sdfgbfhjkdfsdgx
|
|
Título del Test:
![]() sdfgbfhjkdfsdgx Descripción: prueba test |



| Comentarios |
|---|
NO HAY REGISTROS |
|
An administrator wants to configure dead peer detection (DPD) on IPsec VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when there is no inbound traffic. Which DPD mode on FortiGate meets this requirement?. Enabled. On Idle. Disabled. On Demand. Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.). If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based. If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP. If SD-WAN is disabled, you configure the load balancing algorithm in config system settings. If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode. You have created a web filter profile named restrict_media-profile with a daily category usage quota. When you are adding the profile to the firewall policy, the restrict_media-profile is not listed in the available web profile drop down. What could be the reason?. The firewall policy is in no-inspection mode instead of deep-inspection. The inspection mode in the firewall policy is not matching with web filter profile feature set. The web filter profile is already referenced in another firewall policy. The naming convention used in the web filter profile is restricting it in the firewall policy. Refer to the exhibit.As an administrator you have created an IPS profile, but it is not performing as expected. While testing you got the output as shown in the exhibit. What could be the possible reason of the diagnose output shown in the exhibit?. There is a no firewall policy configured with an IPS security profile. FortiGate entered into IPS fail open state. Administrator entered the command diagnose test application ipsmonitor 5. Administrator entered the command diagnose test application ipsmonitor 99. Refer to the exhibit. The predefined deep-inspection and custom-deep-inspection profiles exclude some web categories from SSL inspection, as shown in the exhibit. For which two reasons are these web categories exempted? (Choose two.). The FortiGate temporary certificate denies the browser’s access to websites that use HTTP Strict Transport Security. These websites are in an allowlist of reputable domain names maintained by FortiGuard. The resources utilization is optimized because these websites are in the trusted domain list on FortiGate. The legal regulation aims to prioritize user privacy and protect sensitive information for these websites. Refer to the exhibit. The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity. What must the administrator configure to answer this specific request from the NOC team?. Move NOC_Access to the top of the list to ensure all profile settings take effect. Increase the offline value of the Override Idle Timeout parameter in the NOC_Access admin profile. Ensure that all NOC_Access users are assigned the super_admin role to guarantee access. Increase the admintimeout value under config system accprofile NOC_Access. Refer to the exhibit. Based on this partial configuration, what are the two possible outcomes when FortiGate enters conserve mode? (Choose two.). Administrators cannot change the configuration. FortiGate skips quarantine actions. Administrators must restart FortiGate to allow new session. FortiGate drops new sessions requiring inspection. What is the primary FortiGate election process when the HA override setting is enabled?. Connected monitored ports > Priority > HA uptime > FortiGate serial number. Connected monitored ports > Priority > System uptime > FortiGate serial number. Connected monitored ports > HA uptime > Priority > FortiGate serial number. Connected monitored ports > System uptime > Priority > FortiGate serial number. An administrator wanted to configure an IPS sensor to block traffic that triggers a signature set number of times during a specific time period. How can the administrator achieve the objective?. Use IPS group signatures, set rate-mode 60. Use IPS packet logging option with periodical filter option. Use IPS filter, rate-mode periodical option. Use IPS anomaly detection with threshold set to 100. FortiGate firewall policy is configured with active authentication, however, the user cannot authenticate when accessing a website. Which protocol must FortiGate allow even though the user cannot authenticate?. LDAP. TACASC+. Kerberos. DNS. Refer to the exhibit, which shows a partial configuration from the remote authentication server. Why does the FortiGate administrator need this configuration?. To set up a RADIUS server Secret. To authenticate Any FortiGate user groups. To authenticate and match the Training OU on the RADIUS server. To authenticate only the Training user group. Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI. Based on the exhibit, which statement is true?. The Underlay zone is the zone by default. The Underlay zone contains no member. port2 and port3 are not assigned to a zone. The virtual-wan-link and overlay zones can be deleted. Which three statements explain a flow-based antivirus profile? (Choose three.). FortiGate buffers the whole file but transmits to the client at the same time. Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection. If a virus is detected, the last packet is delivered to the client. Flow-based inspection optimizes performance compared to proxy-based inspection. The IPS engine handles the process as a standalone. Refer to the exhibit. An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow. This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times. Why are there no logs generated under security logs for ABC.Com?. The ABC.Com Type is set as Application instead of Filter. The ABC.Com is configured under application profile, which must be configured as a web filter profile. The ABC.Com Action is set to Allow. The ABC.Com is hitting the category Excessive-Bandwidth. Which two statements describe characteristics of automation stitches? (Choose two.). Actions involve only devices included in the Security Fabric. An automation stitch can have multiple triggers. Multiple actions can run in parallel. Triggers can involve external connectors. Which three statements about SD-WAN performance SLAs are true? (Choose three.). They rely on session loss and jitter. They can be measured actively or passively. They are applied in a SD-WAN rule lowest cost strategy. They monitor the state of the FortiGate device. All the SLA targets can be configured. Which two statements are true about an HA cluster? (Choose two.). An HA cluster cannot have both in-band and out-of-band management interfaces at the same time. Link failover triggers a failover if the administrator sets the interface down on the primary device. When sniffing the heartbeat interface, the administrator must see the IP address 169.254.0.2. HA incremental synchronization includes FIB entries and IPsec SAs. A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and does not block the file, allowing it to be downloaded. The administrator confirms that the traffic matches the configured firewall policy. What are two reasons for the failed virus detection by FortiGate? (Choose two.). The selected SSL inspection profile has certificate inspection enabled. The website is exempted from SSL inspection. The El CAR test file exceeds the protocol options oversize limit. The browser does not trust the FortiGate self-signed CA certificate. You have configured the below commands on a FortiGate. What would be the impact of this configuration on FortiGate?. FortiGate will enable strict RPF on ail its interfaces and port1 will be enable for asymmetric routing. FortiGate will enable strict RPF on all its interfaces and port1 will be exempted from RPF checks. Port1 will be enabled with flexible RPF, and all other interfaces will be enabled for strict RPF. The global configuration will take precedence and FortiGate will enable strict RPF on all interfaces. Refer to the exhibit. What would be the impact of these settings on the Server certificate SNI check configuration on FortiGate?. FortiGate will accept and use the CN in the server certificate for URL filtering if the SNI does not match the CN or SAN fields. FortiGate will accept the connection with a warning if the SNI does not match the CN or SAN fields. FortiGate will close the connection if the SNI does not match the CN or SAN fields. FortiGate will close the connection if the SNI does not match the CN and SAN fields. A new administrator is configuring FSSO authentication on FortiGate using DC Agent Mode. Which step is NOT part of the expected process?. The DC agent sends login event data directly to FortiGate. The user logs into the windows domain. The collector agent forwards login event data to FortiGate. FortiGate determines user identity based on the IP address in the FSSO list. A network administrator is reviewing firewall policies in both Interface Pair View and By Sequence View. The policies appear in a different order in each view. Why is the policy order different in these two views?. Policies in Interface Pair View are prioritized by security levels, while By Sequence View strictly follows the administrator’s manual ordering. By Sequence View groups policies based on rule priority, while Interface Pair View always follows the order of traffic logs. The firewall dynamically reorders policies in Interface Pair View based on recent traffic patterns, but By Sequence View remains static. Interface Pair View sorts policies based on matching interfaces, while By Sequence View shows the actual processing order of rules. An administrator notices that some users are unable to establish SSL VPN connections, while others can connect without any issues. What should the administrator check first?. Ensure that the affected users are using the correct port number. Ensure that user traffic is hitting the firewall policy. Ensure that forced tunneling is enabled to reroute all traffic through the SSL VPN. Ensure that the HTTPS service is enabled on SSL VPN tunnel interface. Refer to the exhibit. An administrator has created a new firewall address to use as the destination for a static route. Why is the administrator not able to select the new address in the Destination field of the new static route?. In the new static route, the administrator must select Named Address. In the new firewall address, the FQDN address must first beresolved. In the new static route, the administrator must first set the interface to port2. In the new firewall address, Routing configuration must be enabled. FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively. Which two statements about the requirements of connected physical interfaces on FortiGate are true? (Choose two.). Both interfaces must have the interface role assigned. Both interfaces must have directly connected routes on the routing table. Both interfaces must have DHCP enabled and interfaces set to LAN and DMZ roles assigned. Both interfaces must have IP addresses assigned. When configuring a FortiGate in a multi-WAN setup, why would an administrator enable session preservation on an interface?. To allow the FortiGate to dynamically change interfaces for all active sessions when a WAN link fails. To make sure all sessions without source NAT enabled always use the primary WAN link. To improve security by forcing users to authenticate again when the WAN link changes. To ensure that existing SSL VPN connections remain on the same interface even if route changes occur. You are analyzing connectivity problems caused by intermediate devices blocking traffic in SSL VPN environment. In which two ways can you effectively resolve the problem? (Choose two.). You can turn off IKE fragmentation to fix large certificate negotiation problems. You should use IPsec to solve issues with fragment drops and large certificate exchanges. You can use SSL VPN tunnel mode to prevent problems with blocked ESP and UDP ports (500 or 4500). You can configure a hub-and-spoke topology with SSL VPN tunnels to bypass blocked UDP ports. Refer to the exhibit. FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles. Which action must the administrator perform to consolidate the two policies into one?. Create an Aggregate interface that includes port1 and port2 to create a single firewall policy. Select port1 and port2 subnets in a single firewall policy. Replace port1 and port2 with the any interface in a single firewall policy. Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy. You have configured an application control profile, set peer-to-peer traffic to Block under the Categories tab, and applied it to the firewall policy. However, your peer-to-peer traffic on known ports is passing through the FortiGate without being blocked. What FortiGate settings should you check to resolve this issue?. FortiGuard category ratings. Application and Filter Overrides. Network Protocol Enforcement. Replacement Messages for UDP-based Applications. When configuring firewall policies which of the following is true regarding the policy ID?. It is mandatory to provide a policy ID while creating a firewall policy regardless of GUI or CLI. A firewall policy ID identifies the order of policy execution in firewall policies. You can create a policy in CLI with policy ID 0. A policy ID cannot be edited once a policy is created. Which two statements are correct when FortiGate enters conserve mode? (Choose two.). FortiGate continues to run critical security actions, such as quarantine. FortiGate refuses to accept configuration changes. FortiGate halts complete system operation and requires a reboot to regain available resources. FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled. A remote user reports slow SSL VPN performance and frequent disconnections. The user is located in an area with poor internet connectivity. What setting should the administrator adjust to improve the user's experience?. Enable split tunneling to reduce VPN traffic. Change the SSL VPN port to a non-standard port. Increase the session timeout for inactive sessions. Configure the DTLS timeout to accommodate high-latency connections. An administrator wants to analyze and manage digital certificates to prevent browser warnings when users connect to the SSL VPN portal. Which two statements describe how to correctly do this? (Choose two.). The administrator can rely on the default FortiGate self-signed certificate to prevent all security warnings in the browser. The administrator must disable HTTPS administrative access entirely to avoid certificate warnings. The administrator can use a publicly trusted certificate from a known certificate authority (CA) to stop browser warnings. The administrator can import the FortiGate self-signed certificate into each user’s browser as a trusted certificate. An administrator suspects that the Collector Agent is not forwarding login events to FortiGate. What is the most effective troubleshooting step?. Verify if DC agent is enabled on the FortiGate. Restart the domain controller to refresh authentication services. Verify if FortiGate is set to use LDAP authentication instead of FSSO. Check if TCP port 8000 is open between the collector agent and FortiGate. Refer to the exhibit. A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up. Based on the phase 2 configuration shown in the exhibit, which two configuration changes will bring phase 2 up? (Choose two.). On BR1-FGT, set Seconds to 43200. On HQ-NGFW, enable Diffie-Hellman Group 2. On BR1-FGT, set Remote Address to 10.0.11.0/255.255.255.0. On HQ-NGFW. set Encryption to AES256. Refer to the exhibits. An administrator has observed the performance status outputs on an HA cluster for 55 seconds. Which FortiGate is the primary?. HQ-NGFW-2 with the parameter memory-failover-threshold setting. HQ-NGFW-2 with the parameter priority setting. HQ-NGFW-1 with the parameter memory-failover-flip-timeout setting. HQ-NGFW-1 with the parameter override setting. Which statement correctly describes NetAPI polling mode for the FSSO collector agent?. The collector agent uses a Windows API to query DCs for user logins. NetAPI polling can increase bandwidth usage in large networks. The NetSessionEnum function is used to track user logouts. The collector agent must search Windows application event logs. You have configured the FortiGate device for FSSO. A user is successful in log-in to windows, but their access to the internet is denied. What should the administrator check first?. Whether the user is assigned to the correct AD group. The FortiGate firewall policy settings for SSL decryption. The FortiGate FSSO active users list for user’s IP address. The windows event viewer for failed login attempts. What are three key routing principles in SD-WAN? (Choose three.). By default, SD-WAN rules are skipped if the included SD-WAN members do not have a valid route to the destination. SD-WAN rules have precedence over any other type of routes. Regular policy routes have precedence over SD-WAN rules. By default. SD-WAN rules are skipped if only one route to the destination is available. By default, SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member. The exhibits show a diagram of a FortiGate device connected to the network, as well as the IP pool configuration and firewall policy objects. The WAN (port2) interface has the IP address 100.65.0.101/24. The LAN (port4) interface has the IP address 10.0.11.254/24. Which IP address will be used to source NAT (SNAT) the traffic, if the user on HQ-PC-1 (10.0.11.50) pings the IP address of BR-FGT (100.65.1.111). 100.65.0.101. 100.65.0.49. 100.65.0.99. 100.65.0.149. Refer to the exhibits. The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration. An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2. The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver. Which additional configuration can the administrator add to a deny firewall policy, beyond the default behavior, to block Remote-User2 from accessing the Webserver?. Disable match-vip in the Allow_access policy. Configure a One-to-One IP Pool object in a new policy. Set the Destination address as Webserver in the Deny policy. Set the Destination address as Deny_IP in the Allow_access policy. Refer to the exhibits. The exhibits show the system performance output and default configuration of high memory usage thresholds on a FortiGate device. Based on the system performance output, what are the two possible outcomes? (Choose two.). FortiGate has entered conserve mode. Administrators can access FortiGate only through the console port. Administrators can change the configuration. FortiGate drops new sessions. Refer to the exhibits. Based on the current HA status, an administrator updates the override and priority parameters on HQ-NGFW-1 and HQ-NGFW-2 as shown in the exhibit. What would be the expected outcome in the HA cluster?. HQ-NGFW-1 will synchronize the override disable setting with HQ-NGFW-2. HQ-NGFW-2 will take over as the primary because it has the override enable setting and higher priority than HQ-NGFW-1. HQ-NGFW-1 will remain the primary because HQ-NGFW-2 has lower priority. The HA cluster will become out of sync because the override setting must match on all HA members. Refer to the exhibits. An administrator wants to add HQ-ISFW-2 in the Security Fabric. HQ-ISFW-2 is in the same subnet as HQ-ISFW. After configuring the Security Fabric settings on HQ-ISFW-2, the status stays Pending. What can be the two possible reasons? (Choose two.). Upstream FortiGate IP must be set to 10.0.11.254. SAML Single Sign-On must be set to Manual. HQ-ISFW-2 must be authorized on HQ-ISFW. Management IP must be set to 10.0.13.254. Refer to the exhibit. The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile. An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category. What are two solutions for satisfying the requirement? (Choose two.). Configure a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively. Configure a web override rating for download.com and select Malicious Websites as the subcategory. Configure a separate firewall policy with action Deny and an FQDN address object for *.download.com as destination address. Set the Freeware and Software Downloads category Action to Warning. Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.). Lowest Cost (SLA) without load balancing. Manual with load balancing. Lowest Quality (SLA) with load balancing. Lowest Cost (SLA) with load balancing. Best Quality with load balancing. What are two characteristics of HA cluster heartbeat IP addresses in a FortiGate device? (Choose two.). Heartbeat interfaces have virtual IP addresses that are manually assigned. Heartbeat IP addresses are used to distinguish between cluster members. The heartbeat interface of the primary device in the cluster is always assigned IP address 169.254.0.1. A change in the heartbeat IP address happens when a FortiGate device joins or leaves the cluster. Refer to the exhibit, which contains a RADIUS server configuration. An administrator added a configuration for a new RADIUS server. While configuring, the administrator enabled Include in every user group. What is the impact of enabling Include in every user group in a RADIUS configuration?. This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group. This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group. This option places all users into every RADIUS user group, including groups that are used for the LDAP server on FortiGate. This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case, is FortiAuthenticator. Refer to the exhibits. An administrator creates a new address object on the root FortiGate (HQ-NGFW-1) in the Security Fabric. After synchronization, this object is not available on the downstream FortiGate (HQ-ISFW). What must the administrator do to synchronize the address object?. Change the csf setting on HQ-ISFW (downstream) to set configuration-sync local. Change the csf setting on HQ-ISFW (downstream) to set saml-configuration-sync default. Change the csf setting on HQ-NGFW-1 (root) to set fabric-object-unification default. Change the csf setting on both devices to set downstream-access enable. Refer to the exhibit showing a debug flow output. Which two conclusions can you make from the debug flow output? (Choose two.). The default gateway is configured on port2. The RPF check fails. The debug flow is for UDP traffic. The matching firewall policy denies the traffic. When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate. Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.). Allow. Trust & Allow. Allow & Warning. Block. Block & Warning. You want to ensure that an SSL VPN user’s authenticated session does not remain active after they disconnect from the VPN. Which configuration will ensure this?. Configure the firewall authentication session timeout to be lower than the SSL VPN session timeout. Manually clear active firewall authentication sessions after a user disconnects. Increase the SSL VPN idle timeout to reduce the chance of early disconnections. Enable settings to force the firewall authentication session to end when the SSL VPN session ends. Refer to the exhibit, which shows a firewall policy to enable active authentication. When attempting to access an external website using an active authentication method, the user is not presented with a login prompt. What is the most likely reason for this situation?. The Service DNS is required in the firewall policy. The Remote-users group must be set up correctly in the FSSO configuration. No matching user account exists for this user. The Remote-users group is not added to the Destination. Refer to the exhibit. Why did the FortiGate device drop the packet?. It matched the default implicit firewall policy. It matched an explicitly configured firewall policy with the action DENY. It cannot reach the next-hop IP. It failed the RPF check. Refer to the exhibit, which shows a routing table. An administrator wants to create a new static route so the traffic to the subnet 172.20.1.0/24 is routed through port2 only. What are the two criteria that the administrator can use to achieve this objective? (Choose two.). The new static route must have the distance set to 9. The existing static route through port3 must have the distance set to 11. The new static route must have the priority set to 3. The new static route must have the metric set to 1. Refer to the exhibit. Why is the Antivirus scan switch grayed out when you are creating a new antivirus profile for FTP?. None of the inspected protocols are active in this profile. FortiGate, with less than 2 GB RAM, does not support the Antivirus scan feature. Antivirus scan is disabled under System –> Feature visibility. The Feature Set for the profile is Flow-based but it must be Proxy-based. An administrator has configured a dialup IPsec VPN on FortiGate with add-route enabled. However, the static route is not showing in the routing table. Which two statements about this scenario are correct? (Choose two.). The administrator must enable a dynamic routing protocol on the dialup interface. The administrator must use a policy route instead of a static route for add-route to work properly. The administrator must ensure phase 2 is successfully established. The administrator must define the remote network correctly in the phase 2 selectors. An administrator configured a FortiGate device to act as a collector for agentless polling mode. What must the administrator add to the FortiGate device to retrieve AD user group information?. TACACS server. LDAP server. RADIUS server. Keycloak server. What are two features of FortiGate FSSO agentless polling mode? (Choose two.). FortiGate directs the collector agent to use a remote LDAP server. FortiGate uses the SMB protocol to read the event viewer logs from the DCs. FortiGate does not support workstation check. FortiGate uses the AD server as the collector agent. A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors. What is the reason for the certificate warning errors?. The browser does not trust the certificate used by FortiGate for SSL inspection. The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile. The matching firewall policy is set to proxy inspection mode. The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions. A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes. All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover. Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.). In the phase1-interface, enable npu-offload to detect a dead tunnel. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel. Enable Dead Peer Detection. Use the VPN wizard to create an IPsec template for a redundant IPsec VPN tunnel. An administrator wants to form an HA cluster using the FGCP protocol. Which two requirements must the administrator ensure both members fulfill? (Choose two.). They must have the same HA group ID. They must have the heartbeat interfaces in the same subnet. They must have the same number of configured VDOMs. They must have the same hard drive configuration. FortiGate is integrated with FortiAnalyzer and FortiManager. When creating a firewall policy, which attribute must an administrator include to enhance functionality and enable log recording on FortiAnalyzer and FortiManager?. Policy ID. Log ID. Universally Unique Identifier. Sequence ID. Refer to the exhibit. The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SDWAN Rule Name. FortiGate allows the traffic according to policy ID 1 placed at the top. This is the policy that allows SD-WAN traffic. Despite these settings, the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows. What could be the reason?. SD-WAN rule names do not appear immediately. The administrator must refresh the page. There is no application control profile applied to the firewall policy. FortiGate load balanced the traffic according to the implicit SD-WAN rule. Destinations in the SD-WAN rules are configured for each application, but feature visibility is not enabled. An administrator manages a FortiGate model that supports NTurbo. How does NTurbo acceleration enhance antivirus performance?. For proxy-based inspection, NTurbo offloads traffic to the content processor. For flow-based inspection, NTurbo establishes a dedicated data path to redirect traffic between the IPS engine and FortiGate ingress and egress interfaces. For proxy-based inspection, NTurbo buffers the whole file and then sends it to the antivirus engine. For flow-based inspection, NTurbo creates two inspection sessions on the FortiGate device. Refer to the exhibit. Review the intrusion prevention system (IPS) profile signature settings shown in the exhibit. What can you conclude about the signature when adding the FTP.Login.Failed signature to the IPS Sensor profile?. The signature setting includes a group of other signatures. FortiGate stores a local copy of the packet that matches the signature. FortiGate allows this low severity signature packet and creates a log. The signature setting uses a custom rating threshold. Refer to the exhibits. A diagram of a FortiGate device connected to the network VIP object and firewall policy configurations are shown. The WAN (port2) interface has the IP address 100.65.0.101/24. The LAN (port4) interface has the IP address 10.0.11.254/24. If the host 100.65.1.111 sends a TCP SYN packet on port 443 to 100.65.0.200, what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?. 10.0.11.254, 10.0.15.50, and 4443, respectively. 100.65.1.111, 10.0.11.50 and 443, respectively. 10.0.11.254, 100.65.0.200, and 443, respectively. 100.65.1.111, 10.0.11.50, and 4443, respectively. Refer to the exhibits. The exhibits show a diagram of a FortiGate device connected to the network, and the firewall policies, VIP, and IP pool configurations on the FortiGate device. The WAN (port2) interface has the IP address 100.65.0.101/24. The LAN (port4) interface has the IP address 10.0.11.254/24. The first firewall policy has NAT enabled using the IP pool. The second firewall policy is configured with a VIP as the destination address. Which IP address will be used to source NAT (SNAT) the internet traffic coming from a workstation with the IP address 10.0.11.50?. 100.65.0.101. 100.65.0.200. 100.65.0.102. 10.0.11.254. Refer to the exhibit. Based on the routing table shown in the exhibit, which two statements are true? (Choose two.). A packet with the source IP address 10.100.110.10 arriving on port3 is allowed if strict RPF is disabled. A packet with the source IP address 10.100.110.10 arriving on port2 is allowed if strict RPF is enabled. A packet with the source IP address 10.0.13.10 arriving on port2 is allowed if strict RPF is disabled. A packet with the source IP address 10.10.10.10 arriving on port2 is allowed if strict RPF is enabled. An administrator configures FortiGuard servers as DNS servers on FortiGate using default settings. What is true about the DNS connection to a FortiGuard server?. It uses DNS over TLS. It uses DNS over HTTPS. It uses UDP 8888. It uses UDP 53. What are two features of collector agent advanced mode? (Choose two.). Advanced mode supports nested or inherited groups. In advanced mode, security profiles can be applied only to user groups, not individual users. In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate. Advanced mode uses the Windows convention – NetBios: Domain\Username. Refer to the exhibits. An administrator configured both members of an HA cluster at the same time. After one week of monitoring, the administrator wants to verify the HA failover performance. How can the administrator force a failover?. The administrator must reset the HA uptime on HQ-NGFW-1. The administrator must set the parameter override to enable on HQ-NGFW-2. The administrator must increase the HA priority on HQ-NGFW-2. The administrator must set the monitored port to down on HQ-NGFW-1. An administrator needs to analyze and resolve port conflicts between SSL VPN and HTTPS administrative access on the same interface. In which two ways can this be done? (Choose two.). Disable SSL VPN if HTTPS administrative access is using port 443 on any interface. Keep port 443 for both SSL VPN and HTTPS administrative access on the same interface without any problems. Run SSL VPN on one interface using port 443 and enable HTTPS administrative access on a different interface, also using port 443. Change the port number for either the SSL VPN service or the HTTPS administrative service if both are on the same interface. Refer to the exhibit. What can you conclude from the log shown in the exhibit?. The IPS scan is paused by the IPS diagnostic command with bypass mode option 5. The IPS socket buffer is full and IPS engine needs more memory to create new sessions. The IPS session scan is paused and reevaluating the packet because of a dirty flag. The IPS socket buffer is full and IPS engine cannot decode a packet. Refer to the exhibits. You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.You cannot access any of the Google applications, but you are able to access www.fortinet.com. What would you do to resolve this issue?. Change the Inspection mode to Proxy-based. Set SSL inspection to deep-content-inspection. Move up Google in the Application and Filter Overrides section to set its priority to 1. Add *Google*.com to the URL category in the security profile. Refer to the exhibits. A web filter profile configuration and firewall policy configuration are shown. You are trying to access www.facebook.com, but you are redirected to a FortiGuard web filtering block page. Based on the exhibits, what is the possible cause of the issue?. The web filter profile feature set is configured incorrectly. The web rating override configuration is incorrect. The firewall policy inspection mode is incorrect. For www.facebook.com, the URL filter action is incorrect. Which two statements about the Security Fabric rating are true? (Choose two.). A license is required to obtain an executive summary in the Security Rating section. The root FortiGate provides executive summaries of all the FortiGate devices in the Security Fabric. The Security Posture category provides PCI compliance results. Security Rating Insights are available only in the Security Rating page. An administrator has configured the following settings. What are the two results of this configuration? (Choose two.). Denied users are blocked for 30 minutes. A session for denied traffic is created. Session helpers are disabled for denied traffic. The number of logs generated by denied traffic is reduced. A FortiGate administrator is required to reduce the attack surface on the SSL VPN portal. Which SSL timer can you use to mitigate a denial of service (DoS) attack?. SSL VPN http-request-header-timeout. SSL VPN dtls-hello-timeout. SSL VPN login-timeout. SSL VPN idle-timeout. Refer to the exhibits. The exhibits show a diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device. Two PCs, PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet. Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.). In the IP pool configuration, set type to overload. In the system settings, set Multiple Interface Policies to enable. In the firewall policy, set match-vip to enable using CLI. In the IP pool configuration, set endip to 100.65.0.112. Refer to the exhibit. Which two statements about the FortiGuard connection are true? (Choose two.). FortiGate is using the default port for FortiGuard communication. FortiGate identified the FortiGuard Server using DNS lookup. The weight increases as the number of failed packets rises. You can configure unreliable protocols to communicate with FortiGuard Server. |




