option
Cuestiones
ayuda
daypo
buscar.php

TEST BORRADO, QUIZÁS LE INTERESE: Mi_Test_PEGT_02

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
Mi_Test_PEGT_02

Descripción:
Test de Prueba

Autor:
PEGNET
OTROS TESTS DEL AUTOR

Fecha de Creación: 19/09/2022

Categoría: Ocio

Número Preguntas: 60
COMPARTE EL TEST
COMENTARNuevo Comentario
No hay ningún comentario sobre este test.
Temario:
60.Refer to the exhibit to view the application control profile. Users who use Apple FaceTime video conferences are unable to set up meetings. In this scenario, which statement is true? Apple FaceTime belongs to the custom monitored filter. The category of Apple FaceTime is being monitored. Apple FaceTime belongs to the custom blocked filter. The category of Apple FaceTime is being blocked.
61.Exhibit: Refer to the exhibit to view the authentication rule configuration In this scenario, which statement is true? IP-based authentication is enabled. Route-based authentication is enabled. Session-based authentication is enabled. Policy-based authentication is enabled.
62. Which of the following statements correctly describes FortiGates route lookup behavior when searching for a suitable gateway? (Choose two) Lookup is done on the first packet from the session originator. Lookup is done on the last packet sent from the responder. Lookup is done on every packet, regardless of direction. Lookup is done on the trust reply packet from the responder.
63. Which two policies must be configured to allow traffic on a policy-based next-generation firewall (NGFW) FortiGate? (Choose two.) Firewall policy. Policy rule. Security policy. SSL inspection and authentication policy.
64. Which three CLI commands can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.) diagnose sys top. execute ping. execute traceroute. diagnose sniffer packet any. get system arp.
65. Which two statements about IPsec authentication on FortiGate are correct? (Choose two.) For a stronger authentication, you can also enable extended authentication (XAuth) to request the remote peer to provide a username and password FortiGate supports pre-shared key and signature as authentication methods. Enabling XAuth results in a faster authentication because fewer packets are exchanged. A certificate is not required on the remote peer when you set the signature as the authentication method.
66. Which of the following are valid actions for FortiGuard category based filter in a web filter profile ui proxy-based inspection mode? (Choose two.) Warning. Exempt. Allow. Learn.
67. Refer to the exhibit, which contains a session diagnostic output. Which statement is true about the session diagnostic output? The session is a UDP unidirectional state. The session is in TCP ESTABLISHED state. The session is a bidirectional UDP connection. The session is a bidirectional TCP connection.
68. Which two statements are true about collector agent standard access mode? (Choose two.) Standard mode uses Windows convention-NetBios: Domain\Username. Standard mode security profiles apply to organizational units (OU). Standard mode security profiles apply to user groups. Standard access mode supports nested groups.
69. Which two VDOMs are the default VDOMs created when FortiGate is set up in split VDOM mode? (Choose two.) FG-traffic. Mgmt. FG-Mgmt. Root.
70. An administrator needs to increase network bandwidth and provide redundancy. What interface type must the administrator select to bind multiple FortiGate interfaces? VLAN interface. Software Switch interface. Aggregate interface. Redundant interface.
71. Which CLI command will display sessions both from client to the proxy and from the proxy to the servers? diagnose wad session list diagnose wad session list | grep hook-pre&&hook-out diagnose wad session list | grep hook=pre&&hook=out diagnose wad session list | grep "hook=pre"&"hook=out".
72. Which three criteria can a FortiGate use to look for a matching firewall policy to process traffic? (Choose three.) Source defined as Internet Services in the firewall policy. Destination defined as Internet Services in the firewall policy. Highest to lowest priority defined in the firewall policy. Services defined in the firewall policy. Lowest to highest policy ID number.
73. Which statements best describe auto discovery VPN (ADVPN). (Choose two.) It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes. ADVPN is only supported with IKEv2. Tunnels are negotiated dynamically between spokes. Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2 proposals are defined in advance.
74. An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.) The interface has been configured for one-arm sniffer. The interface is a member of a virtual wire pair. The operation mode is transparent. The interface is a member of a zone. Captive portal is enabled in the interface.
75. NGFW mode allows policy-based configuration for most inspection rules. Which security profile’s configuration does not change when you enable policy-based inspection? Web filtering. Antivirus. Web proxy. Application control.
76. Refer to the exhibit, which contains a static route configuration. An administrator created a static route for Amazon Web Services. What CLI command must the administrator use to view the route? get router info routing-table all. get internet service route list. get router info routing-table database. diagnose firewall proute list.
77. Refer to the exhibit to view the application control profile. Based on the configuration, what will happen to Apple FaceTime? Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration. Apple FaceTime will be allowed, based on the Apple filter configuration. Apple FaceTime will be allowed only if the filter in Application and Filter Overrides is set to Learn. Apple FaceTime will be allowed, based on the Categories configuration.
78. Examine the following web filtering log. Which statement about the log message is true? The action for the category Games is set to block. The usage quota for the IP address 10.0.1.10 has expired. The name of the applied web filter profile is default. The web site miniclip.com matches a static URL filter whose action is set to Warning.
79. You have enabled logging on your FortiGate device for Event logs and all Security logs, and you have set up logging to use the FortiGate local disk. What is the default behavior when the local disk is full? Logs are overwritten and the only warning is issued when log disk usage reaches the threshold of 95%. No new log is recorded until you manually clear logs from the local disk. Logs are overwritten and the first warning is issued when log disk usage reaches the threshold of 75%. No new log is recorded after the warning is issued when log disk usage reaches the threshold of 95%.
80. A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors. What is the reason for the certificate warning errors? The browser requires a software update. FortiGate does not support full SSL inspection when web filtering is enabled. The CA certificate set on the SSL/SSH inspection profile has not been imported into the browser. There are network connectivity issues.
81. What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode? It limits the scope of application control to the browser-based technology category only. It limits the scope of application control to scan application traffic based on application category only. It limits the scope of application control to scan application traffic using parent signatures only It limits the scope of application control to scan application traffic on DNS protocol only.
82. Which two statements ate true about the Security Fabric rating? (Choose two.) It provides executive summaries of the four largest areas of security focus. Many of the security issues can be fixed immediately by clicking Apply where available. The Security Fabric rating must be run on the root FortiGate device in the Security Fabric. The Security Fabric rating is a free service that comes bundled with alt FortiGate devices.
83.Refer to the exhibit. The exhibits show a network diagram and the explicit web proxy configuration. In the command diagnose sniffer packet, what filter can you use to capture the traffic between the client and the explicit web proxy? ‘host 192.168.0.2 and port 8080’. ‘host 10.0.0.50 and port 80’. ‘host 192.168.0.1 and port 80’. ‘host 10.0.0.50 and port 8080’.
84. What inspection mode does FortiGate use if it is configured as a policy-based next-generation firewall (NGFW)? Full Content inspection. Proxy-based inspection. Certificate inspection. Flow-based inspection.
85. In an explicit proxy setup, where is the authentication method and database configured? Proxy Policy. Authentication Rule. Firewall Policy. Authentication scheme.
86. An administrator must disable RPF check to investigate an issue. Which method is best suited to disable RPF without affecting features like antivirus and intrusion prevention system? Enable asymmetric routing, so the RPF check will be bypassed. Disable the RPF check at the FortiGate interface level for the source check. Disable the RPF check at the FortiGate interface level for the reply check. Enable asymmetric routing at the interface level.
87. Examine the IPS sensor and DoS policy configuration shown in the exhibit, then answer the question below. When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first? SMTP.Login.Brute.Force IMAP.Login.brute.Force ip_src_session Location: server Protocol: SMTP.
88. An administrator needs to configure VPN user access for multiple sites using the same soft FortiToken. Each site has a FortiGate VPN gateway. What must an administrator do to achieve this objective? The administrator can register the same FortiToken on more than one FortiGate. The administrator must use a FortiAuthenticator device. The administrator can use a third-party radius OTP server. The administrator must use the user self-registration server.
89. If the Issuer and Subject values are the same in a digital certificate, which type of entity was the certificate issued to? A CRL. A person. A subordinate CA. A root CA.
90. Which of the following are purposes of NAT traversal in IPsec? (Choose two.) To detect intermediary NAT devices in the tunnel path. To dynamically change phase 1 negotiation mode aggressive mode. To encapsulation ESP packets in UDP packets using port 4500. To force a new DH exchange with each phase 2 rekey.
91. Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.) Log downloads from the GUI are limited to the current filter view. Log backups from the CLI cannot be restored to another FortiGate. Log backups from the CLI can be configured to upload to FTP as a scheduled time Log downloads from the GUI are stored as LZ4 compressed files.
92. Refer to the exhibit. A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 fails to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match. Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes will bring phase 1 up? (Choose two.) On HQ-FortiGate, set IKE mode to Main (ID protection). On both FortiGate devices, set Dead Peer Detection to On Demand. On HQ-FortiGate, disable Diffie-Helman group 2. On Remote-FortiGate, set port2 as Interface.
93. An administrator has a requirement to keep an application session from timing out on port 80. What two changes can the administrator make to resolve the issue without affecting any existing services running through FortiGate? (Choose two.) Create a new firewall policy with the new HTTP service and place it above the existing HTTP policy. Create a new service object for HTTP service and set the session TTL to never. Set the TTL value to never under config system-ttl. Set the session TTL on the HTTP policy to maximum.
94. What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode? It limits the scanning of application traffic to the DNS protocol only. It limits the scanning of application traffic to use parent signatures only. It limits the scanning of application traffic to the browser-based technology category only. It limits the scanning of application traffic to the application category only.
95. If Internet Service is already selected as Source in a firewall policy, which other configuration objects can be added to the Source filed of a firewall policy? IP address. Once Internet Service is selected, no other object can be added. User or User Group. FQDN address.
96. Which scanning technique on FortiGate can be enabled only on the CLI? Heuristics scan. Trojan scan. Antivirus scan. Ransomware scan.
97. Refer to the exhibit. The exhibit contains a network interface configuration, firewall policies, and a CLI console configuration. How will FortiGate handle user authentication for traffic that arrives on the LAN interface? If there is a full-through policy in place, users will not be prompted for authentication. Users from the Sales group will be prompted for authentication and can authenticate successfully with the correct credentials. Authentication is enforced at a policy level; all users will be prompted for authentication. Users from the HR group will be prompted for authentication and can authenticate successfully with the correct credentials.
98. Refer to the exhibit to view the firewall policy. Which statement is correct if well-known viruses are not being blocked? The firewall policy does not apply deep content inspection. The firewall policy must be configured in proxy-based inspection mode. The action on the firewall policy must be set to deny. Web filter should be enabled on the firewall policy to complement the antivirus profile.
99. Which two statements are true about the RPF check? (Choose two.) The RPF check is run on the first sent packet of any new session. The RPF check is run on the first reply packet of any new session. The RPF check is run on the first sent and reply packet of any new session. RPF is a mechanism that protects FortiGate and your network from IP spoofing attacks.
100. Refer to the exhibit. The exhibit contains a network diagram, firewall policies, and a firewall address object configuration. An administrator created a Deny policy with default settings to deny Webserver access for Remote- user2. Remote-user2 is still able to access Webserver. Which two changes can the administrator make to deny Webserver access for Remote-User2? (Choose two.) Disable match-vip in the Deny policy. Set the Destination address as Deny_IP in the Allow-access policy. Enable match vip in the Deny policy. Set the Destination address as Web_server in the Deny policy.
101. How do you format the FortiGate flash disk? Load a debug FortiOS image. Load the hardware test (HQIP) image. Execute the CLI command execute formatlogdisk. Select the format boot device option from the BIOS menu.
102. The HTTP inspection process in web filtering follows a specific order when multiple features are enabled in the web filter profile. What order must FortiGate use when the web filter profile has features enabled, such as safe search? DNS-based web filter and proxy-based web filter. Static URL filter, FortiGuard category filter, and advanced filters. Static domain filter, SSL inspection filter, and external connectors filters. FortiGuard category filter and rating filter.
103. Which three methods are used by the collector agent for AD polling? (Choose three.) FortiGate polling. NetAPI. Novell API. WMI. WinSecLog.
104. Which two statements are true about collector agent advanced mode? (Choose two.) Advanced mode uses Windows convention—NetBios: Domain\Username. FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate. Advanced mode supports nested or inherited groups. Security profiles can be applied only to user groups, not individual users.
105.Refer to the exhibit. The exhibit shows proxy policies and proxy addresses, the authentication rule and authentication scheme, users, and firewall address. An explicit web proxy is configured for subnet range 10.0.1.0/24 with three explicit web proxy policies. The authentication rule is configured to authenticate HTTP requests for subnet range 10.0.1.0/24 with a form-based authentication scheme for the FortiGate local user database. Users will be prompted for authentication. How will FortiGate process the traffic when the HTTP request comes from a machine with the source IP 10.0.1.10 to the destination http://www.fortinet.com? (Choose two.) If a Mozilla Firefox browser is used with User-B credentials, the HTTP request will be allowed. If a Google Chrome browser is used with User-B credentials, the HTTP request will be allowed. If a Mozilla Firefox browser is used with User-A credentials, the HTTP request will be allowed. If a Microsoft Internet Explorer browser is used with User-B credentials, the HTTP request will be allowed.
106. Refer to the exhibit. Based on the administrator profile settings, what permissions must the administrator set to run the diagnose firewall auth list CLI command on FortiGate? Custom permission for Network. Read/Write permission for Log & Report. CLI diagnostics commands permission. Read/Write permission for Firewall.
108. Examine this FortiGate configuration: How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires authorization? It always authorizes the traffic without requiring authentication. It drops the traffic. It authenticates the traffic using the authentication scheme SCHEME2. It authenticates the traffic using the authentication scheme SCHEME1.
109. Which three statements about security associations (SA) in IPsec are correct? (Choose three.) Phase 2 SAs are used for encrypting and decrypting the data exchanged through the tunnel. An SA never expires. A phase 1 SA is bidirectional, while a phase 2 SA is directional. Phase 2 SA expiration can be time-based, volume-based, or both. Both the phase 1 SA and phase 2 SA are bidirectional.
110. In consolidated firewall policies, IPv4 and IPv6 policies are combined in a single consolidated policy. Instead of separate policies. Which three statements are true about consolidated IPv4 and IPv6 policy configuration? (Choose three.) The IP version of the sources and destinations in a firewall policy must be different. The Incoming Interface. Outgoing Interface. Schedule, and Service fields can be shared with both IPv4 and IPv6. The policy table in the GUI can be filtered to display policies with IPv4, IPv6 or IPv4 and IPv6 sources and destinations. The IP version of the sources and destinations in a policy must match. The policy table in the GUI will be consolidated to display policies with IPv4 and IPv6 sources and destinations.
111. Which of the following SD-WAN load –balancing method use interface weight value to distribute traffic? (Choose two.) Source IP. Spillover. Volume. Session.
112. Examine the network diagram shown in the exhibit, then answer the following question: Which one of the following routes is the best candidate route for FGT1 to route traffic from the Workstation to the Web server? 172.16.0.0/16 [50/0] via 10.4.200.2, port2 [5/0] 0.0.0.0/0 [20/0] via 10.4.200.2, port2 10.4.200.0/30 is directly connected, port2 172.16.32.0/24 is directly connected, port1.
113. Refer to the exhibit. In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output as shown in the exhibit. What should the administrator do next to troubleshoot the problem? Run a sniffer on the web server. Capture the traffic using an external sniffer connected to port1. Execute another sniffer in the FortiGate, this time with the filter “host 10.0.1.10” Execute a debug flow.
114. Examine this PAC file configuration. Which of the following statements are true? (Choose two.) Browsers can be configured to retrieve this PAC file from the FortiGate. Any web request to the 172.25.120.0/24 subnet is allowed to bypass the proxy. All requests not made to Fortinet.com or the 172.25.120.0/24 subnet, have to go through altproxy.corp.com: 8060. Any web request fortinet.com is allowed to bypass the proxy.
115. A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added to the physical interface. Which statements about the VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different subnets. The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different subnets. The two VLAN sub interfaces must have different VLAN IDs. The two VLAN sub interfaces can have the same VLAN ID, only if they belong to different VDOMs. The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in the same subnet.
116. View the exhibit. Which of the following statements are correct? (Choose two.) This setup requires at least two firewall policies with the action set to IPsec. Dead peer detection must be disabled to support this type of IPsec setup. The Tunnel B route is the primary route for reaching the remote site. The Tunnel A route is used only if the Tunnel B VPN is down. This is a redundant IPsec setup.
117. Why does FortiGate keep TCP sessions in the session table for some seconds even after both sides (client and server) have terminated the session? To remove the NAT operation. To generate logs. To finish any inspection operations. To allow for out-of-order packets that could arrive after the FIN/ACK packets.
118. Which two statements are true when FortiGate is in transparent mode? (Choose two.) By default, all interfaces are part of the same broadcast domain. The existing network IP schema must be changed when installing a transparent mode. Static routes are required to allow traffic to the next hop. FortiGate forwards frames without changing the MAC address.
119. To complete the final step of a Security Fabric configuration, an administrator must authorize all the devices on which device? FortiManager. Root FortiGate. FortiAnalyzer. Downstream FortiGate.
120.View the exhibit. A user behind the FortiGate is trying to go to http://www.addictinggames.com (Addicting Games). Based on this configuration, which statement is true? Addicting.Games is allowed based on the Application Overrides configuration. Addicting.Games is blocked on the Filter Overrides configuration. Addicting.Games can be allowed only if the Filter Overrides actions is set to Exempt. Addcting.Games is allowed based on the Categories configuration.
Denunciar Test