Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet FCP_FMG_AD-7.4 - FCP - FortiManager 7.4 Administrator

Page: 2 / 2
Total 61 questions

What must you consider before deciding to use FortiManager to manage a FortiAnalyzer device?

A.

Confirm that FortiManager has enough storage capacity for the expected logs.

B.

Ensure that FortiAnalyzer features are installed in advance.

C.

Check whether FortiManager is part of a high availability (HA) cluster.

D.

Determine whether the VDOMs of the same FortiGate will be assigned to different ADOMs.

Which configuration setting for FortiGate is part o an ADOM-level database on FortiManager?

A.

NSX-T Service Template

B.

Routing

C.

SNMP

D.

Security profiles

What happens if you create an ADOM with version 7.2, add FortiGate devices running FortiOS 7.2, and then upgrade the FortiGate devices to FortiOS 7.4?

A.

The ADOM can concurrently manage FortiGate devices running different firmware versions.

B.

Adding higher version FortiGate devices to a lower version ADOM triggers an automatic ADOM upgrade.

C.

The ADOM restricts access to devices running lower firmware versions.

D.

Upgrading the FortiGate devices to FortiOS 7.4 may result in ADOM database corruption.

Which output is displayed right after moving the ISFW device from one ADOM to another?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An administrator configures a new OSPF area on FortiManager and has not yet pushed the changes to the managed FortiGate device. In which database will the configuration be saved?

A.

Device-level database

B.

ADOM-level database

C.

Configuration-level database

D.

Revision history database

Refer to the exhibit.

An administrator created two new meta fields in FortiManager.

Which operation can be performed with these parameters?

A.

You can invoke them using the $ character.

B.

You can add them to objects as custom attributes.

C.

You can export them to be used in other ADOMs.

D.

You can use them as variables in scripts.

An administrator created a new ADOM named Training for FortiGate devices only, and added the root FortiGate device of a Security Fabric group to the Training ADOM.

Given the administrator's actions, which statement correctly describes the expected result for the downstream devices in the Security Fabric?

A.

The downstream devices show as unauthorized in the Training ADOM

B.

The downstream devices are automatically authorized.

C.

The downstream devices will appear in the root ADOM.

D.

The downstream devices must be added using the Add Device wizard.

Refer to the exhibit.

Given the configuration shown in the exhibit, what are two results from this configuration? (Choose two.)

A.

Unlocking an ADOM will submit configuration changes automatically to the approval administrator.

B.

Ungraceful closed sessions will keep the ADOM in a locked state until the administrator session times out.

C.

Unlocking an ADOM will install configuration changes automatically on managed devices.

D.

The same administrator can lock more than one ADOM at the same time.