Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet FCSS_EFW_AD-7.6 - Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator

Page: 3 / 4
Total 113 questions

How do you allow IPS inspection of inbound HTTPS traffic?

A.

Enable HTTP

B.

Enable HTTPS mapping

C.

Enable SMTPS

D.

Disable inspection

An administrator configured the FortiGate devices in an enterprise network to join the Fortinet Security Fabric. The administrator has a list of IP addresses that must be blocked by the data center firewall. This list is updated daily.

How can the administrator automate a firewall policy with the daily updated list?

A.

With FortiNAC

B.

With FortiAnalyzer

C.

With a Security Fabric automation

D.

With an external connector from Threat Feeds

Refer to the exhibit.

The packet capture output of a client hello message is shown.

You are updating a firewall policy that includes SSL certificate inspection. You are capturing packets from the traffic passing through this firewall policy.

Which two statements about the packet capture are correct? (Choose two.)

A.

You can effectively apply an antivirus security profile to this traffic.

B.

You can effectively apply a web filtering profile to this traffic.

C.

The subject alternative name (SAN) is necessary to apply security profiles.

D.

The client supports only TLS versions 1.2 and 1.3.

A vulnerability scan report has revealed that a user has generated traffic to the website example.com (10.10.10.10) using a weak SSL/TLS version supported by the HTTPS web server.

What can the firewall administrator do to block all outdated SSL/TLS versions on any HTTPS web server to prevent possible attacks on user traffic?

A.

Configure the unsupported SSL version and set the minimum allowed SSL version in the HTTPS settings of the SSL/SSH inspection profile.

B.

Enable auto-detection of outdated SSL/TLS versions in the SSL/SSH inspection profile to block vulnerable websites.

C.

Install the required certificate in the client ' s browser or use Active Directory policies to block specific websites as defined in the SSL/SSH inspection profile.

D.

Use the latest certificate, Fortinet_SSL_ECDSA256, and replace the CA certificate in the SSL/SSH inspection profile.

What can be inferred from the OSPF status output shown?

A.

Is ASBR

B.

Is BDR

C.

Supports ECMP

D.

Is in area 0.0.0.5

Refer to the exhibit, which shows a revision history window in the FortiManager device layer.

The IT team is trying to identify the administrator responsible for the most recent update in the FortiGate device database.

Which conclusion can you draw about this scenario?

A.

This retrieved process was automatically triggered by a Remote FortiGate Directly (via CLI) script.

B.

The user script_manager is an API user from the Fortinet Developer Network (FDN) retrieving a configuration.

C.

To identify the user who created the event, check it on the Configuration and Installation widget on FortiGate within the FortiManager device layer.

D.

Find the user in the FortiManager system logs and use the type=script command to find the administrator user in the user field.

Which action should you take after applying a block-all IPS profile that caused applications to stop working?

A.

Disable IPS

B.

Use monitor mode

C.

Enable flow mode

D.

Remove server targets

You applied a block-all intrusion prevention system (IPS) profile for client and server targets to secure the server but the database team reported that applications stopped working immediately after.

How can you apply IPS in a way that ensures it does not disrupt existing applications in the network?

A.

Set the IPS profile signature action to default and verify patterns

B.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

C.

Select flow mode in the IPS profile and monitor the application patterns.

D.

Limit the IPS profile to server targets only and set the action to default.

To secure your enterprise network traffic, which step does FortiGate perform first, when handling the first packets of a session? (Choose one answer)

A.

Installation of the session key in the network processor (NP)

B.

Decryption

C.

A reverse path forwarding (RPF) check

D.

IP integrity header checking

How can you automate updates to firewall policies using a daily updated IP block list?

A.

Automation stitch

B.

External Feeds

C.

CLI scripts

D.

ZTNA