New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet FCSS_EFW_AD-7.6 - Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator

Page: 1 / 2
Total 65 questions

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

How will configuring set tcp-mss-sender and set tcp-mss-receiver in a firewall policy affect the size and handling of TCP packets in the network?

A.

The maximum segment size permitted in the firewall policy determines whether TCP packets are allowed or denied.

B.

Applying commands in a firewall policy determines the largest payload a device can handle in a single TCP segment.

C.

The administrator must consider the payload size of the packet and the size of the IP header to configure a correct value in the firewall policy.

D.

The TCP packet modifies the packet size only if the size of the packet is less than the one the administrator configured in the firewall policy.

Refer to the exhibits. The exhibits show a network topology, a firewall policy, and an SSL/SSH inspection profile configuration.

Why is FortiGate unable to detect HTTPS attacks on firewall policy ID 3 targeting the Linux server?

A.

The administrator must set the policy to inspection mode to analyze the HTTPS packets as expected.

B.

The administrator must enable HTTPS in the protocol port mapping of the deep- inspection SSL/SSH inspection profile.

C.

The administrator must enable SSL inspection of the SSL server and upload the certificate of the Linux server website to the SSL/SSH inspection profile.

D.

The administrator must enable cipher suites in the SSL/SSH inspection profile to decrypt the message.

Refer to the exhibit, which contains a partial VPN configuration.

What can you conclude from this VPN IPsec phase 1 configuration?

A.

This configuration is the best for networks with regular traffic intervals, providing a balance between connectivity assurance and resource utilization.

B.

Peer IDs are unencrypted and exposed, creating a security risk.

C.

FortiGate will not add a route to its routing or forwarding information base when the dynamic tunnel is negotiated.

D.

A separate interface is created for each dial-up tunnel, which can be slower and more resource intensive, especially in large networks.

An administrator is extensively using VXLAN on FortiGate.

Which specialized acceleration hardware does FortiGate need to improve its performance?

A.

NP7

B.

SP5

C.

СР9

D.

NTurbo

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.

The ISDB limits access by URL and domain.

Refer to the exhibits.

The Administrators section of a root FortiGate device and the Security Fabric Settings section of a downstream FortiGate device are shown.

When prompted to sign in with Security Fabric in the downstream FortiGate device, a user enters the AdminSSO credentials.

What is the next status for the user?

A.

The user is prompted to create an SSO administrator account for AdminSSO.

B.

The user receives an authentication failure message.

C.

The user accesses the downstream FortiGate with super_admin_readonly privileges.

D.

The user accesses the downstream FortiGate with super_admin privileges.

An administrator must enable direct communication between multiple spokes in a company's network. Each spoke has more than one internet connection.

The requirement is for the spokes to connect directly without passing through the hub, and for the links to automatically switch to the best available connection.

How can this automatic detection and optimal link utilization between spokes be achieved?

A.

Set up OSPF routing over static VPN tunnels between spokes.

B.

Utilize ADVPN 2.0 to facilitate dynamic direct tunnels and automatic link optimization.

C.

Establish static VPN tunnels between spokes with predefined backup routes.

D.

Implement SD-WAN policies at the hub to manage spoke link quality.

An administrator must standardize the deployment of FortiGate devices across branches with consistent interface roles and policy packages using FortiManager.

What is the recommended best practice for interface assignment in this scenario?

A.

Enable metadata variables to use dynamic configurations in the standard interfaces of FortiManager.

B.

Use the Install On feature in the policy package to automatically assign different interfaces based on the branch.

C.

Create interfaces using device database scripts to use them on the same policy package of FortiGate devices.

D.

Create normalized interface types per-platform to automatically recognize device layer interfaces based on the FortiGate model and interface name.

Refer to the exhibit, which shows a network diagram.

An administrator would like to modify the MED value advertised from FortiGate_1 to a BGP neighbor in the autonomous system 30.

What must the administrator configure on FortiGate_1 to implement this?

A.

route-map-out

B.

network-import-check

C.

prefix-list-out

D.

distribute-list-out