New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Fortinet Fortinet Certified Professional Network Security FCSS_EFW_AD-7.6 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

How will configuring set tcp-mss-sender and set tcp-mss-receiver in a firewall policy affect the size and handling of TCP packets in the network?

Options:

A.

The maximum segment size permitted in the firewall policy determines whether TCP packets are allowed or denied.


B.

Applying commands in a firewall policy determines the largest payload a device can handle in a single TCP segment.


C.

The administrator must consider the payload size of the packet and the size of the IP header to configure a correct value in the firewall policy.


D.

The TCP packet modifies the packet size only if the size of the packet is less than the one the administrator configured in the firewall policy.


Expert Solution
Questions # 12:

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

Options:

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.


B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.


C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.


D.

The ISDB limits access by URL and domain.


Expert Solution
Questions # 13:

Refer to the exhibit, which shows the HA status of an active-passive cluster.

Question # 13

An administrator wants FortiGate_B to handle the Core2 VDOM traffic.

Which modification must the administrator apply to achieve this?

Options:

A.

The administrator must disable override on FortiGate_A.


B.

The administrator must change the priority from 100 to 160 for FortiGate_B.


C.

The administrator must change the load balancing method on FortiGate_B.


D.

The administrator must change the priority from 128 to 200 for FortiGate_B.


Expert Solution
Questions # 14:

An administrator is setting up an ADVPN configuration and wants to ensure that peer IDs are not exposed during VPN establishment.

Which protocol can the administrator use to enhance security?

Options:

A.

Use IKEv2, which encrypts peer IDs and prevents exposure.


B.

Opt for SSL VPN web mode because it does not use peer IDs at all.


C.

Choose IKEv1 aggressive mode because it simplifies peer identification.


D.

Stick with IKEv1 main mode because it offers better performance.


Expert Solution
Questions # 15:

An administrator is extensively using VXLAN on FortiGate.

Which specialized acceleration hardware does FortiGate need to improve its performance?

Options:

A.

NP7


B.

SP5


C.

СР9


D.

NTurbo


Expert Solution
Questions # 16:

An administrator wants to scale the IBGP sessions and optimize the routing table in an IBGP network.

Which parameter should the administrator configure?

Options:

A.

network-import-check


B.

ibgp-enforce-multihop


C.

neighbor-group


D.

route-reflector-client


Expert Solution
Questions # 17:

Refer to the exhibit, which shows the ADVPN IPsec interface representing the VPN IPsec phase 1 from Hub A to Spoke 1 and Spoke 2, and from Hub В to Spoke 3 and Spoke 4.

Question # 17

An administrator must configure an ADVPN using IBGP and EBGP to connect overlay network 1 with 2.

What must the administrator configure in the phase 1 VPN IPsec configuration of the ADVPN tunnels?

Options:

A.

set auto-discovery-sender enable and set network-id x


B.

set auto-discovery-forwarder enable and set remote-as x


C.

set auto-discovery-crossover enable and set enforce-multihop enable


D.

set auto-discovery-receiver enable and set npu-offload enable


Expert Solution
Questions # 18:

Refer to the exhibit, which shows a physical topology and a traffic log.

Question # 18

The administrator is checking on FortiAnalyzer traffic from the device with IP address 10.1.10.1, located behind the FortiGate ISFW device.

The firewall policy in on the ISFW device does not have UTM enabled and the administrator is surprised to see a log with the action Malware, as shown in the exhibit.

What are the two reasons FortiAnalyzer would display this log? (Choose two.)

Options:

A.

Security rating is enabled in ISFW.


B.

ISFW is in a Security Fabric environment.


C.

ISFW is not connected to FortiAnalyzer and must go through NGFW-1.


D.

The firewall policy in NGFW-1 has UTM enabled.


Expert Solution
Questions # 19:

What does the command set forward-domain in a transparent VDOM interface do?

Options:

A.

It configures the interface to prioritize traffic based on the domain ID, enhancing quality of service for specified VLANs.


B.

It isolates traffic within a specific VLAN by assigning a broadcast domain to an interface based on the VLAN ID.


C.

It restricts the interface to managing traffic only from the specified VLAN, effectively segregating network traffic.


D.

It assigns a unique domain ID to the interface, allowing it to operate across multiple VLANs within the same VDOM.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions