Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet FCSS_LED_AR-7.6 - Fortinet NSE 6 - LAN Edge 7.6 Architect

Page: 2 / 2
Total 47 questions

Refer to the exhibits.

The exhibits show the FortiGate logs, widget, and CLI. Security Fabric quarantine automation is being tested using a device with the IP address 10.0.2.1, which is connected to a managed FortiSwitch. Shortly after attempting to access a malicious website, the device loses access to the internet and other VLANs within the network. However, it can still communicate with other devices within the same VLAN. Which configuration change is required to fix the issue?

A.

Replace the IP Ban action with Access Layer Quarantine.

B.

Adjust the IP Ban settings to the Quarantine action.

C.

Adjust the indicator of compromise (IOC) on FortiAnalyzer.

D.

Enable intra-VLAN traffic blocking in the Security Fabric quarantine settings.

Which statement about generating a certificate signing request (CSR) for a CER certificate is true?

A.

Inaccurate or missing fields in the CSR will prevent the CA from validating the request, leading to the rejection of the certificate and possible delays in the deployment process.

B.

If key fields like the common name (CN) and organization (O) are incorrect, the certification authority (CA) will still issue the certificate, but it may not be trusted by certain applications or systems that rely on accurate field information for validation.

C.

CSR fields are primarily used for internal recordkeeping by the requesting organization, and only the public key in the CSR must be accurate for successful certificate signing.

D.

The fields in the CSR are primarily for documentation purposes; any missing or incorrect information will be automatically corrected by the CA during the signing process.

A conference center wireless network provides guest access through a captive portal, allowing unregistered users to self-register and connect to the network. The IT team has been tasked with updating the existing configuration to enforce captive portal authentication over a secure HTTPS connection. Which two steps should the administrator take to implement this change? (Choose two.)

A.

Enable HTTP redirect in the user authentication settings.

B.

Create a new SSID with the HTTPS captive portal URL.

C.

Disable HTTP administrative access on the guest SSID to enforce HTTPS connection.

D.

Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator.

You ' ve configured the FortiLink interface, and the DHCP server is enabled by default. The resulting DHCP server settings are shown in the exhibit. What is the role of the vci-string setting in this configuration?

A.

To ignore DHCP requests coming from FortiSwitch and FortiExtender devices.

B.

To restrict the IP address assignment to devices that have FortiSwitch or FortiExtender as their hostname.

C.

To connect, devices must match the VCI string; otherwise, they will not receive an IP address.

D.

To reserve IP addresses for FortiSwitch and FortiExtender devices.