ExamGecko
Home / Fortinet / FCSS_EFW_AD-7.4 / Practice Test 1
Ask Question

Fortinet FCSS_EFW_AD-7.4 Practice Test 1

Add to Whishlist
00:00:00
Show Answer
Report Issue   Restart test

Question 1 / 40

Refer to the exhibit, which shows a physical topology and a traffic log.

Fortinet FCSS_EFW_AD-7.4 image Question 1 63883969988253315236245

The administrator is checking on FortiAnalyzer traffic from the device with IP address 10.1.10.1, located behind the FortiGate ISFW device.

The firewall policy in on the ISFW device does not have UTM enabled and the administrator is surprised to see a log with the action Malware, as shown in the exhibit.

What are the two reasons FortiAnalyzer would display this log? (Choose two.)

Security rating is enabled in ISFW.

Security rating is enabled in ISFW.

ISFW is in a Security Fabric environment.

ISFW is in a Security Fabric environment.

ISFW is not connected to FortiAnalyzer and must go through NGFW-1.

ISFW is not connected to FortiAnalyzer and must go through NGFW-1.

The firewall policy in NGFW-1 has UTM enabled.

The firewall policy in NGFW-1 has UTM enabled.

Comment (0)
Suggested answer: B, D
Explanation:

From the exhibit, ISFW is part of a Security Fabric environment with NGFW-1 as the Fabric Root. In this architecture, FortiGate devices share security intelligence, including logs and detected threats.

ISFW is in a Security Fabric environment:

Security Fabric allows devices like ISFW to receive threat intelligence from NGFW-1, even if UTM is not enabled locally.

If NGFW-1 detects malware from IP 10.1.10.1 to 89.238.73.97, this information can be propagated to ISFW and FortiAnalyzer.

The firewall policy in NGFW-1 has UTM enabled:

Even though ISFW does not have UTM enabled, NGFW-1 (which sits between ISFW and the external network) does have UTM enabled and is scanning traffic.

Since NGFW-1 detects malware in the session, it logs the event, which is then sent to FortiAnalyzer.

asked 27/05/2025
Ankit Singh
42 questions


Fortinet FCSS_EFW_AD-7.4 Practice Tests