Pass the Fortinet Fortinet Certified Solution Specialist FCSS_NST_SE-7.4 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit, which shows a partial output from the get router info routing-table database command.

Question # 1

The administrator wants to configure a default static route for port3 and assign a distance of 50 and a priority of 0.

What will happen to the port1 and port2 default static routes after the port3 default static route is created?

Options:

A.

The port2 default static route will be injected into the forwarding information base (FIB).


B.

The port1 default static route will be injected into the FIB.


C.

Neither of the routes shown in the output will be injected into the FIB.


D.

Both default static routes shown in the output will be injected into the FIB.


Expert Solution
Questions # 2:

Refer to the exhibits.

Question # 2

An administrator Is expecting to receive advertised route 8.8.8.8/32 from FGT-A. On FGT-B, they confirm that the route is being advertised and received, however, the route is not being injected into the routing table. What is the most likely cause of this issue?

Options:

A.

A batter route to the 8.8.8.8/32 network exists in the routing table.


B.

FGT-B is configured with a prefix list denying the 8.8.8.8/32 network to be injected into the routing table.


C.

The administrator has misconfigured redistribution of routes on FGT-A.


D.

FGT-8 is configured with a distribution list denying the 8.8.8.8/32 network to be injected into the routing table.


Expert Solution
Questions # 3:

Which statement about protocol options is true?

Options:

A.

Protocol options allow administrators to configure a maximum number of sessions for each configured protocol.


B.

Protocol options give administrators a streamlined method to instruct FortiGate to block all sessions corresponding to disabled protocols.


C.

Protocol options allow administrators to configure the Any setting for all enabled protocols, which provides the most efficient use of system resources.


D.

Protocol options allow administrators to configure which Layer 4 port numbers map to upper-layer protocols, such as HTTP, SMTP, FTP, and so on.


Expert Solution
Questions # 4:

What are two reasons you might see iprope_in_check() check failed, drop when using the debug flow? (Choose two.)

Options:

A.

Packet was dropped because of policy route misconfiguration.


B.

Packet was dropped because of traffic shaping.


C.

Trusted host list misconfiguration.


D.

VIP or IP pool misconfiguration.


Expert Solution
Questions # 5:

Which two statements about Security Fabric communications are true? (Choose two.)

Options:

A.

FortiTelemetry and Neighbor Discovery both operate using TCP.


B.

The default port for Neighbor Discovery can be modified.


C.

FortiTelemetry must be manually enabled on the FortiGate interface.


D.

By default, the downstream FortiGate establishes a connection with the upstream FortiGate using TCP port 8013.


Expert Solution
Questions # 6:

Which two statements about an auxiliary session ate true? (Choose two.)

Options:

A.

With the auxiliary session selling disabled, only auxiliary sessions are offloaded.


B.

With the auxiliary session setting enabled. ECMP traffic is accelerated to the NP6 processor.


C.

With the auxiliary session setting enabled. Iwo sessions are created in case of routing change.


D.

With the auxiliary session setting disabled, for each traffic path. FortiGate uses the same auxiliary session.


Expert Solution
Questions # 7:

Which two statements are true regarding heartbeat messages sent from an FSSO collector agent to FortiGate? (Choose two.)

Options:

A.

The heartbeat messages can be seen using the command diagnose debug authd fsso list.


B.

The heartbeat messages can be seen in the collector agent logs.


C.

The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.


D.

The heartbeat messages must be manually enabled on FortiGate.


Expert Solution
Questions # 8:

Refer to the exhibit.

Question # 8

Which three pieces of information does the diagnose sys top command provide? (Choose three.)

Options:

A.

The miglogd daemon is running on CPU core ID 0.


B.

The diagnose sys top command has been running for 18 minutes.


C.

The miglogd daemon would be on top of the list, if the administrator pressed m on the keyboard.


D.

The cmdbsvr process is occupying 2.4% of the total user memory space.


E.

If the neweli daemon continues to be in the R state, it will need to be manually restarted.


Expert Solution
Questions # 9:

Refer to the exhibits, which contain the partial configurations of two VPNs on FortiGate.

Question # 9

An administrator has configured two VPNs for two different user groups. Users who are in the Users-2 group are not able to connect to the VPN. After running a diagnostics command, the administrator discovers that FortiGate is not matching the user-2 VPN for members of the Users-2 group.

Which two changes must the administrator make to fix the issue? (Choose two.)

Options:

A.

Change to aggressive mode on both VPNs.


B.

Enable XAuth on both VPNs.


C.

Use different pre-shared keys on both VPNs.


D.

Set up specific peer IDs on both VPNs.


Expert Solution
Questions # 10:

Which two statements about conserve mode are true? (Choose two.)

Options:

A.

FortiGate enters conserve mode when the system memory reaches the configured extreme threshold.


B.

FortiGate starts taking the configured action for new sessions requiring content inspection when the system memory reaches the configured red threshold.


C.

FortiGate exits conserve mode when the system memory goes below the configured green threshold.


D.

FortiGate starts dropping all new sessions when the system memory reaches the configured red threshold.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions