Fortinet FCP_FGT_AD-7.4 Practice Test - Questions Answers, Page 6
List of questions
Related questions
Refer to the exhibit showing a debug flow output.
What two conclusions can you make from the debug flow output? (Choose two.)
The debug flow is for ICMP traffic.
A firewall policy allowed the connection.
A new traffic session was created.
The default route is required to receive a reply.
Which two statements are correct when FortiGate enters conserve mode? (Choose two.)
FortiGate halts complete system operation and requires a reboot to regain available resources
FortiGate refuses to accept configuration changes
FortiGate continues to run critical security actions, such as quarantine.
FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled
Refer to the exhibit.
The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name.
FortiGate allows the traffic according to policy ID 1. This is the policy that allows SD-WAN traffic.
Despite these settings the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows.
What can be the reason?
FortiGate load balanced the traffic according to the implicit SD-WAN rule.
There is no application control profile applied to the firewall policy.
Destination in the SD-WAN rules are configured per application but the feature visibility is not enabled.
SD-WAN rule names do not appear immediately. The administrator needs to refresh the page.
FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.
Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)
www.example.com:443
www.example.com
www.example.com/index.hrml
example.com
An administrator has configured the following settings:
What are the two results of this configuration? (Choose two.)
Denied users are blocked for 30 minutes.
A session for denied traffic is created.
The number of logs generated by denied traffic is reduced.
Device detection on all interfaces is enforced for 30 minutes.
Which two statements explain antivirus scanning modes? (Choose two.)
In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.
In flow-based inspection mode files bigger than the buffer size are scanned
In proxy-based inspection mode files bigger than the buffer size are scanned
In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client
Refer to the exhibits, which show the firewall policy and the security profile for Facebook.
Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other types of posts.
Which part of the configuration must you change to resolve the issue?
Make the SSL inspection a deep content inspection
Add Facebook to the URL category in the security policy
Disable HTTP redirect to HTTPS on the web browser
Get the additional application signatures required to add to the security policy
Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?
Internet Service Database (ISDB) engine
Intrusion prevention system engine
Antivirus engine
Application control engine
A FortiGate administrator is required to reduce the attack surface on the SSL VPN portal.
Which SSL timer can you use to mitigate a denial of service (DoS) attack?
SSL VPN dcls-hello-timeout
SSL VPN http-request-header-timeout
SSL VPN login-timeout
SSL VPN idle-timeout
A FortiGate firewall policy is configured with active authentication however, the user cannot authenticate when accessing a website.
Which protocol must FortiGate allow even though the user cannot authenticate?
ICMP
DNS
DHCP
LDAP
Question