH inspection profile.

B.

Enable auto-detection of outdated SSL/TLS versions in the SSL/SSH inspection profile to block vulnerable websites.

C.

Install the required certificate in the client ' s browser or use Active Directory policies to block specific websites as defined in the SSL/SSH inspection profile.

D.

Use the latest certificate, Fortinet_SSL_ECDSA256, and replace the CA certificate in the SSL/SSH inspection profile.

Page: 1 / 11
Total 113 questions