Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet NSE7_NST-7.2 - Fortinet NSE 7 - Network Security 7.2 Support Engineer

Page: 1 / 2
Total 40 questions

Refer to the exhibit, which shows the output of a BGP debug command.

Which statement explains why the state of the 10.200.3.1 peer is Connect?

A.

The local router initiated the BGP session to 10.200.3.1 but did not receive a response.

B.

The local router is receiving BGP keepalives from the remote peer, but the local peer has not received the OpenConf inn yet.

C.

The router 10.200.3.1 has authentication configured for BGP and the local router does not.

D.

The local router has a different AS number than the remote peer.

Refer to the exhibit, which shows a truncated output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two.)

A.

The name of the configured LDAP server is Lab.

B.

The user is authenticating using CN=John Smith.

C.

FortiOS is able to locate the user in step 3 (Bind Request) of the LDAP authentication process.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

There are four exchanges during IKEv2 negotiation.

Which sequence is correct?

A.

IKE_Proposal,ID_Auth, PiggyBack_CHILD and Informational

B.

lnit_Req, Wait_lnit_Req,ID_Auth_Req and Create_CHILD_SA

C.

INIT_Re, INIT_Auth,ID_Child and SET_Nonce

D.

IKE_SAJNIT, IKE_Auth, Create_CHILD_SA and Informational

Refer to the exhibit, which shows the output of diagnose syssessionstat. Which statement about the output shown in the exhibit is correct?

A.

AII the sessions in the session table are TCP sessions.

B.

162 sessions have been deleted because of memory page exhaustion.

C.

There are 166 TCP sessions waiting to complete the three-way handshake.

D.

There are two sessions that have not been removed in case of any out-of-order packets that arrive.

Which two statements about conserve mode are true? (Choose two.)

A.

FortiGate starts dropping all new sessions when the system memory reaches the configured red threshold.

B.

FortiGate starts taking the configured action for new sessions requiring content inspection when the system memory reaches the configured red threshold.

C.

FortiGate enters conserve mode when the system memory reaches the configured extreme threshold.

D.

FortiGate exits conserve mode when the system memory goes below the configured green threshold

What are two functions of automation stitches? (Choose two.)

A.

You can configure automation stitches on any FortiGate device in a Security Fabric environment.

B.

You can create automation stitches to run diagnostic commands and attach the results to an email message when CPU or memory usage exceeds specified thresholds.

C.

An automation stitch configured to execute actions sequentially can take parameters from previous actions as input for the current action.

D.

You can set an automation stitch configured to execute actions in parallel to insert a specific delay between actions.

Refer to the exhibits.

An administrator is attempting to advertise the network configured on port3. However, FGT-A is not receiving the prefix.

Which two actions can the administrator take to fix this problem'' (Choose two.)

A.

Restart BGP using a soft reset, which forces both peers to exchange their complete BGP routing tables.

B.

Manually add the BGP route on FGT-A.

C.

Modify the prefix using the network command from 172.16.0.0/16 to 172.16.54.0724.

D.

Use the set network-import-check disable command.

Referto the exhibit, which shows oneway communication of the downstream FortiGate with the upstream FortiGate within a Security Fabric.

What three actions must you take to ensure successful communication? (Choose three.)

A.

Ensure the port for Neighbor Discovery has been changed.

B.

FortiGate must not be in NAT mode.

C.

Ensure TCP port 8013 is not blocked along the way

D.

You must authorize the downstream FortiGate on the root FortiGate.

E.

You must enable Security Fabric/Fortitelemetry on the receiving interface of the upstream FortiGate.

Refer to the exhibit, which shows the output of a diagnose command.

What can you conclude from the RTT value?

A.

Its value represents the time it takes to receive a response after a rating request is sent to a particular server.

B.

Its value is incremented with each packet lost.

C.

It determines which FortiGuard server is used for license validation.

D.

lts initial value is statically set to 10.

Refer to the exhibit, which shows a truncated output of a real-time RADIUS debug.

Which two statements are true? (Choose two.)

A.

The RADIUS server queried for authentication is located at IP address 172.25.188.164.

B.

Authentication was unsuccessful.

C.

The authentication scheme used was pop3.

D.

Authentication was successful

E.

Two-factor authentication was required.