Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet FCSS_EFW_AD-7.6 - Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator

Page: 2 / 4
Total 113 questions

Refer to the exhibit, which shows the packet capture output of a three-way handshake between FortiGate and FortiManager Cloud.

What two conclusions can you draw from the exhibit? (Choose two.)

A.

FortiGate will receive a certificate that supports multiple domains because FortiManager operates in a cloud computing environment.

B.

FortiGate is connecting to the same IP server and will receive an independent certificate for its connection between FortiGate and FortiManager Cloud.

C.

If the TLS handshake contains 17 cipher suites it means the TLS version must be 1.0 on this three-way handshake.

D.

The wildcard for the domain *.fortinet-ca2.support.fortinet.com must be supported by FortiManager Cloud.

An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.

What two conclusions can the administrator draw? (Choose two.)

A.

The suspicious packet is related to a cluster that has VDOMs enabled.

B.

The network includes FortiGate devices configured with the FGSP protocol.

C.

The suspicious packet is related to a cluster with a group-id value lower than 255.

D.

The suspicious packet corresponds to port 7 on a FortiGate device.

In which two ways does FortiGate utilize the Internet Service Database (ISDB)?

A.

Blocks IPs and ports

B.

Limits by URL

C.

Works in proxy mode

D.

Provides predefined IPs and ports

Refer to the exhibit.

The partial output of an OSPF command is shown. You are checking the OSPF status of a FortiGate device when you receive the output shown in the exhibit. Based on the output, which two statements about FortiGate are correct? (Choose two answers)

A.

FortiGate is a backup designated router.

B.

FortiGate supports OSPF ECMP.

C.

FortiGate is in the area 0.0.0.5.

D.

FortiGate can inject external routing information.

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.

C.

Select flow mode in the IPS profile to accurately analyze application patterns.

D.

Set the IPS profile signature action to default to discard all possible false positives.

Why is the web filter database version not shown in the FortiGuard Security Services dashboard?

A.

The database failed to update

B.

The web filter database is cloud hosted

C.

Flow mode disables the database

D.

FortiGate does not support web filtering

What action can be taken on a FortiGate to block traffic using IPS protocol decoders, focusing on network transmission patterns and application signatures?

A.

Use the DNS filter to block application signatures and protocol decoders.

B.

Use application control to limit non-URL-based software handling.

C.

Enable application detection-based SD-WAN rules.

D.

Configure a web filter profile in flow mode.

Refer to the exhibits.

A policy package conflict status and information from the import device wizard in the Core1 VDOM are shown. When you import a policy package, the following message appears for the Web_restrictions web filter profile and the deep-inspection SSL-SSH profile: " The following objects were found having conflicts. Please confirm your settings, then continue. " The Web_restrictions and deep-inspection profiles are used by other FortiGate devices within FortiManager. Which step must you take to resolve the issue? (Choose one answer)

A.

Retrieve the FortiGate configuration to automatically export correct objects and policies.

B.

Create uniquely named objects on FortiGate and reimport them into the policy package.

C.

Select the FortiManager configuration that accepts changes on FortiManager and preserves existing configurations on FortiGate devices.

D.

Use non-default object values because FortiManager is unable to alter default values.

Refer to the exhibit, which shows the HA status of an active-passive cluster.

An administrator wants FortiGate_B to handle the Core2 VDOM traffic.

Which modification must the administrator apply to achieve this?

A.

The administrator must disable override on FortiGate_A.

B.

The administrator must change the priority from 100 to 160 for FortiGate_B.

C.

The administrator must change the load balancing method on FortiGate_B.

D.

The administrator must change the priority from 128 to 200 for FortiGate_B.

Refer to the exhibit, which shows an ADVPN network.

The client behind Spoke-1 generates traffic to the device located behind Spoke-2.

What is the first message that the hub sends to Spoke-1 to bring up the dynamic tunnel?

A.

Shortcut query

B.

Shortcut offer

C.

Shortcut reply

D.

Shortcut forward