ExamGecko
Home Home / Fortinet / FCP_FGT_AD-7.4

Fortinet FCP_FGT_AD-7.4 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

Which two statements are true about the routing entries in this database table? (Choose two.)

A.
All of the entries in the routing database table are installed in the FortiGate routing table.
A.
All of the entries in the routing database table are installed in the FortiGate routing table.
Answers
B.
The port2 interface is marked as inactive.
B.
The port2 interface is marked as inactive.
Answers
C.
Both default routes have different administrative distances.
C.
Both default routes have different administrative distances.
Answers
D.
The default route on porc2 is marked as the standby route.
D.
The default route on porc2 is marked as the standby route.
Answers
Suggested answer: C, D

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

A.
The host field in the HTTP header.
A.
The host field in the HTTP header.
Answers
B.
The server name indication (SNI) extension in the client hello message.
B.
The server name indication (SNI) extension in the client hello message.
Answers
C.
The subject alternative name (SAN) field in the server certificate.
C.
The subject alternative name (SAN) field in the server certificate.
Answers
D.
The subject field in the server certificate.
D.
The subject field in the server certificate.
Answers
E.
The serial number in the server certificate.
E.
The serial number in the server certificate.
Answers
Suggested answer: B, C, D

Refer to the exhibit.

Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?

A.
All traffic from a source IP to a destination IP is sent to the same interface.
A.
All traffic from a source IP to a destination IP is sent to the same interface.
Answers
B.
Traffic is sent to the link with the lowest latency.
B.
Traffic is sent to the link with the lowest latency.
Answers
C.
Traffic is distributed based on the number of sessions through each interface.
C.
Traffic is distributed based on the number of sessions through each interface.
Answers
D.
All traffic from a source IP is sent to the same interface
D.
All traffic from a source IP is sent to the same interface
Answers
Suggested answer: A

A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.

Which IPsec Wizard template must the administrator apply?

A.
Remote Access
A.
Remote Access
Answers
B.
Site to Site
B.
Site to Site
Answers
C.
Dial up User
C.
Dial up User
Answers
D.
iHub-and-Spoke
D.
iHub-and-Spoke
Answers
Suggested answer: A

Refer to the exhibits, which show the system performance output and the default configuration of high memory usage thresholds in a FortiGate.

Based on the system performance output, what can be the two possible outcomes? (Choose two.)

A.
FortiGate will start sending all files to FortiSandbox for inspection.
A.
FortiGate will start sending all files to FortiSandbox for inspection.
Answers
B.
FortiGate has entered conserve mode.
B.
FortiGate has entered conserve mode.
Answers
C.
Administrators cannot change the configuration.
C.
Administrators cannot change the configuration.
Answers
D.
Administrators can access FortiGate onlythrough the console port.
D.
Administrators can access FortiGate onlythrough the console port.
Answers
Suggested answer: B, D

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device.

Two PCs, PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.

Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

A.
In the firewall policy configuration, add 10. o. l. 3 as an address object in the source field.
A.
In the firewall policy configuration, add 10. o. l. 3 as an address object in the source field.
Answers
B.
In the IP pool configuration, set endig to 192.2.0.12.
B.
In the IP pool configuration, set endig to 192.2.0.12.
Answers
C.
Configure another firewall policy that matches only the address of PC3 as source, and then place the policy on top of the list.
C.
Configure another firewall policy that matches only the address of PC3 as source, and then place the policy on top of the list.
Answers
D.
In the IP pool configuration, set cype to overload.
D.
In the IP pool configuration, set cype to overload.
Answers
Suggested answer: B, D

Which method allows management access to the FortiGate CLI without network connectivity?

A.
SSH console
A.
SSH console
Answers
B.
CLI console widget
B.
CLI console widget
Answers
C.
Serial console
C.
Serial console
Answers
D.
Telnet console
D.
Telnet console
Answers
Suggested answer: B

Refer to the exhibit.

In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output shown in the exhibit.

What should the administrator do next, to troubleshoot the problem?

A.
Execute a debug flow.
A.
Execute a debug flow.
Answers
B.
Capture the traffic using an external sniffer connected to part1.
B.
Capture the traffic using an external sniffer connected to part1.
Answers
C.
Execute another sniffer on FortiGate, this time with the filter 'hose 10.o.1.10'.
C.
Execute another sniffer on FortiGate, this time with the filter 'hose 10.o.1.10'.
Answers
D.
Run a sniffer on the web server.
D.
Run a sniffer on the web server.
Answers
Suggested answer: A

Refer to the exhibit.

The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile.

An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category.

What are two solutions for satisfying the requirement? (Choose two.)

A.
Configure a separate firewall policy with action Deny and an FQDN address object for *. download, com as destination address.
A.
Configure a separate firewall policy with action Deny and an FQDN address object for *. download, com as destination address.
Answers
B.
Set the Freeware and Software Downloads category Action to Warning
B.
Set the Freeware and Software Downloads category Action to Warning
Answers
C.
Configure a web override rating for download, com and select Malicious Websites as the subcategory.
C.
Configure a web override rating for download, com and select Malicious Websites as the subcategory.
Answers
D.
Configure a static URL filter entry for download, com with Type and Action set to Wildcard and Block, respectively.
D.
Configure a static URL filter entry for download, com with Type and Action set to Wildcard and Block, respectively.
Answers
Suggested answer: A, D

Explanation:

To block access specifically to download.com while allowing other sites in the 'Freeware andSoftware Downloads' category, you can create a separate firewall policy with a deny actionspecifically for the FQDN *.download.com. This approach allows blocking this particular sitewithout affecting the other sites in the same category. Alternatively, configuring a static URLfilter entry with the type set to Wildcard and action set to Block will also achieve the desiredeffect by directly blocking the specific URL without impacting other sites in the category.FortiOS 7.4.1 Administration Guide: URL filter configuration

A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.

All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.

Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)

A.
Enable Dead Peer Detection
A.
Enable Dead Peer Detection
Answers
B.
Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.
B.
Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.
Answers
C.
Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.
C.
Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.
Answers
D.
Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.
D.
Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.
Answers
Suggested answer: A, C
Total 86 questions
Go to page: of 9