Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Fortinet Fortinet Network Security Expert NSE7_CDS_AR-7.6 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

You must add an Amazon Web Services (AWS) network access list (NACL) rule to allow SSH traffic to a subnet for temporary testing purposes. When you review the current inbound and outbound NACL rules, you notice that the rules with number 5 deny SSH and telnet traffic to the subnet.

What can you do to allow SSH traffic?

Options:

A.

You do not have to create any NACL rules because the default security group rule automatically allows SSH traffic to the subnet.


B.

You must create a new allow SSH rule anywhere in the network ACL rule base to allow SSH traffic.


C.

You must create two new allow SSH rules, each with a number bigger than 5.


D.

You must create two new allow SSH rules, each with a number smaller than 5.


Expert Solution
Questions # 2:

An administrator is trying to implement FortiCNP with Microsoft Azure Security integration. However, FortiCNP is not able to extract any cloud integration data from Azure; therefore, real-time cloud security monitoring is not possible.

What is causing this issue?

Options:

A.

The organization is using a free Azure AD license.


B.

The Azure account doesn't have the global administrator role.


C.

The administrator enabled the wrong defender plan for servers.


D.

The FortiCNP account in Azure has the Storage Blob Data Reader role.


Expert Solution
Questions # 3:

Refer to the exhibit.

Question # 3

An administrator installed a FortiWeb ingress controller to protect a containerized web application. What is the reason for the status shown in FortiView? (Choose one answer)

Options:

A.

The SDN connector is not authenticated correctly.


B.

The FortiWeb VM is missing a route to the node subnet.


C.

The manifest file deployed is configured with the wrong node IP addresses.


D.

The load balancing type is not set to round-robin.


Expert Solution
Questions # 4:

A Network security administrator is searching for a solution to secure traffic going in and out of the container infrastructure.

In which two ways can Fortinet container security help secure container infrastructures? (Choose two.)

Options:

A.

FortiGate NGFW can inspect north-south container traffic with label aware policies.


B.

FortiGate NGFW and FortiWeb can be used to secure container traffic.


C.

FortiGate NGFW can connect to the worker nodes and protect the containers.


D.

FortiGate NGFW can be placed between each application container for north-south traffic inspection.


Expert Solution
Questions # 5:

The cloud administration team is reviewing an AWS deployment that was done using CloudFormation.

The deployment includes six FortiGate instances that required custom configuration changes after being deployed. The team notices that unwanted traffic is reaching some of the FortiGate instances because the template is missing a security group.

To resolve this issue, the team decides to update the JSON template with the missing security group and then apply the updated template directly, without using a change set.

What is the result of following this approach?

Options:

A.

If new FortiGate instances are deployed later they will include the updated changes.


B.

Some of the FortiGate instances may be deleted and replaced with new copies.


C.

The update is applied, and the security group is added to all instances without interruption.


D.

CloudFormation rejects the update and warns that a new full stack is required.


Expert Solution
Questions # 6:

Refer to the exhibit.

Question # 6

What is the purpose of this section of an Azure Bicep file?

Options:

A.

To restrict which FortiOS versions are accepted for deployment


B.

To indicate the correct FortiOS upgrade path after deployment


C.

To add a comment with the permitted FortiOS versions that can be deployed


D.

To document the FortiOS versions in the resulting topology


Expert Solution
Questions # 7:

You need a solution to safeguard public cloud-hosted web applications from the OWASP Top 10 vulnerabilities. The solution must support the same region in which your applications reside, with minimum traffic cost.

Which solution meets the requirements?

Options:

A.

Use FortiGate


B.

Use FortiCNP


C.

Use FortiWeb


D.

Use FortiADC


Expert Solution
Questions # 8:

Refer to the exhibit.

Question # 8

A managed security service provider (MSSP) administration team is trying to deploy a new HA cluster in Azure to filter traffic to and from a client that is also using Azure. However, every deployment attempt fails, and only some of the resources are deployed successfully. While troubleshooting this issue, the team runs the command shown in the exhibit.

What are the implications of the output of the command?

Options:

A.

The team will not be able to deploy an A-P FortiGate HA cluster with Azure gateway load balancer.


B.

The team will not be able to deploy an A-P FortiGate HA cluster with Azure load balancer.


C.

The team will not be able to deploy an active-passive (A-P) FortiGate high availability (HA) cluster with SDN connector.


D.

The team will not be able to deploy an active-active (A-P) FortiGate HA cluster with Azure load balancer.


Expert Solution
Questions # 9:

Your DevOps team is evaluating different Infrastructure as Code (IaC) solutions for deploying complex Azure environments.

What is an advantage of choosing Azure Bicep over other IaC tools available?

Options:

A.

Azure Bicep generates deployment logs that are optimized to improve error handling.


B.

Azure Bicep provides immediate support for all Azure services, including those in preview.


C.

Azure Bicep requires less frequent schema updates than Azure Resource Manager (ARM) templates.


D.

Azure Bicep can reduce deployment costs by limiting resource utilization during testing.


Expert Solution
Questions # 10:

What would be the impact of confirming to delete all the resources in Terraform?

Question # 10

Options:

A.

It destroys all the resources tied to the AWS Identity and Access Management (IAM) user.


B.

It destroys all the resources in the resource group.


C.

It destroys all the resources in the .tfstate file.


D.

It destroys all the resources in the .tfvars file.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions