ExamGecko
Home Home / Fortinet / FCP_FGT_AD-7.4

Fortinet FCP_FGT_AD-7.4 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit showing a debug flow output.

What two conclusions can you make from the debug flow output? (Choose two.)

A.

The debug flow is for ICMP traffic.

A.

The debug flow is for ICMP traffic.

Answers
B.

A firewall policy allowed the connection.

B.

A firewall policy allowed the connection.

Answers
C.

A new traffic session was created.

C.

A new traffic session was created.

Answers
D.

The default route is required to receive a reply.

D.

The default route is required to receive a reply.

Answers
Suggested answer: A, C

Explanation:

A - The debug flow is for ICMP traffic.

B . A firewall policy allowed the connection.

C . A new traffic session was created.

D . The default route is required to receive a reply.

The debug flow is for ICMP traffic.

The output shows 'proto=1,' which indicates that the protocol is ICMP (Internet Control Message Protocol).

A new traffic session was created.

The message 'allocate a new session-00003dd5' confirms that a new session was created for this traffic.

Which two statements are correct when FortiGate enters conserve mode? (Choose two.)

A.

FortiGate halts complete system operation and requires a reboot to regain available resources

A.

FortiGate halts complete system operation and requires a reboot to regain available resources

Answers
B.

FortiGate refuses to accept configuration changes

B.

FortiGate refuses to accept configuration changes

Answers
C.

FortiGate continues to run critical security actions, such as quarantine.

C.

FortiGate continues to run critical security actions, such as quarantine.

Answers
D.

FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled

D.

FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled

Answers
Suggested answer: C, D

Explanation:

FortiGate continues to run critical security actions, such as quarantine.

Even in conserve mode, FortiGate prioritizes critical security functions to ensure basic protections are still in place, such as quarantining malicious traffic.

FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled.

When the system is in conserve mode and the 'fail-open' setting is enabled, FortiGate will allow traffic to pass without IPS inspection to ensure traffic flow continuity despite resource limitations.

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name.

FortiGate allows the traffic according to policy ID 1. This is the policy that allows SD-WAN traffic.

Despite these settings the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows.

What can be the reason?

A.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

A.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

Answers
B.

There is no application control profile applied to the firewall policy.

B.

There is no application control profile applied to the firewall policy.

Answers
C.

Destination in the SD-WAN rules are configured per application but the feature visibility is not enabled.

C.

Destination in the SD-WAN rules are configured per application but the feature visibility is not enabled.

Answers
D.

SD-WAN rule names do not appear immediately. The administrator needs to refresh the page.

D.

SD-WAN rule names do not appear immediately. The administrator needs to refresh the page.

Answers
Suggested answer: A

Explanation:

If the SD-WAN traffic logs do not show the specific SD-WAN rule name, it likely means that FortiGate is using the default or implicit SD-WAN rule to balance traffic. The implicit rule comes into effect when no explicit SD-WAN rule is matched, and as a result, the SD-WAN rule name is not displayed in the logs. The default behavior is to load balance the traffic across available interfaces based on SD-WAN strategy.

FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.

Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)

A.

www.example.com:443

A.

www.example.com:443

Answers
B.

www.example.com

B.

www.example.com

Answers
C.

www.example.com/index.hrml

C.

www.example.com/index.hrml

Answers
D.

example.com

D.

example.com

Answers
Suggested answer: B, D

Explanation:

www.example.com

This syntax targets the main domain, which is a common way to configure a web rating override for the home page of a website.

example.com

This syntax also correctly targets the main domain without specifying a subdomain (like 'www'), which is valid for configuring a web rating override for the entire site, including the home page.

An administrator has configured the following settings:

What are the two results of this configuration? (Choose two.)

A.

Denied users are blocked for 30 minutes.

A.

Denied users are blocked for 30 minutes.

Answers
B.

A session for denied traffic is created.

B.

A session for denied traffic is created.

Answers
C.

The number of logs generated by denied traffic is reduced.

C.

The number of logs generated by denied traffic is reduced.

Answers
D.

Device detection on all interfaces is enforced for 30 minutes.

D.

Device detection on all interfaces is enforced for 30 minutes.

Answers
Suggested answer: B, C

Explanation:

A session for denied traffic is created.

The command set ses-denied-traffic enable ensures that sessions for denied traffic are logged, meaning a session will be created for traffic that is denied by security policies.

The number of logs generated by denied traffic is reduced.

The set block-session-timer 30 command sets a timer to prevent excessive logging of denied traffic within a short period, which helps reduce the number of logs generated by repeated denied traffic sessions. This timer blocks sessions for a specified period (30 seconds in this case) to avoid overwhelming the log system with repetitive entries.

Which two statements explain antivirus scanning modes? (Choose two.)

A.

In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.

A.

In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.

Answers
B.

In flow-based inspection mode files bigger than the buffer size are scanned

B.

In flow-based inspection mode files bigger than the buffer size are scanned

Answers
C.

In proxy-based inspection mode files bigger than the buffer size are scanned

C.

In proxy-based inspection mode files bigger than the buffer size are scanned

Answers
D.

In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client

D.

In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client

Answers
Suggested answer: A, D

Explanation:

In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.

Flow-based inspection allows real-time scanning of files as they are being transmitted, with minimal impact on performance.

In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client.

Proxy-based inspection mode holds the file completely, scans it for threats, and only sends the file to the client if no threats are detected.

Refer to the exhibits, which show the firewall policy and the security profile for Facebook.

Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other types of posts.

Which part of the configuration must you change to resolve the issue?

A.

Make the SSL inspection a deep content inspection

A.

Make the SSL inspection a deep content inspection

Answers
B.

Add Facebook to the URL category in the security policy

B.

Add Facebook to the URL category in the security policy

Answers
C.

Disable HTTP redirect to HTTPS on the web browser

C.

Disable HTTP redirect to HTTPS on the web browser

Answers
D.

Get the additional application signatures required to add to the security policy

D.

Get the additional application signatures required to add to the security policy

Answers
Suggested answer: D

Explanation:

In the security profile, there are application overrides for specific Facebook-related features, such as 'Facebook' and 'Facebook_Video.Play.' However, the absence of specific signatures for actions like 'Facebook_Like.Button' might be preventing reactions. You need to ensure that the necessary application signatures for all desired Facebook features, including reactions (like buttons), are included in the security policy. Therefore, retrieving or adding those signatures would resolve the issue.

Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?

A.

Internet Service Database (ISDB) engine

A.

Internet Service Database (ISDB) engine

Answers
B.

Intrusion prevention system engine

B.

Intrusion prevention system engine

Answers
C.

Antivirus engine

C.

Antivirus engine

Answers
D.

Application control engine

D.

Application control engine

Answers
Suggested answer: D

Explanation:

The application control engine on a FortiGate next-generation firewall is responsible for identifying and managing application traffic. It allows administrators to set policies based on application types, regardless of the port or protocol being used.

A FortiGate administrator is required to reduce the attack surface on the SSL VPN portal.

Which SSL timer can you use to mitigate a denial of service (DoS) attack?

A.

SSL VPN dcls-hello-timeout

A.

SSL VPN dcls-hello-timeout

Answers
B.

SSL VPN http-request-header-timeout

B.

SSL VPN http-request-header-timeout

Answers
C.

SSL VPN login-timeout

C.

SSL VPN login-timeout

Answers
D.

SSL VPN idle-timeout

D.

SSL VPN idle-timeout

Answers
Suggested answer: B

Explanation:

The SSL VPN http-request-header-timeout timer is used to mitigate denial of service (DoS) attacks by limiting the amount of time the FortiGate waits for the client to send an HTTP request header after a connection is established. This helps reduce the attack surface by preventing potential attacks that exploit prolonged connection times without fully completing requests.

A FortiGate firewall policy is configured with active authentication however, the user cannot authenticate when accessing a website.

Which protocol must FortiGate allow even though the user cannot authenticate?

A.

ICMP

A.

ICMP

Answers
B.

DNS

B.

DNS

Answers
C.

DHCP

C.

DHCP

Answers
D.

LDAP

D.

LDAP

Answers
Suggested answer: B
Total 86 questions
Go to page: of 9