Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Fortinet Fortinet Network Security Expert NSE5_SSE_AD-7.6 Questions and answers with CertsForce

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibits.

Question # 1

The administrator increases the member priority on port2 to 20. Upon configuration changes and the receipt of new packets, which two actions does FortiGate perform on existing sessions established over port2? (Choose two.)

Options:

A.

FortiGate updates the gateway information of the sessions with SNAT so that they use port1 instead of port2.


B.

FortiGate flags the SNAT session as dirty only if the administrator has assigned an IP pool to the firewall policies with NAT.


C.

FortiGate routes only new sessions over port1.


D.

FortiGate continues routing all existing sessions over port2.


E.

FortiGate flags the sessions as dirty.


Expert Solution
Questions # 2:

An existing Fortinet SD-WAN customer who has recently deployed FortiSASE wants to have a comprehensive view of, and combined reports for, both SD-WAN branches and remote users. How can the customer achieve this?

Options:

A.

Forward the logs from FortiSASE to Fortinet SOCaaS.


B.

Forward the logs from FortiGate to FortiSASE.


C.

Forward the logs from FortiSASE to the external FortiAnalyzer.


D.

Forward the logs from the external SD-WAN FortiAnalyzer to FortiSASE.


Expert Solution
Questions # 3:

How does the FortiSASE security dashboard facilitate vulnerability management for FortiClient endpoints? (Choose one answer)

Options:

A.

It automatically patches all vulnerabilities without user intervention and does not categorize vulnerabilities by severity.


B.

It shows vulnerabilities only for applications and requires endpoint users to manually check for affected endpoints.


C.

It displays only critical vulnerabilities, requires manual patching for all endpoints, and does not allow viewing of affected endpoints.


D.

It provides a vulnerability summary, identifies affected endpoints, and supports automatic patching for eligible vulnerabilities.


Expert Solution
Questions # 4:

SD-WAN interacts with many other FortiGate features. Some of them are required to allow SD-WAN to steer the traffic.

Which three configuration elements must you configure before FortiGate can steer traffic according to SD-WAN rules? (Choose three.)

Options:

A.

Firewall policies


B.

Security profiles


C.

Interfaces


D.

Routing


E.

Traffic shaping


Expert Solution
Questions # 5:

Refer to the exhibits.

Question # 5

Two SD-WAN event logs, the member status, the SD-WAN rule configuration, and the health-check configuration for a FortiGate device are shown. Immediately after the log messages are displayed, how will the FortiGate steer the traffic based on the information shown in the exhibits? (Choose one answer)

Options:

A.

FortiGate uses port1 or port2 to steer the traffic for SD-WAN rule ID 1.


B.

FortiGate uses port1 to steer the traffic for SD-WAN rule ID 1.


C.

FortiGate uses port2 to steer the traffic for SD-WAN rule ID 1.


D.

FortiGate skips SD-WAN rule ID 1.


Expert Solution
Questions # 6:

You have configured the performance SLA with the probe mode as Prefer Passive.

What are two observable impacts of this configuration? (Choose two.)

Options:

A.

FortiGate can offload the traffic that is subject to passive monitoring to hardware.


B.

FortiGate passively monitors the member if ICMP traffic is passing through the member.


C.

During passive monitoring, the SLA performance rule cannot detect dead members.


D.

After FortiGate switches to active mode, the SLA performance rule falls back to passive monitoring after 3 minutes.


E.

FortiGate passively monitors the member if TCP traffic is passing through the member.


Expert Solution
Questions # 7:

What is the purpose of the on/off-net rule setting in FortiSASE?

Options:

A.

To enable or disable user authentication for external network access.


B.

To define different traffic routing rules for on-premises and cloud-based resources.


C.

To determine if an endpoint is connecting from a trusted network or untrusted location.


D.

To configure different access policies for users based on their geographical location.


Expert Solution
Questions # 8:

Refer to the exhibit.

Question # 8

The exhibit shows output of the command diagnose sys sdwan service collected on a FortiGate device.

The administrator wants to know through which interface FortiGate will steer traffic from local users on subnet 10.0.1.0/255.255.255.192 and with a destination of the social media application Facebook.

Based on the exhibits, which two statements are correct? (Choose two.)

Options:

A.

FortiGate steers traffic for social media applications according to the service rule 2 and steers traffic through port2.


B.

There is no service defined for the Facebook application, so FortiGate applies service rule 3 and directs the traffic to headquarters.


C.

When FortiGate cannot recognize the application of the flow, it load balances the traffic through the tunnels HQ_T1, HQ_T2, HQ_T3.


D.

When FortiGate cannot recognize the application of the flow, it steers the traffic through the preferred member of rule 3, HQ_T1.


Expert Solution
Questions # 9:

Which three reports are valid report types in FortiSASE? (Choose three.)

Options:

A.

Web Usage Summary Report


B.

Endpoint Compliance Deviation Report


C.

Vulnerability Assessment Report


D.

Shadow IT Report


E.

Cyber Threat Assessment


Expert Solution
Questions # 10:

Which configuration is a valid use case for FortiSASE features in supporting remote users?

Options:

A.

Enabling secure SaaS access through SD-WAN integration, protecting against web-based threats with data loss prevention, and monitoring user connectivity with shadow IT visibility.


B.

Monitoring SaaS application performance, isolating browser sessions for all websites, and integrating with SD-WAN for data loss prevention.


C.

Enabling secure web browsing to protect against threats, providing explicit application access with zero-trust or SD-WAN integration, and addressing shadow IT visibility with data loss prevention.


D.

Providing secure web browsing through remote browser isolation, addressing shadow IT with zero-trust access, and protecting data at rest only.


Expert Solution
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions