ExamGecko
Home Home / Fortinet / FCSS_NST_SE-7.4

Fortinet FCSS_NST_SE-7.4 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Exhibit.

Refer to the exhibit, which contains a screenshot of some phase 1 settings.

The VPN is not up. To diagnose the issue, the administrator enters the following CLI commands on an SSH session on FortiGate:

However, the IKE real-time debug does not show any output. Why?

A.

The administrator must also run the command diagnose debug enable.

A.

The administrator must also run the command diagnose debug enable.

Answers
B.

The debug shows only error messages. If there is no output, then the phase 1 and phase 2 configurations match.

B.

The debug shows only error messages. If there is no output, then the phase 1 and phase 2 configurations match.

Answers
C.

The log-filter setting is incorrect. The VPN traffic does not match this filter.

C.

The log-filter setting is incorrect. The VPN traffic does not match this filter.

Answers
D.

Replace diagnose debug application ike -1 with diagnose debug application ipsec -1.

D.

Replace diagnose debug application ike -1 with diagnose debug application ipsec -1.

Answers
Suggested answer: A

Exhibit.

Refer to the exhibit, which shows a partial output of diagnose hardware aysinfo memory.

Which two statements about the output are true? (Choose two)

A.

There are 98908 kB o! memory that will never be used.

A.

There are 98908 kB o! memory that will never be used.

Answers
B.

The user space has 708880 kB of physical memory that is not used by the system.

B.

The user space has 708880 kB of physical memory that is not used by the system.

Answers
C.

The I/O cache, which has 641364 kB of memory allocated to it.

C.

The I/O cache, which has 641364 kB of memory allocated to it.

Answers
D.

The value indicated next to the inactive heading represents the currently unused cache page.

D.

The value indicated next to the inactive heading represents the currently unused cache page.

Answers
Suggested answer: A, D

Exhibit.

Refer to the exhibit, which shows the output of get system ha status.

NGFW-1 and NGFW-2 have been up for a week.

Which two statements about the output are true? (Choose two)

A.

If a configuration change is made to the primary FortiGate at this time, the secondary will initiate a synchronization reset.

A.

If a configuration change is made to the primary FortiGate at this time, the secondary will initiate a synchronization reset.

Answers
B.

If port 7 becomes disconnected on the secondary, both FortiGate devices will elect itself as primary.

B.

If port 7 becomes disconnected on the secondary, both FortiGate devices will elect itself as primary.

Answers
C.

If FGVM...649 is rebooted. FGVM...650 will become the primary and retain that role, even after FGVM...649 rejoins the cluster.

C.

If FGVM...649 is rebooted. FGVM...650 will become the primary and retain that role, even after FGVM...649 rejoins the cluster.

Answers
D.

If no action is taken, the primary FortiGate will leave the cluster because of the current sync status.

D.

If no action is taken, the primary FortiGate will leave the cluster because of the current sync status.

Answers
Suggested answer: B, C

Exhibit.

Refer to the exhibit, which shows a partial web fillet profile configuration.

Which action does FortiGate lake if a user attempts to access www. dropbox. com, which is categorized as File Sharing and Storage?

A.

FortiGate allows the connection, based on the URL Filter configuration.

A.

FortiGate allows the connection, based on the URL Filter configuration.

Answers
B.

FortiGate blocks the connection as an invalid URL.

B.

FortiGate blocks the connection as an invalid URL.

Answers
C.

FortiGate exempts the connection, based on the Web Content Filter configuration.

C.

FortiGate exempts the connection, based on the Web Content Filter configuration.

Answers
D.

FortiGate blocks the connection, based on the FortiGuard category based filter configuration.

D.

FortiGate blocks the connection, based on the FortiGuard category based filter configuration.

Answers
Suggested answer: D

Refer to the exhibit, which shows the omitted output of a session table entry.

Which two statements are true? (Choose two)

A.

The traffic has been tagged for VLAN 0000.

A.

The traffic has been tagged for VLAN 0000.

Answers
B.

NP7 is handling offloading of this session.

B.

NP7 is handling offloading of this session.

Answers
C.

The traffic matches Policy ID 1.

C.

The traffic matches Policy ID 1.

Answers
D.

The session has been offloaded.

D.

The session has been offloaded.

Answers
Suggested answer: B, D

Refer to the exhibit.

Assuming a default configuration, which three statements are true? (Choose three)

A.

Strict RPF is enabled by default.

A.

Strict RPF is enabled by default.

Answers
B.

User B: Fail. There is no route to 95.56.234.24 using wan2 in the routing table.

B.

User B: Fail. There is no route to 95.56.234.24 using wan2 in the routing table.

Answers
C.

User A: Pass. The default static route through wan1 passes the RPF check regardless of the source IP address.

C.

User A: Pass. The default static route through wan1 passes the RPF check regardless of the source IP address.

Answers
D.

User B: Pass. FortiGate will use asymmetric routing using wan1 to reply to traffic for 95.56.234.24.

D.

User B: Pass. FortiGate will use asymmetric routing using wan1 to reply to traffic for 95.56.234.24.

Answers
E.

User C: Fail. There is no route to 10.0.4.63 using port1 in the touting table.

E.

User C: Fail. There is no route to 10.0.4.63 using port1 in the touting table.

Answers
Suggested answer: B, D, E

Which two statements about Security Fabric communications are true? (Choose two)

A.

FortiTelemetry and Neighbor Discovery both operate using TCP.

A.

FortiTelemetry and Neighbor Discovery both operate using TCP.

Answers
B.

The default port for Neighbor Discovery can be modified.

B.

The default port for Neighbor Discovery can be modified.

Answers
C.

FortiTelemetry must be manually enabled on the FortiGate interface.

C.

FortiTelemetry must be manually enabled on the FortiGate interface.

Answers
D.

By default, the downstream FortiGate establishes a connection with the upstream FortiGate using TCP port 8013.

D.

By default, the downstream FortiGate establishes a connection with the upstream FortiGate using TCP port 8013.

Answers
Suggested answer: C, D

Refer to the exhibit, which contains the output of diagnose vpn tunnel list.

Which command will capture ESP traffic for the VPN named DialUp_0?

A.

diagnose sniffer packet any 'ip proto 50'

A.

diagnose sniffer packet any 'ip proto 50'

Answers
B.

diagnose sniffer packet any 'host 10.0.10.10'

B.

diagnose sniffer packet any 'host 10.0.10.10'

Answers
C.

diagnose sniffer packet any 'esp and host 10.200.3.2'

C.

diagnose sniffer packet any 'esp and host 10.200.3.2'

Answers
D.

diagnose sniffer packet any 'port 4500'

D.

diagnose sniffer packet any 'port 4500'

Answers
Suggested answer: D

Which two statements are true regarding heartbeat messages sent from an FSSO collector agent to FortiGate? (Choose two)

A.

The heartbeat messages can be seen using the command diagnose debug authd fsso list.

A.

The heartbeat messages can be seen using the command diagnose debug authd fsso list.

Answers
B.

The heartbeat messages can be seen in the collector agent logs.

B.

The heartbeat messages can be seen in the collector agent logs.

Answers
C.

The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.

C.

The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.

Answers
D.

The heartbeat messages must be manually enabled on FortiGate.

D.

The heartbeat messages must be manually enabled on FortiGate.

Answers
Suggested answer: B, C

Refer to the exhibit, which shows a truncated output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two)

A.

The name of the configured LDAP server is Lab.

A.

The name of the configured LDAP server is Lab.

Answers
B.

The user is authenticating using CN=John Smith.

B.

The user is authenticating using CN=John Smith.

Answers
C.

FortiOS is able to locate the user in step 3 (Bind Request) of the LDAP authentication process.

C.

FortiOS is able to locate the user in step 3 (Bind Request) of the LDAP authentication process.

Answers
D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Answers
Suggested answer: B, D
Total 40 questions
Go to page: of 4