Month End Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet NSE4_FGT_AD-7.6 - Fortinet NSE 4 - FortiOS 7.6 Administrator

Page: 2 / 2
Total 60 questions

Refer to the exhibits.

Based on the current HA status, an administrator updates the override and priority parameters on HQ-NGFW-1 and HQ-NGFW-2 as shown in the exhibits.

What would be the expected outcome in the HA cluster?

A.

HQ-NGFW-2 will take over as the primary because it has the override enable setting and higher priority than HQ-NGFW-1.

B.

HQ-NGFW-1 will remain the primary because HQ-NGFW-2 has lower priority

C.

The HA cluster will become out of sync because the override setting must match on all HA members.

D.

HQ-NGFW-1 will synchronize the override disable setting with HQ-NGFW-2.

Refer to the exhibit.

Which two statements about the FortiGuard connection are true? (Choose two.)

A.

The weight increases as the number of failed packets rises

B.

You can configure unreliable protocols to communicate with FortiGuard Server.

C.

FortiGate identified the FortiGuard Server using DNS lookup.

D.

FortiGate is using the default port for FortiGuard communication.

Which two statements describe characteristics of automation stitches? (Choose two answers)

A.

Actions involve only devices included in the Security Fabric.

B.

An automation stitch can have multiple triggers.

C.

Multiple actions can run in parallel.

D.

Triggers can involve external connectors.

Refer to the exhibit.

What would be the impact of these settings on the Server certificate SNI check configuration on FortiGate?

A.

FortiGate will accept and use the CN in the server certificate for URL filtering if the SNI does not match the CN or SAN fields.

B.

FortiGate will accept the connection with a warning if the SNI does not match the CN or SAN fields.

C.

FortiGate will close the connection if the SNI does not match the CN or SAN fields.

D.

FortiGate will close the connection if the SNI does not match the CN and SAN fields

How does FortiExtender connect to FortiSASE in a site-based, remote internet access method?

A.

FortiExtender uses a Virtual Extensible LAN (VXLAN)-over-IPsec connection.

B.

FortiExtender establishes a secure SSL connection using FortiClient.

C.

FortiExtender first connects to a FortiGate LAN extension through a secure web gateway (SWG).

D.

FortiExtender uses the proxy auto-configuration

Refer to the exhibit.

Which two ways can you view the log messages shown in the exhibit? (Choose two.)

A.

By right clicking the implicit deny policy

B.

Using the FortiGate CLI command diagnose log test

C.

By filtering by policy universally unique identifier (UUID) and application name in the log entry

D.

In the Forward Traffic section

Refer to the exhibits.

You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.

Which two factors can you observe from these configurations? (Choose two.)

A.

YouTube access is blocked based on Excessive-Bandwidth Application and Filter override settings.

B.

Facebook access is blocked based on the category filter settings.

C.

Facebook access is allowed but you cannot play Facebook videos based on Video/Audio category filter settings.

D.

YouTube search is allowed based on the Google Application and Filter override settings.

FortiGate is integrated with FortiAnalyzer and FortiManager.

When creating a firewall policy, which attribute must an administrator include to enhance functionality and enable log recording on FortiAnalyzer and FortiManager?

A.

Universally Unique Identifier

B.

Policy ID

C.

Sequence ID

D.

Log ID