ExamGecko
Home Home / Fortinet / FCP_FGT_AD-7.4

Fortinet FCP_FGT_AD-7.4 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

The exhibit shows a diagram of a FortiGate device connected to the network, the firewall policy and VIP configuration on the FortiGate device, and the routing table on the ISP router.

When the administrator tries to access the web server public address (203.0.113.2) from the internet, the connection times out. At the same time the administrator runs a sniffer on FortiGate to capture incoming web traffic to the server and does not see any output.

Based on the information shown in the exhibit, what configuration change must the administrator make to fix the connectivity issue?

A.

Configure a loopback interface with address 203.0.113.2/32.

A.

Configure a loopback interface with address 203.0.113.2/32.

Answers
B.

In the VIP configuration, enable arp-reply.

B.

In the VIP configuration, enable arp-reply.

Answers
C.

In the firewall policy configuration, enable match-vip.

C.

In the firewall policy configuration, enable match-vip.

Answers
D.

Enable port forwarding on the server to map the external service port to the internal service port.

D.

Enable port forwarding on the server to map the external service port to the internal service port.

Answers
Suggested answer: B

Explanation:

In this scenario, the FortiGate device is using a Virtual IP (VIP) to map the public IP address (203.0.113.2) to the internal IP address of the web server (172.16.1.10). The fact that the administrator does not see any sniffer output for incoming traffic suggests that the FortiGate is not responding to ARP requests for the public IP address (203.0.113.2).

Enabling arp-reply in the VIP configuration allows the FortiGate to respond to ARP requests for the public IP, thereby allowing traffic to reach the FortiGate, which will then forward it to the web server based on the VIP mapping.

An organization requires remote users to send external application data running on their PCs and access FTP resources through an SSUTLS connection.

Which FortiGate configuration can achieve this goal?

A.

SSL VPN quick connection

A.

SSL VPN quick connection

Answers
B.

SSL VPN tunnel

B.

SSL VPN tunnel

Answers
C.

SSL VPN bookmark

C.

SSL VPN bookmark

Answers
D.

Zero trust network access

D.

Zero trust network access

Answers
Suggested answer: B

Explanation:

An SSL VPN tunnel allows remote users to securely connect to the organization's network and transmit all traffic, including external application data and FTP resources, through an encrypted SSL/TLS connection. This ensures secure access to the network while supporting various protocols such as FTP and other application-specific traffic from the user's PC.

Which three statements explain a flow-based antivirus profile? (Choose three.)

A.

Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection

A.

Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection

Answers
B.

Flow-based inspection optimizes performance compared to proxy-based inspection

B.

Flow-based inspection optimizes performance compared to proxy-based inspection

Answers
C.

FortiGate buffers the whole file but transmits to the client at the same time.

C.

FortiGate buffers the whole file but transmits to the client at the same time.

Answers
D.

If a virus is detected, the last packet is delivered to the client.

D.

If a virus is detected, the last packet is delivered to the client.

Answers
E.

The IPS engine handles the process as a standalone.

E.

The IPS engine handles the process as a standalone.

Answers
Suggested answer: B, C, E

Explanation:

Flow-based inspection optimizes performance compared to proxy-based inspection.

Flow-based inspection scans traffic in real-time as it passes through, resulting in better performance compared to proxy-based inspection, which buffers traffic.

FortiGate buffers the whole file but transmits to the client at the same time.

In flow-based inspection, the file is scanned while it is being transmitted, improving speed and reducing latency.

The IPS engine handles the process as a standalone.

In flow-based antivirus inspection, the IPS engine is used to inspect traffic, making it more efficient and integrated within the broader security mechanisms.

Refer to exhibit.

An administrator configured the web filtering profile shown in the exhibit to block access to all social networking sites except Twitter. However, when users try to access twitter.com, they are redirected to a FortiGuard web filtering block page.

Based on the exhibit, which configuration change can the administrator make to allow Twitter while blocking all other social networking sites?

A.

On the Static URL Filter configuration set Type to Simple

A.

On the Static URL Filter configuration set Type to Simple

Answers
B.

On the FortiGuard Category Based Filter configuration set Action to Warning for Social Networking

B.

On the FortiGuard Category Based Filter configuration set Action to Warning for Social Networking

Answers
C.

On the Static URL Filter configuration set Action to Monitor

C.

On the Static URL Filter configuration set Action to Monitor

Answers
D.

On the Static URL Filter configuration set Action to Exempt

D.

On the Static URL Filter configuration set Action to Exempt

Answers
Suggested answer: D

Explanation:

In the current configuration, although 'twitter.com' is allowed in the Static URL Filter, the category 'Social Networking' is set to 'Block' under the FortiGuard Category Based Filter. To resolve the issue, setting the action to 'Exempt' in the Static URL Filter for 'twitter.com' will bypass the category-based block for this specific URL while still enforcing the block on other social networking sites.

There are multiple dial-up IPsec VPNs configured in aggressive mode on the HQ FortiGate. The requirement is to connect dial-up users to their respective department VPN tunnels.

Which phase 1 setting you can configure to match the user to the tunnel?

A.

Peer ID

A.

Peer ID

Answers
B.

Local Gateway

B.

Local Gateway

Answers
C.

Dead Peer Detection

C.

Dead Peer Detection

Answers
D.

IKE Mode Config

D.

IKE Mode Config

Answers
Suggested answer: A

Explanation:

When using multiple dial-up IPsec VPNs in aggressive mode, the Peer ID setting in Phase 1 can be used to distinguish between different VPN tunnels. Each dial-up user or department can be assigned a unique Peer ID, allowing the FortiGate to match the incoming VPN request to the correct tunnel based on the Peer ID value.

Which three CLI commands, can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.)

A.

execute ping

A.

execute ping

Answers
B.

execute traceroute

B.

execute traceroute

Answers
C.

diagnose sys top

C.

diagnose sys top

Answers
D.

get system arp

D.

get system arp

Answers
E.

diagnose sniffer packet any

E.

diagnose sniffer packet any

Answers
Suggested answer: A, B, D

Explanation:

execute ping

This command helps test network connectivity by sending ICMP echo requests to a specified IP address to check if the device is reachable.

execute traceroute

This command traces the route packets take to a destination, which is useful for identifying network hops and potential delays or routing issues.

get system arp

This command shows the ARP (Address Resolution Protocol) table, which is used to map IP addresses to MAC addresses. It's useful for verifying IP-to-MAC address resolution on the network.

An administrator wants to configure dead peer detection (DPD) on IPsec VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when there is outbound traffic but no response from the peer.

Which DPD mode on FortiGate meets this requirement?

A.

On Demand

A.

On Demand

Answers
B.

On Idle

B.

On Idle

Answers
C.

Disabled

C.

Disabled

Answers
D.

Enabled

D.

Enabled

Answers
Suggested answer: A

Explanation:

The On Demand mode for Dead Peer Detection (DPD) on FortiGate sends DPD probes only when there is outbound traffic and no response from the peer. This mode is used to detect if the peer is still available without continuously sending DPD probes, reducing unnecessary traffic.

Which three statements about SD-WAN zones are true? (Choose three.)

A.

An SD-WAN zone can contain physical and logical interfaces

A.

An SD-WAN zone can contain physical and logical interfaces

Answers
B.

You can use an SD-WAN zone in static route definitions

B.

You can use an SD-WAN zone in static route definitions

Answers
C.

You can define up to three SD-WAN zones per FortiGate device

C.

You can define up to three SD-WAN zones per FortiGate device

Answers
D.

An SD-WAN zone must contains at least two members

D.

An SD-WAN zone must contains at least two members

Answers
E.

An SD-WAN zone is a logical grouping of members

E.

An SD-WAN zone is a logical grouping of members

Answers
Suggested answer: A, B, E

Explanation:

An SD-WAN zone can contain physical and logical interfaces

SD-WAN zones can include both physical and logical interfaces, allowing flexible configuration for different network types.

You can use an SD-WAN zone in static route definitions

SD-WAN zones can be referenced in static routes, enabling dynamic path selection based on SD-WAN rules.

An SD-WAN zone is a logical grouping of members

An SD-WAN zone is a logical grouping of interfaces (members), used to simplify the management and application of SD-WAN rules.

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

A.

Strict RPF checks the best route back to the source using the incoming interface.

A.

Strict RPF checks the best route back to the source using the incoming interface.

Answers
B.

Strict RPF allows packets back to sources with all active routes.

B.

Strict RPF allows packets back to sources with all active routes.

Answers
C.

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

C.

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

Answers
D.

Strict RPF check is run on the first sent and reply packet of any new session.

D.

Strict RPF check is run on the first sent and reply packet of any new session.

Answers
Suggested answer: A

Explanation:

Strict RPF (Reverse Path Forwarding) check ensures that the packet is received on the same interface that the FortiGate device would use to send traffic back to the source. It verifies that the best route to the source of the packet is through the same interface it arrived on, enhancing security by preventing IP spoofing. If the check fails, the packet is dropped.

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

Answers
B.

The browser does not trust the certificate used by FortiGate for SSL inspection

B.

The browser does not trust the certificate used by FortiGate for SSL inspection

Answers
C.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

C.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

Answers
D.

The matching firewall policy is set to proxy inspection mode

D.

The matching firewall policy is set to proxy inspection mode

Answers
Suggested answer: B

Explanation:

When full SSL inspection is enabled, FortiGate intercepts HTTPS traffic, decrypts it for inspection, and re-encrypts it using its own SSL certificate before forwarding it to the browser. If the browser does not trust the SSL certificate being used by FortiGate for re-encryption, it will display certificate warning errors. To resolve this, the certificate used by FortiGate for SSL inspection must be installed and trusted in the browser's certificate store.

Total 86 questions
Go to page: of 9