Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEMi_Test_PEGT_7_01

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
Mi_Test_PEGT_7_01

Descripción:
Test de Prueba

Autor:
Yo
(Otros tests del mismo autor)

Fecha de Creación:
29/01/2023

Categoría:
Ocio

Número preguntas: 40
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
1. Which three parameters are available to configure SD-WAN rules? (Choose three.) Application signatures. Type of physical link connection. URL categories. Source and destination IP address. Internet service database (ISDB) address object.
2. Refer to the exhibit. What must you configure to enable ADVPN? On the hub VPN, only the device needs additional phase one sett ADVPN should only be enabled on unmanaged FortiGate devices. Each VPN device has a unique pre-shared key configured separately on phase one The protected subnets should be set to address object to all (0.0 .0. 0/0).
3. What are the two minimum configuration requirements for an outgoing interface to be selected once the SD-WAN logical interface is enabled? (Choose two) Specify outgoing interface routing cost. Configure SD-WAN rules interface preference. Select SD-WAN balancing strategy. Specify incoming interfaces in SD-WAN rules.
4. Which two statements about SLA targets and SD-WAN rules are true? (Choose two.) Member metrics are measured only if an SLA target is configured. SLA targets are used only by SD-WAN rules that are configured with Lowest Cost (SLA) or Maximize Bandwidth (SLA) as strategy. When configuring an SD-WAN rule, you can select multiple SLA targets of the same performance SLA. SD-WAN rules use SLA targets to check if the preferred members meet the SLA requirements.
5. Refer to the exhibit. Which statement about the command route-tag in the SD-WAN rule is true? It enables the SD-WAN rule to load balance and assign traffic with a route tag. It tags each route and references the tag in the routing table. It uses route tags for a BGP community and assigns the SD-WAN rules with same tag. It ensures route tags match the SD-WAN rule based on the rule order.
6.Refer to exhibits. Exhibit A shows the source NAT global setting and exhibit B shows the routing table on FortiGate. Based on the exhibits, which two statements about increasing the port2 interface priority to 20 are true? (Choose two.) All the existing sessions that do not use SNAT will be flushed and routed through port1. All the existing sessions will continue to use port2, and new sessions will use port1. All the existing sessions using SNAT will be flushed and routed through port1. All the existing sessions will be blocked from using port1 and port2.
7.Refer to exhibits. Exhibit A, which shows the SD-WAN performance SLA and exhibit B shows the health of the participating SD-WAN members. Based on the exhibits, which statement is correct? The dead member interface stays unavailable until an administrator manually brings the interface back. The SLA state of port2 has exceeded three consecutive unanswered requests from the SLA server. Port2 needs to wait 500 milliseconds to change the status from alive to dead. Check interval is the time to wait before a packet sent by a member interface considered as lost.
8.Refer to exhibits. Exhibit A shows the SD-WAN rules and exhibit B shows the traffic logs. The SD-WAN traffic logs reflect how FortiGate processed traffic. Which two statements about how the configured SD-WAN rules are processing traffic are true? (Choose two.) The implicit rule overrides all other rules because parameters widely cover sources and destinations. SD-WAN rules are evaluated in the same way as firewall policies: from top to bottom. The All_Access_Rules rule load balances Vimeo application traffic among SD-WAN member interfaces. The initial session of an application goes through a learning phase in order to apply the correct rule.
9.Refer to exhibits. Exhibit A shows the performance SLA exhibit B shows the SD-WAN diagnostics output. Based on the exhibits, which statement is correct? Both SD-WAN member interfaces have used separate SLA targets. The SLA state of port1 is dead after five unanswered requests by the SLA servers. Port1 became dead because no traffic was offload through the egress of port1. SD-WAN member interfaces are affected by the SLA state of the inactive interface.
10. Which diagnostic command can you use to show interface-specific SLA logs for the last 10 minutes? diagnose sys sdwan log diagnose sys sdwan health-check diagnose sys sdwan intf-sla-log diagnose sys sdwan sla-log.
11. In the default SD-WAN minimum configuration, which two statements are correct when traffic matches the default implicit SD-WAN rule? (Choose two) Traffic has matched none of the FortiGate policy routes. Matched traffic failed RPF and was caught by the rule. The FIB lookup resolved interface was the SD-WAN interface. An absolute SD-WAN rule was defined and matched traffic.
12. Refer to the exhibits. Exhibit A shows the SD-WAN performance SLA and exhibit B shows the SD-WAN member and the static routes configuration. If port2 is detected dead by FortiGate, which expected behavior is correct? Port2 becomes alive after one successful probe is detected. The SD-WAN interface becomes disabled and port1 becomes the WAN interface. Dead members require manual administrator access to bring them back alive. Subnets 10.0.20.0/23 and 172.20.0.0/16 are reachable only through port1.
13.Refer to exhibits. Exhibit A, which shows the SD-WAN performance SLA and exhibit B shows the health of the participating SD-WAN members. Based on the exhibits, which statement is correct? The dead member interface stays unavailable until an administrator manually brings the interface back. Port2 needs to wait 500 milliseconds to change the status from alive to dead. Static routes using port2 are active in the routing table. FortiGate has not received three consecutive requests from the SLA server configured for port2.
14. Which three performance SLA protocols are available on the FortiGate CLI only? (Choose three.) tcp-echo icmp twamp udp-echo smtp.
15. Refer to the exhibit. Based on output shown in the exhibit, which two commands can be used by SD-WAN rules? (Choose two.) set cost 15. set source 100.64.1.1. set priority 10. set load-balance-mode source-ip-based.
16. Refer to the exhibit. Which statement about the trace evaluation by FortiGate is true? Packets exceeding the configured maximum concurrent connection limit are denied by the per-IP shaper. The packet exceeded the configured bandwidth and was dropped based on the priority configuration. The packet exceeded the configured maximum bandwidth and was dropped by the shared shaper. Packets exceeding the configured concurrent connection limit are dropped based on the priority configuration.
17. Which three protocols are available only on the command line to configure as performance SLA status check? (Choose three.) smtp tcp-echo twamp udp-echo icmp.
18. Refer to the exhibit. Which two statements about the status of the VPN tunnel are true? (Choose two) There are separate virtual interfaces for each dial-up client. VPN static routes are prevented from populating the FortiGate routing table. FortiGate created a single IPsec virtual interface that is shared by all clients. 100.64.3.1 is one of the remote IP address that comes through index interface 1.
19. What is the purpose of a predefined template on the FortiAnalyzer? It can be edited and modified as required. It specifies the report layout which contains predefined texts, charts, and macros. It specifies report settings which contains time period, device selection, and schedule. It contains predefined data to generate mock reports.
20. Which feature enables SD-WAN to combine IPsec VPN dynamic shortcut tunnels between spokes and a static tunnel to the hub? ADVPN. GRE. SSLVPN. OCVPN.
21. Refer to Exhibit: Based on the exhibit, which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules, among the member interfaces? All traffic from a source IP to a destination IP Is sent to the same interface. All traffic from a source IP Is sent to the most used Interface. All traffic from a source IP to a destination IP is sent to the least used interface. All traffic from a source IP is sent to the same interfaces.
22. Refer to the exhibit. Based on the output shown in the exhibit, which two criteria on the SD-WAN member configuration can be used to select an outgoing interface in an SD-WAN rule? (Choose two.) Set priority 10 Set cost 15 Set load-balance-mode source-ip-ip-based Set source 100.64.1.1.
23. Refer to the exhibit. Which two statements about the debug output are true? (Choose two) The debug output shows per-IP shaper values and real-time readings. FortiGate provides statistics and reading based on historical traffic logs. Traffic being controlled by the traffic shaper is under 100 KB/s. This traffic shaper drops traffic that exceeds the set limits.
24. Refer to the exhibit. Which conclusion about the packet debug flow output is correct? The number of concurrent sessions for 10.1.10.1 exceeded the maximum number of concurrent sessions configured in the traffic shaper, and the packet was dropped. The number of concurrent sessions for 10.1.10.1 exceeded the maximum number of concurrent sessions configured in the firewall policy, and the packet was dropped. The packet size exceeded the outgoing interface MTU. The total number of daily sessions for 10.1.10.1 exceeded the maximum number of concurrent sessions configured in the traffic shaper, and the packet was dropped.
25. Which diagnostic command can you use to show the SD-WAN rules interface information and state? diagnose sys sdwan route-tag-list. diagnose sys sdwan service. diagnose sys sdwan member. diagnose sys sdwan neighbor.
26. What are two reasons for using FortiManager to organize and manage the network for a group of FortiGate devices? (Choose two) It simplifies the deployment and administration of SD-WAN on managed FortiGate devices. It improves SD-WAN performance on the managed FortiGate devices. It sends probe signals as health checks to the beacon servers on behalf of FortiGate. It acts as a policy compliance entity to review all managed FortiGate devices. It reduces WAN usage on FortiGate devices by acting as a local FortiGuard server.
27. Refer to exhibits Exhibit A shows the system interface with the static routes and exhibit B shows the firewall policies on the managed FortiGate Based on the FortiGate configuration shown in the exhibits, what are two issues you might encounter when creating an SD-WAN interface on port1 and port2? (Choose two) Member interfaces that are administratively down Member interface that have IP address of 0.0.0.0/0.0.0.0 Member interfaces that are physical interfaces as well as VLAN aggregate, and iPsec interfaces Member interfaces that are referenced by any other configuration element.
28. Refer to the exhibit. Multiple IPsec VPNs are formed between two hub-and-spokes groups, and site-to-site between Hub 1 and Hub 2 The administrator configured ADVPN on the dual regions topology Which two statements are correct if a user in Toronto sends traffic to London? (Choose two) Toronto needs to establish a site-to-site tunnel with Hub 2 to bypass Hub 1. The first packets from Toronto to London are routed through Hub 1 then to Hub 2. London generates an IKE information message that contains the Toronto public IP address. Traffic from Toronto to London triggers the dynamic negotiation of a direct site-to-site VPN.
29. What would best describe the SD-WAN traffic shaping mode that bases itself on a percentage of available bandwidth? Per-IP shaping mode Reverse policy shaping mode Interface-based shaping mode Shared policy shaping mode.
30. Refer to the exhibits. Exhibit A shows the SD-WAN rules and exhibit B shows the traffic logs. The SD-WAN traffic logs reflect how FortiGate distributes traffic. Based on the exhibits, what are two expected behaviors when FortiGate processes SD-WAN traffic? (Choose two.) The first Vimeo session may not match the Vimeo SD-WAN rule because the session is used for the application learning phase. The implicit rule overrides all other rules because parameters widely cover sources and destinations. The Vimeo SD-WAN rule steers Vimeo application traffic among all SD-WAN member interfaces. SD-WAN rules are evaluated in the same way as firewall policies: from top to bottom.
31. Refer to the exhibit. Based on the exhibit, which statement about FortiGate re-evaluating traffic is true? The type of traffic defined and allowed on firewall policy ID 1 is UDP. FortiGate has terminated the session after a change on policy ID 1. Changes have been made on firewall policy ID 1 on FortiGate. Firewall policy ID 1 has source NAT disabled.
32. Refer to the exhibit. FortiGate has multiple dial-up VPN interfaces incoming on port1 that match only FIRST_VPN. Which two configuration changes must be made to both IPsec VPN interfaces to allow incoming connections to match all possible IPsec dial-up interfaces? (Choose two.) Specify a unique peer ID for each dial-up VPN interface. Use different proposals are used between the interfaces. Configure the IKE mode to be aggressive mode. Use unique Diffie Hellman groups on each VPN interface.
33. Which statement defines how a per-IP traffic shaper of 10 Mbps is applied to the entire network? FortiGate allocates each IP address a maximum 10 Mbps of bandwidth. Each IP is guaranteed a minimum 10 Mbps of bandwidth. A single user uses the allocated bandwidth divided by total number of users. The 10 Mbps bandwidth is shared equally among the IP addresses.
34. Which components make up the secure SD-WAN solution? Application, antivirus, and URL, and SSL inspection. Datacenter, branch offices, and public cloud. FortiGate, FortiManager, FortiAnalyzer, and FortiDeploy. Telephone, ISDN, and telecom network.
35. Which statement reflects how BGP tags work with SD-WAN rules? BGP tags match the SD-WAN rule based on the order that these rules were installed. BGP tags require that the adding of static routes be enabled on all ADVPN interfaces. Route tags are used for a BGP community and the SD-WAN rules are assigned the same tag. VPN topologies are formed using only BGP dynamic routing with SD-WAN.
36. FortiGate is connected to the internet and is obtaining the IP address on its egress interface from the DHCP server Which statement is true when FortiGate restarts and receives preconfigured settings to install as part of a zero-touch provisioning process? FortiDeploy connects with FortiGate and provides the initial configuration to contact FortiManager The zero-touch provisioning process completes internally, behind FortiGate FortiManager registers FortiGate after the restart and retrieves the existing configuration The FortiGate cloud key added to the FortiGate cloud portal and FortiGate performs a factory reset before the restart.
37. When attempting to establish an IPsec tunnel to FortiGate, all remote users match the FIRST_VPN IPsec VPN. This includes remote users that want to connect to the SECOND_VPN IPsec VPN. Which two configuration changes must you make on both IPsec VPNs so that remote users can connect to their intended IPsec VPN? (Choose two.) Configure different proposals. Configure a unique peer ID. Change the IKE mode to aggressive. Configure different Diffie Hellman groups.
38. Which two statements about SD-WAN central management are true? (Choose two.) It does not allow you to monitor the status of SD-WAN members. It is enabled or disabled on a per-ADOM basis. It is enabled by default. It uses templates to configure SD-WAN on managed devices.
39. Why is it effective to use SD WAN rules when configuring application control? Because traffic can be load balanced based on application type Because SD-WAIM rules are independent from firewall policies to avoid controlling applications Because you must use certificate full inspection on the firewall policy Because the application database is manually maintained by administrators.
40. Which two tasks about using central VPN management are true? (Choose two.) You can configure full mesh, star, and dial-up VPN topologies. FortiManager installs VPN settings on both managed and external gateways. You configure VPN communities to define common IPsec settings shared by all VPN gateways. You must enable VPN zones for SD-WAN deployments.
Denunciar test Consentimiento Condiciones de uso