Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEMi_Test_PEGT_7_02

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
Mi_Test_PEGT_7_02

Descripción:
Test de Prueba

Autor:
Yo
(Otros tests del mismo autor)

Fecha de Creación:
10/02/2023

Categoría:
Ocio

Número preguntas: 40
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
41. Refer to the exhibit Based on the exhibit, which two statements about existing sessions on FortiGate after a firewall policy change, are true? (Choose two.) The old sessions terminate after a policy change. Existing sessions remain unchanged after a policy change. All sessions are flushed by FortiGate after a policy change. FortiGate re-evaluates new packets after a policy change.
42. What are two reasons why it is effective to implement the internet service database (ISDB) in an SD- WAN rule? (Choose two) The ISDB is dynamically updated and reduces administrative overhead. The ISDB applies rules to traffic from specific sources, based on application type. The ISDB requires application control to maintain signatures and perform load-balancing. The ISDB contains the IP addresses and port ranges of well-known destinations.
43. Which statement about using BGP routes in SD-WAN is true? Adding static routes must be enabled on all ADVPN interfaces. VPN topologies must be form using only BGP dynamic routing with SD-WAN Learned routes can be used as dynamic destinations in SD-WAN rules Dynamic routing protocols can be used only with non-encrypted traffic.
44. An administrator is troubleshooting VoIP quality issues that occur when calling external phone numbers The SD-WAN interface on the edge FortiGate is configured with the default settings, and is using two upstream links One link has random jitter and latency issues and is based on a wireless connection. Which two actions must the administrator apply simultaneously on the edge FortiGate to improve VoIP quality using SD_WAN rules? (Choose two.) Select the corresponding SD-WAN balancing strategy in the SD-WAN rule. Choose the suitable interface based on the interface cost and weight. Use the performance SLA targets to detect latency and jitter instantly. Place the troublesome link at the top of the interface preference list. Configure an SD-WAN rule to load balance all traffic without VoIP.
45. Which two interfaces are considered overlay links? (Choose two.) IPsec Physical LAG GRE.
46.Refer to the exhibit Which statement about the ADVPN device role in handling traffic is true? Two spokes 100.64.3.1 and 10.1.2. 254 forward their queries to their hubs This is a hub that has received a query from a spoke and has forwarded it to another spoke This is a spoke that has received a query from a remote hub and has forwarded the response to its hub Two hubs. 10.1.1.254 and 10.1.2.254, are receiving and forwarding queries between each other.
47. Which statement is correct about the SD-WAN and ADVPN? ADVPN interface can be a member of SD-WAN interface. Dynamic VPN is not supported as an SD-Wan interface. Spoke support dynamic VPN as a static interface. Hub FortiGate is limited to use ADVPN as SD-WAN member interface.
48. Which two reasons make forward error correction (FEC) ideal to enable in a phase one VPN interface? (Choose two) FEC transmits the original payload in full to recover the error in transmission. FEC improves reliability which overcomes adverse WAN conditions such as noisy links. FEC is useful to increase speed at which traffic is routed through IPsec tunnels. FEC transmits additional packets as redundant data to the remote device. FEC reduces the stress on the remote device jitter buffer to reconstruct packet loss.
49. Which action FortiGate performs on traffic that is subject to a per-IP traffic shaper of 10 Mbps? FortiGate shares 10 Mbps of bandwidth equally among all source IP addresses. FortiGate applies traffic shaping to the original traffic direction only. FortiGate limits each source IP address to a maximum bandwidth of 10 Mbps. FortiGate guarantees a minimum of 10 Mbps of bandwidth to each source IP address.
50. Refer to the exhibit. Based on the output, which two conclusions are true? (Choose two.) The all_rules rule represents the implicit SD-WAN rule. There is more than one SD-WAN rule configured. Entry 1 (id=1) is a regular policy route. The SD-WAN rules takes precedence over regular policy routes.
51. Which two configuration tasks are required to use SD-WAN? (Choose two.) Add one or more members to an SD-WAN zone. Configure at least one firewall policy for SD-WAN traffic. Specify the outgoing interface routing cost. Specify the incoming interfaces in SD-WAN rules.
52. Which CLI command do you use to perform real-time troubleshooting for ADVPN negotiation? diagnose sys virtual-wan-link service get router info routing-table diagnose debug application ike get ipsec tunnel list.
53. Refer to Exhibit: Which statement is correct it the responder FortiGate is using a dynamic routing protocol over the IPsec VPN interface? The phase 1 type must be changed to static for dynamic routing. Only dial-up connections without XAuth can be used for the dynamic routing add-route must be disabled to prevent FortiGate from installing VPN static routes peertype must be set to accept only one peer ID for a unique VPN interface.
54. Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two) Secure Shell (SSH) Encapsulating Security Payload (ESP) Internet Key Exchange (IKE) Transport Layer Security (TLS) Security Association (SA).
55. Which diagnostic command can you use to show the SD-WAN rules interface information and state? diagnose sys virtual-wan-link neighbor. diagnose sys virtual-wan-link route-tag-list diagnose sys virtual-wan-link member diagnose sys virtual-wan-link service.
56. Refer to the exhibit. Based on the output, which two statements are true? (Choose two) The diagnostic output presents only of the policy routes The all_rules rule is the implicit SD-WAN rule in place There is more than one SD-WAN rule configured At least one policy route is implemented and in effect Security Association (SA).
57. In which two ways does FortiGate learn the FortiManager IP address or FQDN for zero-touch provisioning? (Choose two.) From a FortiGuard definitions update From the central management configuration configured in FortiDeploy From a DHCP server configured with options 240 or 241 From another FortiGate device in the same local network.
58. What are two roles that SD-WAN orchestrator plays when it works with FortiManager? (Choose two) It configures and monitors SD-WAN networks on FortiGate devices that are managed by FortiManager. It acts as a standalone device to assist FortiManager to manage SD-WAN interfaces on the managed FortiGate devices. It acts as a hub FortiGate with an SD-WAN interface enabled and managed along with other FortiGate devices by FortiManager. It acts as an application that is released and signed by Fortinet to run as a part of management extensions on FortiManager.
59. Refer to exhibits. Exhibit A shows the SD-WAN performance SLA and exhibit B shows the SO-WAN interface and the static routes configuration. Port1 and port2 are member interfaces of the SD-WAN, and port2 becomes a dead member after reaching the failure thresholds Which statement about the dead member is correct? Subnets 100.64.1.0/23 and 172.20.0.0/16 are reachable only through port1 SD-WAN interface becomes disabled and port1 becomes the WAN interface Dead members require manual administrator access to bring them back alive Port2 might become alive when a single response is received from an SLA server.
60. Refer to the exhibit. Which are two expected behaviors of the traffic that matches the traffic shaper? (Choose two.) The traffic shaper limits the bandwidth of each source IP address to a maximum of 625 KB/sec. The number of simultaneous connections among all source IP addresses can exceed 5 connections. The number of simultaneous connections allowed for each source IP address can exceed 5 connections. The traffic shaper limits the combined bandwidth of all connections to a maximum of 5 MB/sec.
61. Refer to the exhibit. Multiple IPsec VPNs are formed between two hub-and-spokes groups, and site-to-site between Hub 1 and Hub 2 The administrator configured ADVPN on the dual regions topology Which two statements are correct if a dynamic site-to-site tunne1 between Toronto and London has been established? (Choose two) auto-discovery-receiver is enabled on the egress VPN interfaces on the spokes auto-discovery-sender is enabled on the ingress VPN interfaces on hubs tunnel-search IS set to phase 2 quick mode selectors add-route is enabled to install static routes on hub devices auto-discovery-forwarder IS enabled on all VPN interfaces.
62. Refer to the exhibit. Which two conclusions for traffic that matches the traffic shaper are true? (Choose two.) The traffic shaper drops packets if the bandwidth exceeds 6250 KBps. The traffic shaper limits the bandwidth of each source IP to a maximum of 6250 KBps. The traffic shaper drops packets if the bandwidth is less than 2500 KBps. The measured bandwidth is less than 100 KBps.
63.Refer to exhibits. Exhibit A shows the firewall policy and exhibit B shows the traffic shaping policy. The traffic shaping policy is being applied to all outbound traffic; however, inbound traffic is not being evaluated by the shaping policy. Based on the exhibits, what configuration change must be made in which policy so that traffic shaping can be applied to inbound traffic? The reverse shaper option must be enabled and a traffic shaper must be selected. The guaranteed-10mbps option must be selected as the reverse shaper option. A new firewall policy must be created and SD-WAN must be selected as the incoming interface. The guaranteed-10mbps option must be selected as the per-IP shaper option.
64. Which statement is correct about SD-WAN and ADVPN? You must use OSPF. SD-WAN can steer traffic to ADVPN shortcuts established over IPsec overlays configured as SD-WAN members. Routes for ADVPN shortcuts must be manually configured. SD-WAN does not monitor the health and performance of ADVPN shortcuts.
65. Refer to the exhibits. ExhibitA shows the system interface with the static routes and exhibit B shows the firewall policies on the managed FortiGate. Based on the FortiGate configuration shown in the exhibits, what issue might you encounter when creating an SD-WAN zone for port1 and port2? port2 is referenced in a static route. port1 is assigned a manual IP address. port1 and port2 are not administratively down. port1 is referenced in a firewall policy.
66. Which two statements reflect the benefits of implementing the ADVPN solution to replace conventional VPN topologies? (Choose two) It creates redundant tunnels between hub-and-spokes, in case failure takes place on the primary links. It dynamically assigns cost and weight between the hub and the spokes, based on the physical distance. It ensures that spoke-to-spoke traffic no longer needs to flow through the tunnels through the hub. It provides direct connectivity between all sites by creating on-demand tunnels between spokes.
67. Which statement about using BGP routes in SD-WAN is true? Learned routes can be used as dynamic destinations in SD-WAN rules. You must use BGP to route traffic for both overlay and underlay links. You must configure AS path prepending. You must use external BGP.
68. Refer to the exhibit. Based on the exhibit, which status description is correct? Port1 is dead because it does not meet the SLA target. Port2 is alive because its packet loss is lower than 10%. The SD-WAN members are monitored by different performance SLAs. Traffic matching the SD-WAN rule is steered through port2.
69. What is the lnkmtd process responsible for? Monitoring links for any bandwidth saturation Processing performance SLA probes Flushing route tags addresses Logging interface quality information.
70. Which diagnostic command you can use to show interface-specific SLA logs for the last 10 minutes? diagnose sys virtual-wan-link health-check diagnose sys virtual-wan-link log diagnose sys virtual-wan-link sla-log diagnose sys virtual-wan-link intf-sla-log.
71. Refer to the exhibit. Which two statements about the IPsec VPN configuration and the status of the IPsec VPN tunnel are true? (Choose two.) FortiGate creates separate virtual interfaces for each dial-up client. FortiGate creates a single IPsec virtual interface that is shared by all clients. FortiGate maps the remote gateway 100.64.3.1 to tunnel index interface 1. FortiGate does not install IPsec static routes for remote protected networks in the routing table.
72. Which two statements describe how IPsec phase 1 aggressive mode is different from main mode when performing IKE negotiation? (Choose two) A peer ID is included in the first packet from the initiator, along with suggested security policies. XAuth is enabled as an additional level of authentication, which requires a username and password. A total of six packets are exchanged between an initiator and a responder instead of three packets. The use of Diffie Hellman keys is limited by the responder and needs initiator acceptance.
73. Which two benefits from using forward error correction (FEC) in IPsec VPNs are true? (Choose two.) FEC transmits the original payload in full to recover the error in transmission. FEC reduces the stress on the remote device buffer to reconstruct packet loss. FEC transmits additional packets as redundant data to the remote device. FEC improves reliability, which overcomes adverse WAN conditions such as noisy links.
74.Refer to exhibits. Exhibit A shows the firewall policy and exhibit B shows the traffic shaping policy. The traffic shaping policy is being applied to all outbound traffic; however, inbound traffic is not being evaluated by the shaping policy. Based on the exhibits, what configuration change must be made in which policy so that traffic shaping can be applied to inbound traffic? Create a new firewall policy, and the select the SD-WAN zone as Incoming Interface. In the traffic shaping policy, select Assign Shaping Class ID as Action. In the firewall policy, select Proxy-based as Inspection Mode. In the traffic shaping policy, enable Reverse shaper, and then select the traffic shaper to use.
75. Refer to the exhibit. Which conclusion about the packet debug flow output is correct? The original traffic exceeded the maximum bandwidth of the outgoing interface, and the packet was dropped. The reply traffic exceeded the maximum bandwidth configured in the traffic shaper, and the packet was dropped. The original traffic exceeded the maximum packets per second of the outgoing interface, and the packet was dropped. The original traffic exceeded the maximum bandwidth configured in the traffic shaper, and the packet was dropped.
76. Which two statements describe how IPsec phase 1 main mode is different from aggressive mode when performing IKE negotiation? (Choose two) A peer ID is included in the first packet from the initiator, along with suggested security policies. XAuth is enabled as an additional level of authentication, which requires a username and password. A total of six packets are exchanged between an initiator and a responder instead of three packets. The use of Diffie Hellman keys is limited by the responder and needs initiator acceptance.
77. What are two reasons why FortiGate would be unable to complete the zero-touch provisioning process? (Choose two.) The FortiGate cloud key has not been added to the FortiGate cloud portal. FortiDeploy has connected with FortiGate and provided the initial configuration to contact FortiManager The zero-touch provisioning process has completed internally, behind FortiGate. FortiGate has obtained a configuration from the platform template in FortiGate cloud. A factory reset performed on FortiGate.
78. Refer to the exhibit. Based on the exhibit, which two actions does FortiGate perform on traffic passing through the SD-WAN member port2? (Choose two.) FortiGate performs routing lookups for new sessions only after a route change. FortiGate marks the routing information on existing sessions as persistent. FortiGate flushes all routing information from the session table after a route change. FortiGate always blocks all traffic after a route change.
79. Refer to exhibits. Exhibit A shows the traffic shaping policy and exhibit B show: the firewall policy FortiGate is not performing traffic shaping as expected basi on the policies shown in the exhibits. To correct this traffic shaping issue on FortiGate, what configuration change must be made on which policy? The shaper mode must be applied per-IP shaper on the traffic shaping policy. The application control profile must be enabled on the firewall policy. The web filter profile must be enabled on the firewall policy. The URL category must be specified on the traffic shaping policy.
80. Refer to the exhibit. Which two statements about the debug output are correct? (Choose two) The debug output shows per-IP shaper values and real-time readings. This traffic shaper drops traffic that exceeds the set limits. Traffic being controlled by the traffic shaper is under 1 Kbps. FortiGate provides statistics and reading based on historical traffic logs.
Denunciar test Consentimiento Condiciones de uso