Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet NSE5_SSE_AD-7.6 - Fortinet NSE 5 - FortiSASE and SD-WAN 7.6 Core Administrator

Page: 1 / 1
Total 36 questions

You want FortiGate to use SD-WAN rules to steer ping local-out traffic. Which two constraints should you consider? (Choose two.)

A.

You must configure each local-out feature individually to use SD-WAN.

B.

By default, FortiGate uses SD-WAN rules only for local-out traffic that corresponds to ping and traceroute.

C.

You can steer local-out traffic only with SD-WAN rules that use the manual strategy.

D.

By default, FortiGate uses SD-WAN rules only for local-out traffic that corresponds to ping and traceroute.

In which order does a FortiGate device consider the following elements shown in the left column during the route lookup process?

Select the element in the left column, hold and drag it to a blank position in the column on the right. Place the four correct elements in order, placing the first element in the first position at the top of the column. Once you place an element, you can move it again if you want to change your answer before moving to the next question. You need to drop four elements in the work area.

Select and drag the screen divider to change the viewable area of the source and work areas.

Refer to the exhibits.

Two SD-WAN event logs, the member status, the SD-WAN rule configuration, and the health-check configuration for a FortiGate device are shown. Immediately after the log messages are displayed, how will the FortiGate steer the traffic based on the information shown in the exhibits? (Choose one answer)

A.

FortiGate uses port1 or port2 to steer the traffic for SD-WAN rule ID 1.

B.

FortiGate uses port1 to steer the traffic for SD-WAN rule ID 1.

C.

FortiGate uses port2 to steer the traffic for SD-WAN rule ID 1.

D.

FortiGate skips SD-WAN rule ID 1.

An existing Fortinet SD-WAN customer who has recently deployed FortiSASE wants to have a comprehensive view of, and combined reports for, both SD-WAN branches and remote users. How can the customer achieve this?

A.

Forward the logs from FortiSASE to Fortinet SOCaaS.

B.

Forward the logs from FortiGate to FortiSASE.

C.

Forward the logs from FortiSASE to the external FortiAnalyzer.

D.

Forward the logs from the external SD-WAN FortiAnalyzer to FortiSASE.

Which two delivery methods are used for installing FortiClient on a user's laptop? (Choose two.)

A.

Use zero-touch installation through a third-party application store.

B.

Download the installer directly from the FortiSASE portal.

C.

Send an invitation email to selected users containing links to FortiClient installers.

D.

Configure automatic installation through an API to the user's laptop.

Refer to the exhibit.

The exhibit shows output of the command diagnose sys sdwan service collected on a FortiGate device.

The administrator wants to know through which interface FortiGate will steer traffic from local users on subnet 10.0.1.0/255.255.255.192 and with a destination of the social media application Facebook.

Based on the exhibits, which two statements are correct? (Choose two.)

A.

FortiGate steers traffic for social media applications according to the service rule 2 and steers traffic through port2.

B.

There is no service defined for the Facebook application, so FortiGate applies service rule 3 and directs the traffic to headquarters.

C.

When FortiGate cannot recognize the application of the flow, it load balances the traffic through the tunnels HQ_T1, HQ_T2, HQ_T3.

D.

When FortiGate cannot recognize the application of the flow, it steers the traffic through the preferred member of rule 3, HQ_T1.

Which three FortiSASE use cases are possible? (Choose three answers)

A.

Secure Internet Access (SIA)

B.

Secure SaaS Access (SSA)

C.

Secure Private Access (SPA)

D.

Secure VPN Access (SVA)

E.

Secure Browser Access (SBA)

Which three reports are valid report types in FortiSASE? (Choose three.)

A.

Web Usage Summary Report

B.

Endpoint Compliance Deviation Report

C.

Vulnerability Assessment Report

D.

Shadow IT Report

E.

Cyber Threat Assessment

Which statement about security posture tags in FortiSASE is correct?

A.

Multiple tags can be assigned to an endpoint, but only one is used for evaluation.

B.

Multiple tags can be assigned to an endpoint and used for evaluation.

C.

Tags are static and do not change with endpoint status.

D.

Only one tag can be assigned to an endpoint.

SD-WAN interacts with many other FortiGate features. Some of them are required to allow SD-WAN to steer the traffic.

Which three configuration elements must you configure before FortiGate can steer traffic according to SD-WAN rules? (Choose three.)

A.

Firewall policies

B.

Security profiles

C.

Interfaces

D.

Routing

E.

Traffic shaping