ExamGecko
Home Home / Fortinet / FCP_FGT_AD-7.4

Fortinet FCP_FGT_AD-7.4 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

A.

Enable the parameter Never Timeout in the admin profiles

A.

Enable the parameter Never Timeout in the admin profiles

Answers
B.

Increase the admintimeout value under config system accprofile super_admin.

B.

Increase the admintimeout value under config system accprofile super_admin.

Answers
C.

Increase the admintimeout value under config system global

C.

Increase the admintimeout value under config system global

Answers
D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Answers
Suggested answer: C

Explanation:

To adjust the inactivity timeout for GUI sessions, the administrator should increase the admintimeout value in the global settings. This parameter controls how long an administrator's session can remain idle before it times out and disconnects. This is configured globally and affects all administrators, including those with the 'NOC_Access' profile.

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy.

When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the and does not block the file allowing it to be downloaded.

The administrator confirms that the traffic matches the configured firewall policy.

What are two reasons for the failed virus detection by FortiGate? (Choose two.)

A.

The selected SSL inspection profile has certificate inspection enabled

A.

The selected SSL inspection profile has certificate inspection enabled

Answers
B.

The browser does not trust the FortiGate self-siqned CA certificate

B.

The browser does not trust the FortiGate self-siqned CA certificate

Answers
C.

The EICAR test file exceeds the protocol options oversize limit

C.

The EICAR test file exceeds the protocol options oversize limit

Answers
D.

The website is exempted from SSL inspection

D.

The website is exempted from SSL inspection

Answers
Suggested answer: A, D

Explanation:

The selected SSL inspection profile has certificate inspection enabled

If the SSL inspection profile is set to certificate inspection instead of full SSL inspection, FortiGate will only inspect the certificate of the HTTPS connection but will not decrypt and inspect the actual traffic content, leading to a failure in virus detection.

The website is exempted from SSL inspection

If the website hosting the EICAR test file is exempt from SSL inspection, FortiGate will not decrypt the traffic, meaning it cannot inspect the file content for viruses, resulting in the file being downloaded without detection.

Refer to the exhibit.

Examine the intrusion prevention system (IPS) diagnostic command shown in the exhibit.

If option 5 is used with the IPS diagnostic command and the outcome is a decrease in the CPU usage, what is the correct conclusion?

A.

The IPS engine is blocking all traffic.

A.

The IPS engine is blocking all traffic.

Answers
B.

The IPS engine is inspecting a high volume of traffic.

B.

The IPS engine is inspecting a high volume of traffic.

Answers
C.

The IPS engine is unable to prevent an intrusion attack.

C.

The IPS engine is unable to prevent an intrusion attack.

Answers
D.

The IPS engine will continue to run in a normal state.

D.

The IPS engine will continue to run in a normal state.

Answers
Suggested answer: A

Explanation:

Option 5 in the IPS diagnostic command toggles the bypass status. If this option is used and results in a decrease in CPU usage, it means the IPS engine is no longer processing traffic, effectively blocking or bypassing the traffic. In this case, IPS is not inspecting the traffic anymore, leading to a decrease in CPU usage, which indicates that the traffic might be blocked instead of inspected.

How can you disable RPF checking?

A.

Disable src-check on the interface level settings

A.

Disable src-check on the interface level settings

Answers
B.

Unset fail-alert-interfaces on the interface level settings.

B.

Unset fail-alert-interfaces on the interface level settings.

Answers
C.

Disable fail-detect on the interface level settings.

C.

Disable fail-detect on the interface level settings.

Answers
D.

Disable strict-src-check under system settings.

D.

Disable strict-src-check under system settings.

Answers
Suggested answer: A

Explanation:

To disable RPF (Reverse Path Forwarding) checking on a FortiGate interface, you need to disable the src-check option in the interface settings. This action disables the RPF check, allowing traffic to bypass the verification that it is arriving on the correct interface based on the routing table.

An administrator is configuring an IPsec VPN between site A and site . The Remote Gateway setting in both sites has been configured as Static IP Address.

For site A, the local quick mode selector is 192.168.1.0/24 and the remote quick mode selector is 192.168.2.0/24.

Which subnet must the administrator configure for the local quick mode selector for site B?

A.

192.168.3.0/24

A.

192.168.3.0/24

Answers
B.

192.168.0.0/8

B.

192.168.0.0/8

Answers
C.

192.168.2.0/24

C.

192.168.2.0/24

Answers
D.

192.168.1.0/24

D.

192.168.1.0/24

Answers
Suggested answer: D

Explanation:

For site B, the local quick mode selector should match the remote quick mode selector of site A, and vice versa. Since site A's remote quick mode selector is 192.168.2.0/24 (which is the subnet of site B), site B's local quick mode selector must be 192.168.1.0/24, which is the subnet of site A.

FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively.

Which two statements are true about the requirements of connected physical interfaces on FortiGate? (Choose two.)

A.

Both interfaces must have the interface role assigned

A.

Both interfaces must have the interface role assigned

Answers
B.

Both interfaces must have directly connected routes on the routing table

B.

Both interfaces must have directly connected routes on the routing table

Answers
C.

Both interfaces must have DHCP enabled

C.

Both interfaces must have DHCP enabled

Answers
D.

Both interfaces must have IP addresses assigned

D.

Both interfaces must have IP addresses assigned

Answers
Suggested answer: B, D

Explanation:

Both interfaces must have directly connected routes on the routing table

In NAT mode, each interface must have a corresponding entry in the routing table, typically as a directly connected route, to route traffic between them effectively.

Both interfaces must have IP addresses assigned

In NAT mode, each interface must have an IP address to participate in routing and NAT operations. The IP addresses allow the FortiGate to forward traffic between different network segments.

Which two pieces of information are synchronized between FortiGate HA members? (Choose two.)

A.

OSPF adjacencies

A.

OSPF adjacencies

Answers
B.

IPsec security associations

B.

IPsec security associations

Answers
C.

BGP peerings

C.

BGP peerings

Answers
D.

DHCP leases

D.

DHCP leases

Answers
Suggested answer: B, D

Explanation:

IPsec security associations

IPsec security associations (SAs) are synchronized between HA members to ensure seamless failover and continuity of VPN tunnels.

DHCP leases

DHCP lease information is synchronized between HA members to maintain consistent IP address assignments and prevent disruptions when failover occurs.

Refer to the exhibit.

Based on the routing database shown in the exhibit which two conclusions can you make about the routes? (Choose two.)

A.

There will be eight routes active in the routing table

A.

There will be eight routes active in the routing table

Answers
B.

The port1 and port2 default routes are active in the routing table

B.

The port1 and port2 default routes are active in the routing table

Answers
C.

The port3 default route has the highest distance

C.

The port3 default route has the highest distance

Answers
D.

The port3 default route has the lowest metric

D.

The port3 default route has the lowest metric

Answers
Suggested answer: B, C

Explanation:

The port1 and port2 default routes are active in the routing table

The routes with 0.0.0.0/0 for both port1 and port2 are marked with an asterisk * and > symbol, which indicates that these routes are active and selected in the routing table.

The port3 default route has the highest distance

The route via port3 has a distance of [20/0], which is higher than the distances for the routes via port1 [10/0] and port2 [30/0]. This indicates that the port3 default route has the highest distance.

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

A.

FortiGate directs the collector agent to use a remote LDAP server.

A.

FortiGate directs the collector agent to use a remote LDAP server.

Answers
B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

Answers
C.

FortiGate does not support workstation check.

C.

FortiGate does not support workstation check.

Answers
D.

FortiGate uses the AD server as the collector agent.

D.

FortiGate uses the AD server as the collector agent.

Answers
Suggested answer: B, C

Explanation:

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

In agentless polling mode, FortiGate directly connects to the Domain Controllers (DCs) using the SMB protocol to read event logs and detect user login events.

FortiGate does not support workstation check.

In agentless polling mode, FortiGate does not perform workstation checks. It relies on polling the event logs from the Domain Controllers to identify user logins.

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

A.

The NetSessionEnum function is used to track user logouts.

A.

The NetSessionEnum function is used to track user logouts.

Answers
B.

NetAPI polling can increase bandwidth usage in large networks.

B.

NetAPI polling can increase bandwidth usage in large networks.

Answers
C.

The collector agent must search Windows application event logs.

C.

The collector agent must search Windows application event logs.

Answers
D.

The collector agent uses a Windows API to query DCs for user logins.

D.

The collector agent uses a Windows API to query DCs for user logins.

Answers
Suggested answer: D

Explanation:

In NetAPI polling mode, the FSSO (Fortinet Single Sign-On) collector agent uses the NetAPI (Windows API) to query the Domain Controllers (DCs) for user login sessions. This method allows the collector agent to retrieve information about active user sessions without directly scanning event logs.

Total 86 questions
Go to page: of 9