New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Fortinet Fortinet Certified Professional Network Security FCSS_EFW_AD-7.6 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibits.

Question # 1

A policy package conflict status and information from the import device wizard in the Core1 VDOM are shown. When you import a policy package, the following message appears for the Web_restrictions web filter profile and the deep-inspection SSL-SSH profile: "The following objects were found having conflicts. Please confirm your settings, then continue." The Web_restrictions and deep-inspection profiles are used by other FortiGate devices within FortiManager. Which step must you take to resolve the issue? (Choose one answer)

Options:

A.

Retrieve the FortiGate configuration to automatically export correct objects and policies.


B.

Create uniquely named objects on FortiGate and reimport them into the policy package.


C.

Select the FortiManager configuration that accepts changes on FortiManager and preserves existing configurations on FortiGate devices.


D.

Use non-default object values because FortiManager is unable to alter default values.


Expert Solution
Questions # 2:

An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.

What two conclusions can the administrator draw? (Choose two.)

Options:

A.

The suspicious packet is related to a cluster that has VDOMs enabled.


B.

The network includes FortiGate devices configured with the FGSP protocol.


C.

The suspicious packet is related to a cluster with a group-id value lower than 255.


D.

The suspicious packet corresponds to port 7 on a FortiGate device.


Expert Solution
Questions # 3:

A company's users on an IPsec VPN between FortiGate A and B have experienced intermittent issues since implementing VXLAN. The administrator suspects that packets exceeding the 1500-byte default MTU are causing the problems.

In which situation would adjusting the interface’s maximum MTU value help resolve issues caused by protocols that add extra headers to IP packets?

Options:

A.

Adjust the MTU on interfaces only if FortiGate has the FortiGuard enterprise bundle, which allows MTU modification.


B.

Adjust the MTU on interfaces in all FortiGate devices that support the latest family of Fortinet SPUs: NP7, CP9 and SP5.


C.

Adjust the MTU on interfaces in controlled environments where all devices along the path allow MTU interface changes.


D.

Adjust the MTU on interfaces only in wired connections like PPPoE, optic fiber, and ethernet cable.


Expert Solution
Questions # 4:

A vulnerability scan report has revealed that a user has generated traffic to the website example.com (10.10.10.10) using a weak SSL/TLS version supported by the HTTPS web server.

What can the firewall administrator do to block all outdated SSL/TLS versions on any HTTPS web server to prevent possible attacks on user traffic?

Options:

A.

Configure the unsupported SSL version and set the minimum allowed SSL version in the HTTPS settings of the SSL/SSH inspection profile.


B.

Enable auto-detection of outdated SSL/TLS versions in the SSL/SSH inspection profile to block vulnerable websites.


C.

Install the required certificate in the client's browser or use Active Directory policies to block specific websites as defined in the SSL/SSH inspection profile.


D.

Use the latest certificate, Fortinet_SSL_ECDSA256, and replace the CA certificate in the SSL/SSH inspection profile.


Expert Solution
Questions # 5:

To secure your enterprise network traffic, which step does FortiGate perform first, when handling the first packets of a session? (Choose one answer)

Options:

A.

Installation of the session key in the network processor (NP)


B.

Decryption


C.

A reverse path forwarding (RPF) check


D.

IP integrity header checking


Expert Solution
Questions # 6:

Refer to the exhibit, which shows a network diagram showing the addition of site 2 with an overlapping network segment to the existing VPN IPsec connection between the hub and site 1.

Question # 6

Which IPsec phase 2 configuration must an administrator make on the FortiGate hub to enable equal-cost multi-path (ECMP) routing when multiple remote sites connect with overlapping subnets?

Options:

A.

Set route-overlap to either use-new or use-old


B.

Set net-device to ecmp


C.

Set single-source to enable


D.

Set route-overlap to allow


Expert Solution
Questions # 7:

An administrator configured the FortiGate devices in an enterprise network to join the Fortinet Security Fabric. The administrator has a list of IP addresses that must be blocked by the data center firewall. This list is updated daily.

How can the administrator automate a firewall policy with the daily updated list?

Options:

A.

With FortiNAC


B.

With FortiAnalyzer


C.

With a Security Fabric automation


D.

With an external connector from Threat Feeds


Expert Solution
Questions # 8:

Refer to the exhibit, which shows a hub and spokes deployment.

Question # 8

An administrator is deploying several spokes, including the BGP configuration for the spokes to connect to the hub.

Which two commands allow the administrator to minimize the configuration? (Choose two.)

Options:

A.

neighbor-group


B.

route-reflector-client


C.

neighbor-range


D.

ibgp-enforce-multihop


Expert Solution
Questions # 9:

Refer to the exhibit, which shows the packet capture output of a three-way handshake between FortiGate and FortiManager Cloud.

Question # 9

What two conclusions can you draw from the exhibit? (Choose two.)

Options:

A.

FortiGate will receive a certificate that supports multiple domains because FortiManager operates in a cloud computing environment.


B.

FortiGate is connecting to the same IP server and will receive an independent certificate for its connection between FortiGate and FortiManager Cloud.


C.

If the TLS handshake contains 17 cipher suites it means the TLS version must be 1.0 on this three-way handshake.


D.

The wildcard for the domain *.fortinet-ca2.support.fortinet.com must be supported by FortiManager Cloud.


Expert Solution
Questions # 10:

An administrator is designing an ADVPN network for a large enterprise with spokes that have varying numbers of internet links. They want to avoid a high number of routes and peer connections at the hub.

Which method should be used to simplify routing and peer management?

Options:

A.

Deploy a full-mesh VPN topology to eliminate hub dependency.


B.

Implement static routing over IPsec interfaces for each spoke.


C.

Use a dynamic routing protocol using loopback interfaces to streamline peers and routes.


D.

Establish a traditional hub-and-spoke VPN topology with policy routes.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions