Pass the Fortinet Fortinet Network Security Expert FCP_FGT_AD-7.4 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

Options:

A.

The host field in the HTTP header.


B.

The server name indication (SNI) extension in the client hello message.


C.

The subject alternative name (SAN) field in the server certificate.


D.

The subject field in the server certificate.


E.

The serial number in the server certificate.


Expert Solution
Questions # 2:

Refer to the exhibit.

Question # 2

The exhibit shows a diagram of a FortiGate device connected to the network, the firewall policy and VIP configuration on the FortiGate device, and the routing table on the ISP router.

When the administrator tries to access the web server public address (203.0.113.2) from the internet, the connection times out. At the same time the administrator runs a sniffer on FortiGate to capture incoming web traffic to the server and does not see any output.

Based on the information shown in the exhibit, what configuration change must the administrator make to fix the connectivity issue?

Options:

A.

Configure a loopback interface with address 203.0.113.2/32.


B.

In the VIP configuration, enable arp-reply.


C.

In the firewall policy configuration, enable match-vip.


D.

Enable port forwarding on the server to map the external service port to the internal service port.


Expert Solution
Questions # 3:

Refer to the exhibits.

Question # 3

Question # 3

The exhibits show the application sensor configuration and theExcessive-BandwidthandApplefilter details.

Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?

Options:

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.


B.

Apple FaceTime will be allowed, based on the Apple filter configuration.


C.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.


D.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.


Expert Solution
Questions # 4:

A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.

Which IPsec Wizard template must the administrator apply?

Options:

A.

Remote Access


B.

Site to Site


C.

Dial up User


D.

iHub-and-Spoke


Expert Solution
Questions # 5:

FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively.

Which two statements are true about the requirements of connected physical interfaces on FortiGate? (Choose two.)

Options:

A.

Both interfaces must have the interface role assigned


B.

Both interfaces must have directly connected routes on the routing table


C.

Both interfaces must have DHCP enabled


D.

Both interfaces must have IP addresses assigned


Expert Solution
Questions # 6:

An administrator has configured the following settings:

Question # 6

What are the two results of this configuration? (Choose two.)

Options:

A.

Denied users are blocked for 30 minutes.


B.

A session for denied traffic is created.


C.

The number of logs generated by denied traffic is reduced.


D.

Device detection on all interfaces is enforced for 30 minutes.


Expert Solution
Questions # 7:

Refer to the exhibit showing a debug flow output.

Question # 7

What two conclusions can you make from the debug flow output? (Choose two.)

Options:

A.

The debug flow is for ICMP traffic.


B.

A firewall policy allowed the connection.


C.

A new traffic session was created.


D.

The default route is required to receive a reply.


Expert Solution
Questions # 8:

Which two statements explain antivirus scanning modes? (Choose two.)

Options:

A.

In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.


B.

In flow-based inspection mode files bigger than the buffer size are scanned


C.

In proxy-based inspection mode files bigger than the buffer size are scanned


D.

In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client


Expert Solution
Questions # 9:

Which inspection mode does FortiGate use for application profiles if it is configured as a profile-based next-generation firewall (NGFW)?

Options:

A.

Full content inspection


B.

Proxy-based inspection


C.

Certificate inspection


D.

Flow-based inspection


Expert Solution
Questions # 10:

How can you disable RPF checking?

Options:

A.

Disable src-check on the interface level settings


B.

Unset fail-alert-interfaces on the interface level settings.


C.

Disable fail-detect on the interface level settings.


D.

Disable strict-src-check under system settings.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions