Fortinet FCP_FGT_AD-7.4 Practice Test - Questions Answers, Page 5
List of questions
Question 41

Which three methods are used by the collector agent for AD polling? (Choose three.)
The Fortinet Single Sign-On (FSSO) Collector Agent supports three primary methods for ActiveDirectory (AD) polling to collect user information:
WinSecLog: Monitors Windows Security Event Logs for login events.WMI: Uses Windows Management Instrumentation to poll user login sessions.NetAPI: Utilizes the Netlogon API to query domain controllers for user session data.These methods allow the FortiGate to gather user logon information and enforce user-basedpolicies effectively.FortiOS 7.4.1 Administration Guide: FSSO Configuration
Question 42

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.)
When SD-WAN is enabled on FortiGate, the load balancing algorithm for Equal-Cost Multi-Path(ECMP) is configured using the load-balance-mode parameter under SD-WAN settings.However, if SD-WAN is disabled, the ECMP load balancing algorithm can be configured underconfig system settings. This flexibility allows FortiGate to control traffic routing behavior basedon the network configuration and requirements.FortiOS 7.4.1 Administration Guide: ECMP Configuration
Question 43

What are two features of collector agent advanced mode? (Choose two.)
Advanced mode allows for configuration as an LDAP client and supports group filtering directlyon the FortiGate, as well as nested or inherited groups.
Question 44

An administrator configures FortiGuard servers as DNS servers on FortiGate using default settings.
What is true about the DNS connection to a FortiGuard server?
Question 45

Refer to the exhibits, which show the firewall policy and an antivirus profile configuration.
Why is the user unable to receive a block replacement message when downloading an infected file for the first time?
Question 46

Refer to the exhibits.
FGT-1 and FGT-2 are updated with HA configuration commands shown in the exhibit.
What would be the expected outcome in the HA cluster?
Question 47

Refer to the exhibits.
The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration.
An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2.
The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver.
Which two configuration changes can the administrator make to the policy to deny Webserver access for Remote-User2? (Choose two.)
Question 48

What are three key routing principles in SD-WAN? (Choose three.)
By default. SD-WAN members are skipped if they do not have a valid route to the destination
By default. SD-WAN rules are skipped if only one route to the destination is available
By default. SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member
SD-WAN rules have precedence over any other type of routes
Regular policy routes have precedence over SD-WAN rules
By default, SD-WAN members are skipped if they do not have a valid route to the destination
SD-WAN ensures that only members with valid routes to the destination are considered during routing decisions.
By default, SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member
If the best route is not an SD-WAN member, SD-WAN rules are bypassed and standard routing takes over.
SD-WAN rules have precedence over any other type of routes
SD-WAN rules are evaluated first, meaning they take precedence over other routing mechanisms, such as static routes or policy-based routes.
Question 49

Refer to the exhibits, which show a diagram of a FortiGate device connected to the network. VIP object configuration, and the firewall policy configuration.
The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IP address 10.0.1.254/24.
If the host 10.200.3.1 sends a TCP SYN packet on port 8080 to 10.200.1.10, what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?
10.0.1.254, 10.200.1.10, and 8080, respectively
10.0.1.254, 10.0.1.10, and 80, respectively
10.200.3.1, 10.0.1.10, and 80, respectively
10.200.3.1, 10.0.1.10, and 8080, respectively
The source address remains 10.200.3.1 because FortiGate does not modify the source address by default unless NAT is applied (which is disabled in the policy).
The destination address is translated to 10.0.1.10 by the VIP (Virtual IP) object, as this is the internal server address mapped to the external IP 10.200.1.10.
The destination port is translated from 8080 to 80 as per the port forwarding rule configured in the VIP object.
Question 50

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)
The issuer must be a public CA
The CA extension must be set to TRUE
The Authority Key Identifier must be of type SSL
The keyUsage extension must be set to
The CA extension must be set to TRUE
This indicates that the certificate can be used to issue other certificates, a requirement for it to function as a CA.
The keyUsage extension must be set to keyCertSign
This specifies that the certificate can be used to sign other certificates, which is essential for a CA certificate.
Question