Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet NSE4_FGT_AD-7.6 - Fortinet NSE 4 - FortiOS 7.6 Administrator

Page: 1 / 3
Total 93 questions

Which three statements about SD-WAN performance SLAs are true? (Choose three.)

A.

They rely on session loss and jitter.

B.

They monitor the state of the FortiGate device.

C.

All the SLA targets can be configured.

D.

They are applied in a SD-WAN rule lowest cost strategy.

E.

They can be measured actively or passively.

Refer to the exhibit.

The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile. An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category. What are two solutions for satisfying the requirement? (Choose two answers)

A.

Configure a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively.

B.

Configure a web override rating for download.com and select Malicious Websites as the subcategory.

C.

Configure a separate firewall policy with action Deny and an FQDN address object for *.download.com as destination address.

D.

Set the Freeware and Software Downloads category Action to Warning.

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two answers)

A.

If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.

B.

If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.

C.

If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP.

D.

If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.

You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.

You cannot access any of the Google applications, but you are able to access www.fortinet.com .

What would you do to resolve this issue?

A.

Change the Inspection mode to Proxy-based.

B.

Set SSL inspection to deep-content-inspection.

C.

Move up Google in the Application and Filter Overrides section to set its priority to 1.

D.

Add Google .com to the URL category in the security profile.

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up.

Based on the phase 2 configuration shown in the exhibit, which two configuration changes will bring phase 2 up? (Choose two.)

A.

On BR1-FGT, set Remote Address to 10.0.11.0/255.255.255.0.

B.

On HQ-NGFW. enable Diffie-Hellman Group 2.

C.

On BR1-FGT. set Seconds to 43200

D.

On HQ-NGFW. set Encryption to AES256.

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and does not block the file, allowing it to be downloaded. The administrator confirms that the traffic matches the configured firewall policy. What are two reasons for the failed virus detection by FortiGate? (Choose two answers)

A.

The selected SSL inspection profile has certificate inspection enabled.

B.

The website is exempted from SSL inspection.

C.

The EICAR test file exceeds the protocol options oversize limit.

D.

The browser does not trust the FortiGate self-signed CA certificate.

Refer to the exhibit.

A routing table is shown

An administrator wants to create a new static route so the traffic to the subnet 172.20.1.0/24 is routed through port2 only. What are the two criteria that the administrator can use to achieve this objective? (Choose two.)

A.

The new static route must have the priority set to 3.

B.

The new static route must have the metric set to 1.

C.

The existing static route through port3 must have the distance set to 11.

D.

The new static route must have the distance set to 9

Refer to the exhibit.

An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

A.

The ABC Com is hitting the category Excessive-Bandwidth.

B.

The ABC.Com Type is set as Application instead of Filter.

C.

The ABC.Com is configured under application profile, which must be configured as a web filter profile.

D.

The ABC Com Action is set to Allow

What are two features of collector agent advanced mode? (Choose two.)

A.

In advanced mode, security profiles can be applied only to user groups, not individual users.

B.

In advanced mode. FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.

C.

Advanced mode uses the Windows convention—NetBios: Domain\Username.

D.

Advanced mode supports nested or inherited groups.

Refer to the exhibit, which shows a partial configuration from the remote authentication server.

Why does the FortiGate administrator need this configuration? (Choose one answer)

A.

To authenticate only the Training user group.

B.

To set up a RADIUS server Secret.

C.

To authenticate and match the Training OU on the RADIUS server.

D.

To authenticate Any FortiGate user groups.