Pass the Fortinet Fortinet Certified Professional Network Security FCSS_EFW_AD-7.4 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

Options:

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.


B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.


C.

Select flow mode in the IPS profile to accurately analyze application patterns.


D.

Set the IPS profile signature action to default to discard all possible false positives.


Expert Solution
Questions # 2:

Refer to the exhibit, which shows a LAN interface connected from FortiGate to two FortiSwitch devices.

Question # 2

What two conclusions can you draw from the corresponding LAN interface? (Choose two.)

Options:

A.

You must enable STP or RSTP on FortiGate and FortiSwitch to avoid layer 2 loopbacks.


B.

The LAN interface must use a 802.3ad type interface.


C.

This connection is using a FortiLInk to manage VLANs on FortiGate.


D.

FortiGate is using an SD-WAN-type interface to connect to a FortiSwitch device with MCLAG.


Expert Solution
Questions # 3:

Refer to the exhibit.

Question # 3

An administrator is deploying a hub and spokes network and using OSPF as dynamic protocol.

Which configuration is mandatory for neighbor adjacency?

Options:

A.

Set bfd enable in the router configuration


B.

Set network-type point-to-multipoint in the hub interface


C.

Set rfc1583-compatible enable in the router configuration


D.

Set virtual-link enable in the hub interface


Expert Solution
Questions # 4:

Refer to the exhibit, which contains the partial output of an OSPF command.

Question # 4

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

Which statement on this FortiGate device is correct?

Options:

A.

The FortiGate device can inject external routing information.


B.

The FortiGate device is in the area 0.0.0.5.


C.

The FortiGate device does not support OSPF ECMP.


D.

The FortiGate device is a backup designated router.


Expert Solution
Questions # 5:

Refer to the exhibit, which shows an ADVPN network.

Question # 5

The client behind Spoke-1 generates traffic to the device located behind Spoke-2.

What is the first message that the hub sends to Spoke-1 to bring up the dynamic tunnel?

Options:

A.

Shortcut query


B.

Shortcut offer


C.

Shortcut reply


D.

Shortcut forward


Expert Solution
Questions # 6:

Refer to the exhibits. The exhibits show a network topology, a firewall policy, and an SSL/SSH inspection profile configuration.

Question # 6

Question # 6

Question # 6

Why is FortiGate unable to detect HTTPS attacks on firewall policy ID 3 targeting the Linux server?

Options:

A.

The administrator must set the policy to inspection mode to analyze the HTTPS packets as expected.


B.

The administrator must enable HTTPS in the protocol port mapping of the deep- inspection SSL/SSH inspection profile.


C.

The administrator must enable SSL inspection of the SSL server and upload the certificate of the Linux server website to the SSL/SSH inspection profile.


D.

The administrator must enable cipher suites in the SSL/SSH inspection profile to decrypt the message.


Expert Solution
Questions # 7:

Refer to the exhibit, which shows a corporate network and a new remote office network.

Question # 7

An administrator must integrate the new remote office network with the corporate enterprise network.

What must the administrator do to allow routing between the two networks?

Options:

A.

The administrator must implement BGP to inject the new remote office network into the corporate FortiGate device


B.

The administrator must configure a static route to the subnet 192.168.l.0/24 on the corporate FortiGate device.


C.

The administrator must configure virtual links on both FortiGate devices.


D.

The administrator must implement OSPF over IPsec on both FortiGate devices.


Expert Solution
Questions # 8:

What action can be taken on a FortiGate to block traffic using IPS protocol decoders, focusing on network transmission patterns and application signatures?

Options:

A.

Use the DNS filter to block application signatures and protocol decoders.


B.

Use application control to limit non-URL-based software handling.


C.

Enable application detection-based SD-WAN rules.


D.

Configure a web filter profile in flow mode.


Expert Solution
Questions # 9:

A vulnerability scan report has revealed that a user has generated traffic to the website example.com (10.10.10.10) using a weak SSL/TLS version supported by the HTTPS web server.

What can the firewall administrator do to block all outdated SSL/TLS versions on any HTTPS web server to prevent possible attacks on user traffic?

Options:

A.

Configure the unsupported SSL version and set the minimum allowed SSL version in the HTTPS settings of the SSL/SSH inspection profile.


B.

Enable auto-detection of outdated SSL/TLS versions in the SSL/SSH inspection profile to block vulnerable websites.


C.

Install the required certificate in the client's browser or use Active Directory policies to block specific websites as defined in the SSL/SSH inspection profile.


D.

Use the latest certificate, Fortinet_SSL_ECDSA256, and replace the CA certificate in the SSL/SSH inspection profile.


Expert Solution
Questions # 10:

An administrator received a FortiAnalyzer alert that a 1 ТВ disk filled up in a day. Upon investigation, they found thousands of unusual DNS log requests, such as JHCMQK.website.com, with no answers. They later discovered that DNS exfiltration was occurring through both UDP and TLS.

How can the administrator prevent this data theft technique?

Options:

A.

Create an inline-CASB to protect against DNS exfiltration.


B.

Configure a File Filter profile to prevent DNS exfiltration.


C.

Enable DNS Filter to protect against DNS exfiltration.


D.

Use an IPS profile and DNS exfiltration-related signatures.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions