New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet FCSS_EFW_AD-7.6 - Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator

Page: 2 / 2
Total 65 questions

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.

C.

Select flow mode in the IPS profile to accurately analyze application patterns.

D.

Set the IPS profile signature action to default to discard all possible false positives.

A user reports that their computer was infected with malware after accessing a secured HTTPS website. However, when the administrator checks the FortiGate logs, they do not see that the website was detected as insecure despite having an SSL certificate and correct profiles applied on the policy.

How can an administrator ensure that FortiGate can analyze encrypted HTTPS traffic on a website?

A.

The administrator must enable reputable websites to allow only SSL/TLS websites rated by FortiGuard web filter.

B.

The administrator must enable URL extraction from SNI on the SSL certificate inspection to ensure the TLS three-way handshake is correctly analyzed by FortiGate.

C.

The administrator must enable DNS over TLS to protect against fake Server Name Indication (SNI) that cannot be analyzed in common DNS requests on HTTPS websites.

D.

The administrator must enable full SSL inspection in the SSL/SSH Inspection Profile to decrypt packets and ensure they are analyzed as expected.

An administrator is designing an ADVPN network for a large enterprise with spokes that have varying numbers of internet links. They want to avoid a high number of routes and peer connections at the hub.

Which method should be used to simplify routing and peer management?

A.

Deploy a full-mesh VPN topology to eliminate hub dependency.

B.

Implement static routing over IPsec interfaces for each spoke.

C.

Use a dynamic routing protocol using loopback interfaces to streamline peers and routes.

D.

Establish a traditional hub-and-spoke VPN topology with policy routes.

A company's guest internet policy, operating in proxy mode, blocks access to Artificial Intelligence Technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.

Which configuration changes are required for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443 when full SSL inspection is active in the guest policy?

A.

Add a URL wildcard domain to the website CA certificate and use it in the SSL/SSH Inspection Profile.

B.

In the Protocol Port Mapping section of the SSL/SSH Inspection Profile, enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports.

C.

To analyze nonstandard ports in web filter profiles, use TLSv1.3 in the SSL/SSH Inspection Profile.

D.

Administrators can block traffic on nonstandard ports by enabling the SNI check in the SSL/SSH Inspection Profile.

A FortiGate device with UTM profiles is reaching the resource limits, and the administrator expects the traffic in the enterprise network to increase.

The administrator has received an additional FortiGate of the same model.

Which two protocols should the administrator use to integrate the additional FortiGate device into this enterprise network? (Choose two.)

A.

FGSP with external load balancers

B.

FGCP in active-active mode and with switches

C.

FGCP in active-passive mode and with VDOM disabled

D.

VRRP with switches

Refer to the exhibit, which shows a corporate network and a new remote office network.

An administrator must integrate the new remote office network with the corporate enterprise network.

What must the administrator do to allow routing between the two networks?

A.

The administrator must implement BGP to inject the new remote office network into the corporate FortiGate device

B.

The administrator must configure a static route to the subnet 192.168.l.0/24 on the corporate FortiGate device.

C.

The administrator must configure virtual links on both FortiGate devices.

D.

The administrator must implement OSPF over IPsec on both FortiGate devices.

Refer to the exhibit, which shows a physical topology and a traffic log.

The administrator is checking on FortiAnalyzer traffic from the device with IP address 10.1.10.1, located behind the FortiGate ISFW device.

The firewall policy in on the ISFW device does not have UTM enabled and the administrator is surprised to see a log with the action Malware, as shown in the exhibit.

What are the two reasons FortiAnalyzer would display this log? (Choose two.)

A.

Security rating is enabled in ISFW.

B.

ISFW is in a Security Fabric environment.

C.

ISFW is not connected to FortiAnalyzer and must go through NGFW-1.

D.

The firewall policy in NGFW-1 has UTM enabled.

During the maintenance window, an administrator must sniff all the traffic going through a specific firewall policy, which is handled by NP6 interfaces. The output of the sniffer trace provides just a few packets.

Why is the output of sniffer trace limited?

A.

The traffic corresponding to the firewall policy is encrypted.

B.

auto-asic-off load is set to enable in the firewall policy,

C.

inspection-mode is set to proxy in the firewall policy.

D.

The option npudbg is not added in the diagnose sniff packet command.

Refer to the exhibit, which contains a partial command output.

The administrator has configured BGP on FortiGate. The status of this new BGP configuration is shown in the exhibit.

What configuration must the administrator consider next?

A.

Configure a static route to 100.65.4.1.

B.

Configure the local AS to 65300.

C.

Contact the remote peer administrator to enable BGP

D.

Enable ebgp-enforce-multihop.