Fortinet FCSS_EFW_AD-7.4 Practice Test - Questions Answers

List of questions
Question 1

Refer to the exhibit, which shows a physical topology and a traffic log.
The administrator is checking on FortiAnalyzer traffic from the device with IP address 10.1.10.1, located behind the FortiGate ISFW device.
The firewall policy in on the ISFW device does not have UTM enabled and the administrator is surprised to see a log with the action Malware, as shown in the exhibit.
What are the two reasons FortiAnalyzer would display this log? (Choose two.)
Security rating is enabled in ISFW.
ISFW is in a Security Fabric environment.
ISFW is not connected to FortiAnalyzer and must go through NGFW-1.
The firewall policy in NGFW-1 has UTM enabled.
From the exhibit, ISFW is part of a Security Fabric environment with NGFW-1 as the Fabric Root. In this architecture, FortiGate devices share security intelligence, including logs and detected threats.
ISFW is in a Security Fabric environment:
Security Fabric allows devices like ISFW to receive threat intelligence from NGFW-1, even if UTM is not enabled locally.
If NGFW-1 detects malware from IP 10.1.10.1 to 89.238.73.97, this information can be propagated to ISFW and FortiAnalyzer.
The firewall policy in NGFW-1 has UTM enabled:
Even though ISFW does not have UTM enabled, NGFW-1 (which sits between ISFW and the external network) does have UTM enabled and is scanning traffic.
Since NGFW-1 detects malware in the session, it logs the event, which is then sent to FortiAnalyzer.
Question 2

Refer to the exhibit, which contains a partial VPN configuration.
What can you conclude from this VPN IPsec phase 1 configuration?
This configuration is the best for networks with regular traffic intervals, providing a balance between connectivity assurance and resource utilization.
Peer IDs are unencrypted and exposed, creating a security risk.
FortiGate will not add a route to its routing or forwarding information base when the dynamic tunnel is negotiated.
A separate interface is created for each dial-up tunnel, which can be slower and more resource intensive, especially in large networks.
This IPsec Phase 1 configuration defines a dynamic VPN tunnel that can accept connections from multiple peers. The settings chosen here suggest a configuration optimized for networks with intermittent traffic patterns while ensuring resources are used efficiently.
Key configurations and their impact:
set type dynamic This allows multiple peers to establish connections dynamically without needing predefined IP addresses.
set ike-version 2 Uses IKEv2, which is more efficient and supports features like EAP authentication and reduced rekeying overhead.
set dpd on-idle Dead Peer Detection (DPD) is triggered only when the tunnel is idle, reducing unnecessary keep-alive packets and improving resource utilization.
set add-route enable FortiGate automatically adds the route to the routing table when the tunnel is established, ensuring connectivity when needed.
set proposal aes128-sha256 aes256-sha256 Uses strong encryption and hashing algorithms, ensuring a secure connection.
set keylife 28800 Sets a longer key lifetime (8 hours), reducing the frequency of rekeying, which is beneficial for stable connections.
Because DPD is set to on-idle, the tunnel will not constantly send keep-alive messages but will still ensure connectivity when traffic is detected. This makes the configuration ideal for networks with regular but non-continuous traffic, balancing security and resource efficiency.
Question 3

A company's users on an IPsec VPN between FortiGate A and B have experienced intermittent issues since implementing VXLAN. The administrator suspects that packets exceeding the 1500-byte default MTU are causing the problems.
In which situation would adjusting the interface's maximum MTU value help resolve issues caused by protocols that add extra headers to IP packets?
Adjust the MTU on interfaces only if FortiGate has the FortiGuard enterprise bundle, which allows MTU modification.
Adjust the MTU on interfaces in all FortiGate devices that support the latest family of Fortinet SPUs: NP7, CP9 and SP5.
Adjust the MTU on interfaces in controlled environments where all devices along the path allow MTU interface changes.
Adjust the MTU on interfaces only in wired connections like PPPoE, optic fiber, and ethernet cable.
When using IPsec VPNs and VXLAN, additional headers are added to packets, which can exceed the default 1500-byte MTU. This can lead to fragmentation issues, dropped packets, or degraded performance.
To resolve this, the MTU (Maximum Transmission Unit) should be adjusted only if all devices in the network path support it. Otherwise, some devices may still drop or fragment packets, leading to continued issues.
Why adjusting MTU helps:
VXLAN adds a 50-byte overhead to packets.
IPsec adds additional encapsulation (ESP, GRE, etc.), increasing the packet size.
If packets exceed the MTU, they may be fragmented or dropped, causing intermittent connectivity issues.
Lowering the MTU on interfaces ensures packets stay within the supported size limit across all network devices.
Question 4

Refer to the exhibit.
A pre-run CLI template that is used in zero-touch provisioning (ZTP) and low-touch provisioning (LTP) with FortiManager is shown.
The template is not assigned even though the configuration has already been installed on FortiGate.
What is true about this scenario?
The administrator did not assign the template correctly when adding the model device because pre-CLI templates remain permanently assigned to the firewall
Pre-run CLI templates are automatically unassigned after their initial installation
Pre-run CLI templates for ZTP and LTP must be unassigned manually after the first installation to avoid conflicting error objects when importing a policy package
The administrator must use post-run CLI templates that are designed for ZTP and LTP
In FortiManager, pre-run CLI templates are used in Zero-Touch Provisioning (ZTP) and Low-Touch Provisioning (LTP) to configure a FortiGate device before it is fully managed by FortiManager.
These templates apply configurations when a device is initially provisioned. Once the pre-run CLI template is executed, FortiManager automatically unassigns it from the device because it is not meant to persist like other policy configurations. This prevents conflicts and ensures that the FortiGate configuration is not repeatedly applied after the initial setup.
Question 5

A company that acquired multiple branches across different countries needs to install new FortiGate devices on each of those branches. However, the IT staff lacks sufficient knowledge to implement the initial configuration on the FortiGate devices.
Which three approaches can the company take to successfully deploy advanced initial configurations on remote branches? (Choose three.)
Use metadata variables to dynamically assign values according to each FortiGate device.
Use provisioning templates and install configuration settings at the device layer.
Use the Global ADOM to deploy global object configurations to each FortiGate device.
Apply Jinja in the FortiManager scripts for large-scale and advanced deployments.
Add FortiGate devices on FortiManager as model devices, and use ZTP or LTP to connect to FortiGate devices.
Use metadata variables to dynamically assign values according to each FortiGate device: Metadata variables in FortiManager allow device-specific configurations to be dynamically assigned without manually configuring each FortiGate. This is especially useful when deploying multiple devices with similar base configurations.
Use provisioning templates and install configuration settings at the device layer: Provisioning templates in FortiManager provide a structured way to configure FortiGate devices. These templates can define interfaces, policies, and settings, ensuring that each device is correctly configured upon deployment.
Add FortiGate devices on FortiManager as model devices, and use ZTP or LTP to connect to FortiGate devices: Zero-Touch Provisioning (ZTP) and Local Touch Provisioning (LTP) help automate the deployment of FortiGate devices. By adding devices as model devices in FortiManager, configurations can be pushed automatically when devices connect for the first time, reducing manual effort.
Question 6

An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.
What two conclusions can the administrator draw? (Choose two.)
The suspicious packet is related to a cluster that has VDOMs enabled.
The network includes FortiGate devices configured with the FGSP protocol.
The suspicious packet is related to a cluster with a group-id value lower than 255.
The suspicious packet corresponds to port 7 on a FortiGate device.
The MAC address e0:23:ff:fc:00:86 follows the format used in FortiGate High Availability (HA) clusters. When FortiGate devices are in an HA configuration, they use virtual MAC addresses for failover and redundancy purposes.
The suspicious packet is related to a cluster that has VDOMs enabled: FortiGate devices with Virtual Domains (VDOMs) enabled use specific MAC address ranges to differentiate HA-related traffic. This MAC address is likely part of that mechanism.
The suspicious packet is related to a cluster with a group-id value lower than 255: FortiGate HA clusters assign virtual MAC addresses based on the group ID. The last octet (00:86) corresponds to a group ID that is below 255, confirming this option.
Question 7

A company's guest internet policy, operating in proxy mode, blocks access to Artificial Intelligence Technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.
Which configuration changes are required for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443 when full SSL inspection is active in the guest policy?
Add a URL wildcard domain to the website CA certificate and use it in the SSL/SSH Inspection Profile.
In the Protocol Port Mapping section of the SSL/SSH Inspection Profile, enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports.
To analyze nonstandard ports in web filter profiles, use TLSv1.3 in the SSL/SSH Inspection Profile.
Administrators can block traffic on nonstandard ports by enabling the SNI check in the SSL/SSH Inspection Profile.
When FortiGate is operating in proxy mode with full SSL inspection enabled, it inspects encrypted HTTPS traffic by default on port 443. However, some websites may use non-standard HTTPS ports (such as 8443), which FortiGate does not inspect unless explicitly configured.
To ensure that FortiGate inspects HTTPS traffic on port 8443, administrators must manually add port 8443 in the Protocol Port Mapping section of the SSL/SSH Inspection Profile. This allows FortiGate to treat HTTPS traffic on port 8443 the same as traffic on port 443, enabling proper inspection and enforcement of FortiGuard category-based web filtering.
Question 8

An administrator needs to install an IPS profile without triggering false positives that can impact applications and cause problems with the user's normal traffic flow.
Which action can the administrator take to prevent false positives on IPS analysis?
Use the IPS profile extension to select an operating system, protocol, and application for all the network internal services and users to prevent false positives.
Enable Scan Outgoing Connections to avoid clicking suspicious links or attachments that can deliver botnet malware and create false positives.
Use an IPS profile with action monitor, however, the administrator must be aware that this can compromise network integrity.
Install missing or expired SSUTLS certificates on the client PC to prevent expected false positives.
False positives in Intrusion Prevention System (IPS) analysis can disrupt legitimate traffic and negatively impact user experience. To reduce false positives while maintaining security, administrators can:
Use IPS profile extensions to fine-tune the settings based on the organization's environment.
Select the correct operating system, protocol, and application types to ensure that IPS signatures match the network's actual traffic patterns, reducing false positives.
Customize signature selection based on the network's specific services, filtering out unnecessary or irrelevant signatures.
Question 9

Refer to the exhibit, which shows a hub and spokes deployment.
An administrator is deploying several spokes, including the BGP configuration for the spokes to connect to the hub.
Which two commands allow the administrator to minimize the configuration? (Choose two.)
neighbor-group
route-reflector-client
neighbor-range
ibgp-enforce-multihop
neighbor-group:
This command is used to group multiple BGP neighbors with the same configuration, reducing redundant configuration.
Instead of defining individual BGP settings for each spoke, the administrator can create a neighbor-group and apply the same policies, reducing manual work.
neighbor-range:
This command allows the configuration of a range of neighbor IPs dynamically, reducing the need to manually define each spoke neighbor.
It automatically adds BGP neighbors that match a given prefix, simplifying deployment.
Question 10

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)
FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.
The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.
The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.
The ISDB limits access by URL and domain.
The Internet Service Database (ISDB) in FortiGate is used to enforce content filtering at Layer 3 (Network Layer) and Layer 4 (Transport Layer) of the OSI model by identifying applications based on their predefined IP addresses and ports.
FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard:
FortiGate retrieves and updates a predefined list of IPs and ports for different internet services from FortiGuard.
This allows FortiGate to block specific services at Layer 3 and Layer 4 without requiring deep packet inspection.
The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard:
ISDB works by matching traffic to known IP addresses and ports of categorized services.
When an application or service is blocked, FortiGate prevents communication by denying traffic based on its destination IP and port number.
Question