Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet FCSS_EFW_AD-7.4 - FCSS - Enterprise Firewall 7.4 Administrator

Page: 1 / 2
Total 57 questions

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

A company that acquired multiple branches across different countries needs to install new FortiGate devices on each of those branches. However, the IT staff lacks sufficient knowledge to implement the initial configuration on the FortiGate devices.

Which three approaches can the company take to successfully deploy advanced initial configurations on remote branches? (Choose three.)

A.

Use metadata variables to dynamically assign values according to each FortiGate device.

B.

Use provisioning templates and install configuration settings at the device layer.

C.

Use the Global ADOM to deploy global object configurations to each FortiGate device.

D.

Apply Jinja in the FortiManager scripts for large-scale and advanced deployments.

E.

Add FortiGate devices on FortiManager as model devices, and use ZTP or LTP to connect to FortiGate devices.

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.

The ISDB limits access by URL and domain.

A company's guest internet policy, operating in proxy mode, blocks access to Artificial Intelligence Technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.

Which configuration changes are required for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443 when full SSL inspection is active in the guest policy?

A.

Add a URL wildcard domain to the website CA certificate and use it in the SSL/SSH Inspection Profile.

B.

In the Protocol Port Mapping section of the SSL/SSH Inspection Profile, enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports.

C.

To analyze nonstandard ports in web filter profiles, use TLSv1.3 in the SSL/SSH Inspection Profile.

D.

Administrators can block traffic on nonstandard ports by enabling the SNI check in the SSL/SSH Inspection Profile.

Refer to the exhibit, which contains the partial output of an OSPF command.

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

What two conclusions can the administrator draw? (Choose two.)

A.

The FortiGate device is a backup designated router

B.

The FortiGate device is connected to multiple areas

C.

The FortiGate device injects external routing information

D.

The FortiGate device has OSPF ECMP enabled

What is the initial step performed by FortiGate when handling the first packets of a session?

A.

Installation of the session key in the network processor (NP)

B.

Data encryption and decryption

C.

Security inspections such as ACL, HPE, and IP integrity header checking

D.

Offloading the packets directly to the content processor (CP)

Refer to the exhibit, which shows a LAN interface connected from FortiGate to two FortiSwitch devices.

What two conclusions can you draw from the corresponding LAN interface? (Choose two.)

A.

You must enable STP or RSTP on FortiGate and FortiSwitch to avoid layer 2 loopbacks.

B.

The LAN interface must use a 802.3ad type interface.

C.

This connection is using a FortiLInk to manage VLANs on FortiGate.

D.

FortiGate is using an SD-WAN-type interface to connect to a FortiSwitch device with MCLAG.

What does the command set forward-domain in a transparent VDOM interface do?

A.

It configures the interface to prioritize traffic based on the domain ID, enhancing quality of service for specified VLANs.

B.

It isolates traffic within a specific VLAN by assigning a broadcast domain to an interface based on the VLAN ID.

C.

It restricts the interface to managing traffic only from the specified VLAN, effectively segregating network traffic.

D.

It assigns a unique domain ID to the interface, allowing it to operate across multiple VLANs within the same VDOM.

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

The administrator must configure the BGP section of FortiGate A to give internet access to the enterprise network.

Which command must the administrator use to establish a connection with the internet service provider?

A.

config neighbor

B.

config redistribute bgp

C.

config router route-map

D.

config redistribute ospf

Refer to the exhibit, which shows the ADVPN network topology and partial BGP configuration.

Which two parameters must an administrator configure in the config neighbor range for spokes shown in the exhibit? (Choose two.)

A.

set max-neighbor-num 2

B.

set neighbor-group advpn

C.

set route-reflector-client enable

D.

set prefix 172.16.1.0 255.255.255.0