Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet FCSS_NST_SE-7.6 - Fortinet NSE 6 - Network Security 7.6 Support Engineer

Page: 1 / 3
Total 95 questions

Refer to the exhibit.

FortiGate is showing continuous high CPU usage During a maintenance window, the CLI command diagnose sys top displays the output shown in the exhibit. The CLI command diagnose twat application ipsmonitor 5 was run. but the CPU usage by daemon ipsengine did not drop Which immediate action can you take to reduce the CPU usage effectively?

A.

Reduce the number of IPS signatures enabled on the active IPS profiles

B.

Execute diagnose test application ipsMonitor 2inatead.

C.

Disable IPS on all firewall policies.

D.

Bypass all IPS engines

What is the correct order of the IKEv2 request-and-response protocol?

A.

Create_Child_SA, IKEAUTH, IKESAJNIT

B.

Create_Child_SA, IKE_SA_INIT. IKE_AUTH

C.

IKE SA INIT, IKE AUTH. Create Child SA OIKE AUTH.

D.

IKE_AUTH_IKE_SA_INIT, Create_Child_SA

Refer to the exhibit.

The exhibit shows a session entry.

Which statement about this TCP session is true?

A.

The session is offloaded using NP7.

B.

Return traffic to the initiator is sent to

C.

It is a TCP session from 10.9.31.117 to 10.1.0.3

D.

The session will expire in one second.

Exhibit.

Refer to the exhibit, which shows the output of diagnose automation test.

What can you observe from the output? (Choose two.)

A.

The automation stitch test is not being logged.

B.

The automation stitch test failed but the HA failover was successful.

C.

An HA failover occurred.

D.

The test was unsuccessful.

Refer to the exhibit.

Which two observations can you make about the web filter traffic captured using the flow tool? (Choose two.)

A.

The session is offloaded to the NPU.

B.

The firewall policy is configured with proxy-based inspection mode.

C.

The web filter profile is configured with proxy-based inspection mode.

D.

The HTTPS port is mapped to 443 in the SSL/SSH Inspection Profile

Exhibit.

Refer to the exhibit, which shows a FortiGate configuration.

An administrator is troubleshooting a web filter issue on FortiGate. The administrator has configured a web filter profile and applied it to a policy; however the web filter is not inspecting any traffic that is passing through the policy.

What must the administrator do to fix the issue?

A.

Disable webfilter-force-off.

B.

Increase webfilter-timeout.

C.

Enable fortiguard-anycast.

D.

Change protocol to TCP.

Which exchange lakes care of DoS protection in IKEv2?

A.

Create_CHILD_SA

B.

IKE_Auth

C.

IKE_Req_INIT

D.

IKE_SA_NIT

Exhibit.

Refer to the exhibit, which shows the output of a session. Which two statements are true? (Choose Iwo.)

A.

The TCP session has been successfully established.

B.

The session was initiated from an authenticated user.

C.

The session is being inspected using flow inspection.

D.

The session is being offloaded.

Refer to the exhibit.

The output of diagnose sys session list command is shown.

If the HA ID for the primary device is 9, what happens if the primary fails and the secondary becomes the primary?

A.

The session is synchronized with the secondary device, however, because application control is applied. the session is marked dirty and has to be reevaluated after failover.

B.

The session will be removed from the session table of the secondary device because the TCP session is not yet fully established.

C.

The session continues to permit traffic on the new primary device after failover. without requiring the client to restart the session with the server.

D.

The session state is preserved but the kernel will re-evaluate the session because the routing information will be flushed

Exhibit.

Refer to the exhibit, which contains partial output from an IKE real-time debug.

Which two statements about this debug output are correct? (Choose two.)

A.

Perfect Forward Secrecy (PFS) is enabled in the configuration.

B.

The local gateway IP address is 10.0.0.1.

C.

It shows a phase 2 negotiation.

D.

The initiator provided remote as its IPsec peer ID.