Pass the Fortinet NSE 6 Network Security Specialist NSE6_WCS-7.0 Questions and answers with CertsForce

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

Question # 1

A customer is using the AWS Elastic Load Balancer (ELB).

Which two statements are correct about the ELB configuration? (Choose two.)

Options:

A.

The load balancer is configured to load balance traffic among multiple availability zones.


B.

The Amazon Resource Name is used to access the load balancer node and targets.


C.

You can use the DNS name to reach the targets behind the ELB.


D.

The load balancer is configured for the internal traffic of the virtual public cloud (VPC).


Expert Solution
Questions # 2:

A customer has deployed FortiGate Cloud-Native Firewall (CNF).

Which two statements are correct about policy sets? (Choose two.)

Options:

A.

There is an implicit deny rule at the bottom of the policy set.


B.

The policy set must be manually synchronized to the CNF instance each time it is modified.


C.

A new policy set is created with each deployed CNF instance.


D.

Multiple policy sets can be applied to a single CNF instance.


Expert Solution
Questions # 3:

You are troubleshooting network connectivity issues between two VMs deployed in AWS.

One VM is a FortiGate located on subnet "LAN" that is part of the VPC "Encryption". The other VM is a Windows server located on the subnet "servers" which is also in the "Encryption" VPC. You are unable to ping the Windows server from FortiGate.

What are two reasons for this? (Choose two.)

Options:

A.

The firewall in the Windows VM is blocking the traffic.


B.

The default AWS Network Access Control List (NACL) does not allow this traffic.


C.

By default, AWS does not allow ICMP traffic between subnets.


D.

Add an inbound allow ICMP rule in the security group attached to the windows server.


Expert Solution
Questions # 4:

Refer to the exhibit.

Question # 4

You deployed an active-passive FortiGate HA cluster using a CloudFormation template on an existing VPC. Now you want to test active-passive FortiGate HA failover by running a debug so you can see the API calls to change the Elastic and secondary IP addresses.

Which statement is correct about the output of the debug?

Options:

A.

The routing table for Fgt2 updated successfully, and port2 will provide internet access to Fgt2.


B.

The Elastic IP is associated with port1 of Fgt2.


C.

IP address 10.0.0.13 is now associated with eni-0b61d8afc0aefb8a2.


D.

The Elastic IP is associated with port2 of Fgt2, and the secondary IP address for port1 and port2 was updated successfully.


Expert Solution
Questions # 5:

A customer has implemented GWLB between the partner and application VPCs. FortiGate appliances are deployed in the partner VPC with multiple AZs to inspect traffic transparently.

Which two things will happen to application traffic based on the GWLB deployment? (Choose two.)

Options:

A.

Inbound and outbound traffic will go to multiple devices, which will perform load balancing.


B.

Inbound and outbound traffic will go to the same device, which will perform stateful processing.


C.

The content of the original traffic exchanged between the GWLB and FortiGate will be preserved.


D.

The original traffic exchanged between the GWLB and FortiGate will be hashed for data integrity.


Expert Solution
Questions # 6:

AWS native network services offer vast functionality and inter-connectivity between the cloud and on-premises networks.

Which three additional functions can FortiGate for AWS offer to complement the native services offered by AWS? (Choose three.)

Options:

A.

Higher VPN throughput


B.

Web filtering


C.

OSPF over IPSec


D.

Advanced dynamic routing


E.

Secure SD-WAN with application visibility


Expert Solution
Questions # 7:

Which three statements are correct about VPC flow logs? (Choose three.)

Options:

A.

Flow logs do not capture traffic to and from 169.254.169.254 for instance metadata.


B.

Flow logs do not capture DHCP traffic.


C.

Flow logs can capture traffic to the reserved IP address for the default VPC router.


D.

Flow logs can be used as a security tool to monitor the traffic that is reaching the instance.


E.

Flow logs can capture real-time log streams for the network interfaces.


Expert Solution
Questions # 8:

Refer to the exhibit.

Question # 8

What occurs during a failover for an active-passive (A-P) cluster that is deployed in two different availability zones? (Choose two.)

Options:

A.

The cluster elastic IP address (EIP) is moved from Port1 of FGT-1 to Port1 of FGT-2.


B.

The secondary IP address of Port2 of FGT-1 is moved to Port2 of FGT-2.


C.

The default static route in the Private-AZ1 subnet route table is modified to forward all traffic to Port2 of FGT2.


D.

An additional route is added to the route table of the HA Sync AZ2 subnet to forward all traffic to the Internet GW.


Expert Solution
Questions # 9:

Which three statements correctly describe FortiGate Cloud-Native Firewall (CNF)? (Choose three.)

Options:

A.

It provides carrier-grade protection.


B.

It scales seamlessly.


C.

It uses AWS Elastic Load Balancing (ELB).


D.

It is considered to be a Firewall-as-a-Service (FWaaS).


E.

It can be managed by FortiManager and AWS firewall manager.


Expert Solution
Questions # 10:

You need to deploy a new Windows server in AWS to offload web traffic from an existing web server in a different availability zone.

According to the AWS shared responsibility model, what three actions must you take to secure the new EC2 instance? (Choose three.)

Options:

A.

Update software on the instance.


B.

Change the existing elastic load balancer (ELB) to a gateway load balancer


C.

Configure security groups.


D.

Manage the operating system on the instance.


E.

Move all web servers into the same availability zone.


Expert Solution
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions