New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Fortinet NSE 7 Network Security Architect NSE7_PBC-7.2 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

In an SD-WAN TGW Connect topology, which three initial steps are mandatory when routing traffic from a spoke VPC to a security VPC through a Transit Gateway? (Choose three.)

Options:

A.

From the security VPC TGW subnet routing table, point 0.0.0.0/0 traffic to the FortiGate internal port.


B.

From the security VPC FortiGate internal subnet routing table, point 0.0.0.0/0 traffic to the TGW.


C.

From the spoke VPC internal routing table, point 0.0.0.0/0 traffic to the TGW.


D.

From the security VPC TGW subnet routing table, point 0.0.0.0/0 traffic to the TGW.


E.

From both spoke VPCs, and the security VPC, point 0.0.0.0/0 traffic to the Internet Gateway.


Expert Solution
Questions # 2:

What is the main advantage of using SD-WAN Transit Gateway Connect over traditional SD-WAN?

Options:

A.

It eliminates the use of ECMP


B.

You can use GRE-based tunnel attachments


C.

You can combine it with IPsec to achieve higher bandwidth


D.

You can use BGP over IPsec for maximum throughput


Expert Solution
Questions # 3:

Refer to the exhibit

Question # 3

In your Amazon Web Services (AWS), you must allow inbound HTTPS access to the Customer VPC FortiGate VM from the internet However, your HTTPS connection to the FortiGate VM in the Customer VPC is not successful.

Also, you must ensure that the Customer VPC FortiGate VM sends all the outbound Internet traffic through the Security VPC How do you correct this Issue with minimal configuration changes?

(Choose three.)

Options:

A.

Add a route With your local internet public IP address as the destination and target transit gateway


B.

Add route destination 0 0.0 0/0 to target the transit gateway


C.

Add a route With your local internet public IP address as the destination and target internet gateway


D.

Deploy an internet gateway, associate an EIP in the private subnet, edit route tables, and add a new route destination 0.0.0.0/0 to the target internet gateway


E.

Deploy an internet gateway, associate an EIP in the public subnet, and attach the internet gateway to the Customer VPC,


Expert Solution
Questions # 4:

Refer to the exhibit.

Question # 4

You have deployed a Linux EC2 instance in Amazon Web Services (AWS) with the settings shown on the exhibit

What next step must the administrator take to access this instance from the internet?

Options:

A.

Configure the user name and password.


B.

Enable source and destination checks on the instance


C.

Enable SSH and allocate it to the device


D.

Allocate an Elastic IP address and assign it to the instance


Expert Solution
Questions # 5:

How does an administrator secure container environments from newly emerged security threats?

Options:

A.

Use distributed network-related application control signatures.


B.

Use Amazon AWS-related application control signatures


C.

Use Amazon AWS_S3-related application control signatures


D.

Use Docker-related application control signatures


Expert Solution
Questions # 6:

You are automating configuration changes on one of the FortiGate VMS using Linux Red Hat Ansible.

How does Linux Red Hat Ansible connect to FortiGate to make the configuration change?

Options:

A.

It uses a FortiGate internal or external IP address with TCP port 21


B.

It uses SSH as a connection method to FortiOS.


C.

It uses an API.


D.

It uses YAML


Expert Solution
Questions # 7:

An administrator decides to use the Use managed identity option on the FortiGate SDN connector with Microsoft Azure However, the SDN connector is failing on the connection What must the administrator do to correct this issue?

Options:

A.

Make sure to add the Tenant ID on FortiGate side of the configuration


B.

Make sure to set the type to system managed identity on FortiGate SDN connector settings


C.

Make sure to enable the system assigned managed identity on Azure


D.

Make sure to add the Client secret on FortiGate side of the configuration


Expert Solution
Questions # 8:

How does the immutable infrastructure strategy work in automation?

Options:

A.

It runs a single live environment for configuration changes.


B.

It runs one idle and a single live environment for configuration changes.


C.

It runs two live environments for configuration changes.


D.

It runs one idle and two live environments for configuration changes.


Expert Solution
Questions # 9:

What are two main features in Amazon Web Services (AWS) network access control lists (ACLs)? (Choose two.)

Options:

A.

You cannot use Network ACL and Security Group at the same time.


B.

The default network ACL is configured to allow all traffic


C.

NetworkACLs are stateless, and inbound and outbound rules are used for traffic filtering


D.

Network ACLs are tied to an instance


Expert Solution
Questions # 10:

Refer to the exhibit

Question # 10

You attempted to access the Linux1 EC2 instance directly from the internet using its public IP address in AWS.

However, your connection is not successful.

Given the network topology, what can be the issue?

Options:

A.

There is no connection between VPC A and VPC B.


B.

There is no elastic IP address attached to FortiGate in the Security VPC.


C.

The Transit Gateway BGP IP address is incorrect.


D.

There is no internet gateway attached to the Spoke VPC A.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions