NSE4_FGT-7.6
|
|
Título del Test:
![]() NSE4_FGT-7.6 Descripción: Questionário Fortigate |



| Comentarios |
|---|
NO HAY REGISTROS |
|
You have configured an application control profile, set peer-to-peer traffic to Block under the Categories tab, and applied it to the firewall policy. However, your peer-to-peer traffic on known ports is passing through the FortiGate without being blocked. A. FortiGuard category ratings. B. Application and Filter Overrides. C. Network Protocol Enforcement. D. Replacement Messages for UDP-based Applications. Refer to the exhibit. Based on this partial configuration, what are the two possible outcomes when FortiGate enters conserve mode? (Choose two.). Administrators cannot change the configuration. FortiGate skips quarantine actions. Administrators must restart FortiGate to allow new session. FortiGate drops new sessions requiring inspection. Which three statements explain a flow-based antivirus profile? (Choose three.). FortiGate buffers the whole file but transmits to the client at the same time. Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection. If a virus is detected, the last packet is delivered to the client. Flow-based inspection optimizes performance compared to proxy-based inspection. The IPS engine handles the process as a standalone. Which two statements are true about an HA cluster? (Choose two.). An HA cluster cannot have both in-band and out-of-band management interfaces at the same time. Link failover triggers a failover if the administrator sets the interface down on the primary device. When sniffing the heartbeat interface, the administrator must see the IP address 169.254.0.2. HA incremental synchronization includes FIB entries and IPsec SAs. A FortiGate firewall policy is configured with active authentication, however, the user cannot authenticate when accessing a website. Which protocol must FortiGate allow even though the user cannot authenticate?. LDAP. TACASC+. Kerberos. DNS. Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI. Based on the exhibit, which statement is true?. The Underlay zone is the zone by default. The Underlay zone contains no member. port2 and port3 are not assigned to a zone. The virtual-wan-link and overlay zones can be deleted. What is the primary FortiGate election process when the HA override setting is enabled?. Connected monitored ports > Priority > HA uptime > FortiGate serial number. Connected monitored ports > Priority > System uptime > FortiGate serial number. Connected monitored ports > HA uptime > Priority > FortiGate serial number. Connected monitored ports > System uptime > Priority > FortiGate serial number. What would be the impact of these settings on the Server certificate SNI check configuration on FortiGate?. FortiGate will accept and use the CN in the server certificate for URL filtering if the SNI does not match the CN or SAN fields. FortiGate will accept the connection with a warning if the SNI does not match the CN or SAN fields. FortiGate will close the connection if the SNI does not match the CN or SAN fields. FortiGate will close the connection if the SNI does not match the CN and SAN fields. Which two statements describe characteristics of automation stitches? (Choose two.). Actions involve only devices included in the Security Fabric. An automation stitch can have multiple triggers. Multiple actions can run in parallel. Triggers can involve external connectors. When configuring a FortiGate in a multi-WAN setup, why would an administrator enable session preservation on an interface?. To allow the FortiGate to dynamically change interfaces for all active sessions when a WAN link fails. To make sure all sessions without source NAT enabled always use the primary WAN link. To improve security by forcing users to authenticate again when the WAN link changes. To ensure that existing SSL VPN connections remain on the same interface even if route changes occur. Refer to the exhibit, which shows a partial configuration from the remote authentication server. Why does the FortiGate administrator need this configuration?. To set up a RADIUS server Secret. To authenticate Any FortiGate user groups. To authenticate and match the Training OU on the RADIUS server. To authenticate only the Training user group. You are analyzing connectivity problems caused by intermediate devices blocking traffic in SSL VPN environment. In which two ways can you effectively resolve the problem? (Choose two.). You can turn off IKE fragmentation to fix large certificate negotiation problems. You should use IPsec to solve issues with fragment drops and large certificate exchanges. You can use SSL VPN tunnel mode to prevent problems with blocked ESP and UDP ports (500 or 4500). You can configure a hub-and-spoke topology with SSL VPN tunnels to bypass blocked UDP ports. When configuring firewall policies which of the following is true regarding the policy ID?. It is mandatory to provide a policy ID while creating a firewall policy regardless of GUI or CLI. A firewall policy ID identifies the order of policy execution in firewall policies. You can create a policy in CLI with policy ID 0. A policy ID cannot be edited once a policy is created. FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively. Which two statements about the requirements of connected physical interfaces on FortiGate are true? (Choose two.). Both interfaces must have the interface role assigned. Both interfaces must have directly connected routes on the routing table. Both interfaces must have DHCP enabled and interfaces set to LAN and DMZ roles assigned. Both interfaces must have IP addresses assigned. An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow. This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times. Why are there no logs generated under security logs for ABC.Com?. The ABC.Com Type is set as Application instead of Filter. The ABC.Com is configured under application profile, which must be configured as a web filter profile. The ABC.Com Action is set to Allow. The ABC.Com is hitting the category Excessive-Bandwidth. You have configured the below commands on a FortiGate. What would be the impact of this configuration on FortiGate?. FortiGate will enable strict RPF on all its interfaces and port1 will be enabled for asymmetric routing. FortiGate will enable strict RPF on all its interfaces and port1 will be exempted from RPF checks. Port1 will be enabled with flexible RPF, and all other interfaces will be enabled for strict RPF. The global configuration will take precedence and FortiGate will enable strict RPF on all interfaces. Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.). If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based. If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP. If SD-WAN is disabled, you configure the load balancing algorithm in config system settings. If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode. An administrator wants to configure dead peer detection (DPD) on IPsec VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when there is no inbound traffic. Which DPD mode on FortiGate meets this requirement?. Enabled. On Idle. Disabled. On Demand. The predefined deep-inspection and custom-deep-inspection profiles exclude some web categories from SSL inspection, as shown in t exhibit. For which two reasons are these web categories exempted? (Choose two.). The FortiGate temporary certificate denies the browser's access to websites that use HTTP Strict Transport Security. These websites are in an allowlist of reputable domain names maintained by FortiGuard. The resources utilization is optimized because these websites are in the trusted domain list on FortiGate. The legal regulation aims to prioritize user privacy and protect sensitive information for these websites. Refer to the exhibit. As an administrator you have created an IPS profile, but it is not performing as expected. While testing you got the output as shown in the exhibit. What could be the possible reason of the diagnose output shown in the exhibit?. There is a no firewall policy configured with an IPS security profile. FortiGate entered into IPS fail open state. Administrator entered the command diagnose test application ipsmonitor 5. Administrator entered the command diagnose test application ipsmonitor 99. A network administrator is reviewing firewall policies in both Interface Pair View and By Sequence View. The policies appear in a different order in each view. Why is the policy order different in these two views?. Policies in Interface Pair View are prioritized by security levels, while By Sequence View strictly follows the administrator's manual ordering. By Sequence View groups policies based on rule priority, while Interface Pair View always follows the order of traffic logs. The firewall dynamically reorders policies in Interface Pair View based on recent traffic patterns, but By Sequence View remains static. Interface Pair View sorts policies based on matching interfaces, while By Sequence View shows the actual processing order of rules. You have created a web filter profile named restrict_media-profile with a daily category usage quota. When you are adding the profile to the firewall policy, the restrict_media-profile is not listed in the available web profile drop down. What could be the reason?. The firewall policy is in no-inspection mode instead of deep-inspection. The inspection mode in the firewall policy is not matching with web filter profile feature set. The web filter profile is already referenced in another firewall policy. The naming convention used in the web filter profile is restricting it in the firewall policy. The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity. What must the administrator configure to answer this specific request from the NOC team?. Move NOC_Access to the top of the list to ensure all profile settings take effect. Increase the offline value of the Override Idle Timeout parameter in the NOC_Access admin profile. Ensure that all NOC_Access users are assigned the super_admin role to guarantee access. Increase the admint imeout value under config system accprofile NOC_Access. FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles. Which action must the administrator perform to consolidate the two policies into one?. Create an Aggregate interface that includes port1 and port2 to create a single firewall policy. Select port1 and port2 subnets in a single firewall policy. Replace port1 and port2 with the any interface in a single firewall policy. Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy. An administrator notices that some users are unable to establish SSL VPN connections, while others can connect without any issues. What should the administrator check first?. Ensure that the affected users are using the correct port number. Ensure that user traffic is hitting the firewall policy. Ensure that forced tunneling is enabled to reroute all traffic through the SSL VPN. Ensure that the HTTPS service is enabled on SSL VPN tunnel interface. Which three statements about SD-WAN performance SLAs are true? (Choose three.). They rely on session loss and jitter. They can be measured actively or passively. They are applied in a SD-WAN rule lowest cost strategy. They monitor the state of the FortiGate device. All the SLA targets can be configured. An administrator has created a new firewall address to use as the destination for a static route. Why is the administrator not able to select the new address in the Destination field of the new static route?. In the new static route, the administrator must select Named Address. In the new firewall address, the FQDN address must first be resolved. In the new static route, the administrator must first set the interface to port2. In the new firewall address, Routing configuration must be enabled. A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and does not block the file, allowing it to be downloaded. The administrator confirms that the traffic matches the configured firewall policy. What are two reasons for the failed virus detection by FortiGate? (Choose two.). The selected SSL inspection profile has certificate inspection enabled. The website is exempted from SSL inspection. The EI CAR test file exceeds the protocol options oversize limit. The browser does not trust the FortiGate self-signed CA certificate. A new administrator is configuring FSSO authentication on FortiGate using DC Agent Mode. Which step is NOT part of the expected process?. The DC agent sends login event data directly to FortiGate. The user logs into the windows domain. The collector agent forwards login event data to FortiGate. FortiGate determines user identity based on the IP address in the FSSO list. An administrator wanted to configure an IPS sensor to block traffic that triggers a signature set number of times during a specific time period. How can the administrator achieve the objective?. Use IPS group signatures, set rate-mode 60. Use IPS packet logging option with periodical filter option. Use IPS filter, rate-mode periodical option. Use IPS signatures, rate-mode periodical option. You want to ensure that an SSL VPN user's authenticated session does not remain active after they disconnect from the VPN. Which configuration will ensure this?. Configure the firewall authentication session timeout to be lower than the SSL VPN session timeout. Manually clear active firewall authentication sessions after a user disconnects. Increase the SSL VPN idle timeout to reduce the chance of early disconnections. Enable settings to force the firewall authentication session to end when the SSL VPN session ends. An administrator configured a FortiGate device to act as a collector for agentless polling mode. What must the administrator add to the FortiGate device to retrieve AD user group information?. TACACS server. LDAP server. RADIUS server. Keycloak server. What are two features of FortiGate FSSO agentless polling mode? (Choose two.). FortiGate directs the collector agent to use a remote LDAP server. FortiGate uses the SMB protocol to read the event viewer logs from the DCs. FortiGate does not support workstation check. FortiGate uses the AD server as the collector agent. |





