ExamGecko
Home Home / Fortinet / NSE4_FGT-7.2

Fortinet NSE4_FGT-7.2 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Refer to the exhibit.

An administrator added a configuration for a new RADIUS server. While configuring, the administrator selected the Include in every user group option.

What is the impact of using the Include in every user group option in a RADIUS configuration?

A.
This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group.
A.
This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group.
Answers
B.
This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case, is FortiAuthenticator.
B.
This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case, is FortiAuthenticator.
Answers
C.
This option places all users into every RADIUS user group, including groups that are used for the LDAP server on FortiGate.
C.
This option places all users into every RADIUS user group, including groups that are used for the LDAP server on FortiGate.
Answers
D.
This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group.
D.
This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group.
Answers
Suggested answer: A

Refer to the exhibit.

The exhibit contains a network diagram, central SNAT policy, and IP pool configuration.

The WAN (port1) interface has the IP address 10.200. 1. 1/24.

The LAN (port3) interface has the IP address 10.0. 1.254/24.

A firewall policy is configured to allow to destinations from LAN (port3) to WAN (port1).

Central NAT is enabled, so NAT settings from matching Central SNAT policies will be applied.

Which IP address will be used to source NAT the traffic, if the user on Local-Client (10.0. 1. 10) pings the IP address of Remote-FortiGate (10.200.3. 1)?

A.
10.200. 1. 149
A.
10.200. 1. 149
Answers
B.
10.200. 1. 1
B.
10.200. 1. 1
Answers
C.
10.200. 1.49
C.
10.200. 1.49
Answers
D.
10.200. 1.99
D.
10.200. 1.99
Answers
Suggested answer: D

Refer to the exhibit.

Based on the administrator profile settings, what permissions must the administrator set to run the diagnose firewall auth list CLI command on FortiGate?

A.
Custom permission for Network
A.
Custom permission for Network
Answers
B.
Read/Write permission for Log & Report
B.
Read/Write permission for Log & Report
Answers
C.
CLI diagnostics commands permission
C.
CLI diagnostics commands permission
Answers
D.
Read/Write permission for Firewall
D.
Read/Write permission for Firewall
Answers
Suggested answer: C

Explanation:

https://kb.fortinet.com/kb/documentLink.do?externalID=FD50220

Refer to the exhibits.

The exhibits show a network diagram and firewall configurations.

An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2. Remote-User1 must be able to access the Webserver. Remote-User2 must not be able to access the Webserver.

In this scenario, which two changes can the administrator make to deny Webserver access for Remote-User2? (Choose two.)

A.
Disable match-vip in the Deny policy.
A.
Disable match-vip in the Deny policy.
Answers
B.
Set the Destination address as Deny_IP in the Allow-access policy.
B.
Set the Destination address as Deny_IP in the Allow-access policy.
Answers
C.
Enable match vip in the Deny policy.
C.
Enable match vip in the Deny policy.
Answers
D.
Set the Destination address as Web_server in the Deny policy.
D.
Set the Destination address as Web_server in the Deny policy.
Answers
Suggested answer: B, C

Explanation:

https://community.fortinet.com/t5/FortiGate/Technical-Tip-Firewall-does-not-block-incoming-WAN-to-LAN/ta-p/189641

The exhibits show a network diagram and firewall configurations for a FortiGate unit that has two policies: Allow_access and Deny. The Allow_access policy allows traffic from the WAN (port1) interface to the LAN (port3) interface with the destination address of VIP and the service of HTTPS. The VIP object maps the external IP address 10.200.1.10 and port 10443 to the internal IP address 10.0.1.10 and port 443 of the Webserver. The Deny policy denies traffic from the WAN (port1) interface to the LAN (port3) interface with the source address of Deny_IP and the destination address of All.

In this scenario, the administrator wants to deny Webserver access for Remote-User2, who has the IP address 10.200.3.2, which is included in the Deny_IP address object. Remote-User1, who has the IP address 10.200.3.1, must be able to access the Webserver.

To achieve this goal, the administrator can make two changes to deny Webserver access for Remote-User2:

Set the Destination address as Webserver in the Deny policy. This will make the Deny policy more specific and match only the traffic that is destined for the Webserver's internal IP address, instead of any destination address.

Enable match-vip in the Deny policy. This will make the Deny policy apply to traffic that matches a VIP object, instead of ignoring it1. This way, the Deny policy will block Remote-User2's traffic that uses the VIP object's external IP address and port.

An administrator is running the following sniffer command:

Which three pieces of Information will be Included in me sniffer output? {Choose three.)

A.
Interface name
A.
Interface name
Answers
B.
Packet payload
B.
Packet payload
Answers
C.
Ethernet header
C.
Ethernet header
Answers
D.
IP header
D.
IP header
Answers
E.
Application header
E.
Application header
Answers
Suggested answer: A, B, D

Refer to the exhibit.

Refer to the FortiGuard connection debug output.

Based on the output shown in the exhibit, which two statements are correct? (Choose two.)

A.
A local FortiManager is one of the servers FortiGate communicates with.
A.
A local FortiManager is one of the servers FortiGate communicates with.
Answers
B.
One server was contacted to retrieve the contract information.
B.
One server was contacted to retrieve the contract information.
Answers
C.
There is at least one server that lost packets consecutively.
C.
There is at least one server that lost packets consecutively.
Answers
D.
FortiGate is using default FortiGuard communication settings.
D.
FortiGate is using default FortiGuard communication settings.
Answers
Suggested answer: B, D

Explanation:

FortiGate Security 7.2 Study Guide (p.287-288): 'Flags: D (IP returned from DNS), I (Contract server contacted), T (being timed), F (failed)' 'By default, FortiGate is configured to enforce the use of HTTPS port 443 to perform live filtering with FortiGuard or FortiManager. Other ports and protocols are available by disabling the FortiGuard anycast setting on the CLI.'

FortiGate is operating in NAT mode and is configured with two virtual LAN (VLAN) subinterfaces added to the same physical interface.

In this scenario, what are two requirements for the VLAN ID? (Choose two.)

A.
The two VLAN subinterfaces can have the same VLAN ID, only if they have IP addresses in the same subnet.
A.
The two VLAN subinterfaces can have the same VLAN ID, only if they have IP addresses in the same subnet.
Answers
B.
The two VLAN subinterfaces can have the same VLAN ID, only if they belong to different VDOMs.
B.
The two VLAN subinterfaces can have the same VLAN ID, only if they belong to different VDOMs.
Answers
C.
The two VLAN subinterfaces must have different VLAN IDs.
C.
The two VLAN subinterfaces must have different VLAN IDs.
Answers
D.
The two VLAN subinterfaces can have the same VLAN ID, only if they have IP addresses in different subnets.
D.
The two VLAN subinterfaces can have the same VLAN ID, only if they have IP addresses in different subnets.
Answers
Suggested answer: B, C

Explanation:

https://community.fortinet.com/t5/FortiGate/Technical-Note-How-to-use-emac-vlan-to-share-the-same-VLAN/ta-p/192843?externalID=FD43883

When FortiGate is operating in NAT mode, it means that it uses network address translation (NAT) to modify the source or destination IP addresses of the traffic passing through it1. NAT mode allows FortiGate to hide the IP addresses of the internal network from the external network, and to conserve IP addresses by using a single public IP address for multiple private IP addresses1.

A virtual LAN (VLAN) subinterface is a logical interface that allows traffic from different VLANs to enter and exit the FortiGate unit2. A VLAN subinterface is created by adding a VLAN ID to a physical interface or an aggregate interface2. A VLAN ID is a numerical identifier that distinguishes one VLAN from another2.

In this scenario, there are two requirements for the VLAN ID of the VLAN subinterfaces added to the same physical interface:

The two VLAN subinterfaces must have different VLAN IDs. This is because the VLAN ID is used to tag the traffic with the appropriate VLAN information, and to separate the traffic into different VLANs2. If the two VLAN subinterfaces have the same VLAN ID, they will not be able to distinguish the traffic from each other, and they will not be able to forward the traffic to the correct destination.

The two VLAN subinterfaces can have the same VLAN ID, only if they belong to different VDOMs. This is because VDOMs are virtual instances of FortiGate that can have their own interfaces, policies, and routing tables3. Each VDOM operates independently from other VDOMs, and can have its own VLAN subinterfaces with different or identical VLAN IDs3. However, this requires inter-VDOM links to allow traffic between different VDOMs3.

Which of the following SD-WAN load balancing method use interface weight value to distribute traffic? (Choose two.)

A.
Source IP
A.
Source IP
Answers
B.
Spillover
B.
Spillover
Answers
C.
Volume
C.
Volume
Answers
D.
Session
D.
Session
Answers
Suggested answer: C, D

Explanation:

https://docs.fortinet.com/document/fortigate/6.0.0/handbook/49719/configuring-sd-wan-load-balancing

What is the effect of enabling auto-negotiate on the phase 2 configuration of an IPsec tunnel?

A.
FortiGate automatically negotiates different local and remote addresses with the remote peer.
A.
FortiGate automatically negotiates different local and remote addresses with the remote peer.
Answers
B.
FortiGate automatically negotiates a new security association after the existing security association expires.
B.
FortiGate automatically negotiates a new security association after the existing security association expires.
Answers
C.
FortiGate automatically negotiates different encryption and authentication algorithms with the remote peer.
C.
FortiGate automatically negotiates different encryption and authentication algorithms with the remote peer.
Answers
D.
FortiGate automatically brings up the IPsec tunnel and keeps it up, regardless of activity on the IPsec tunnel.
D.
FortiGate automatically brings up the IPsec tunnel and keeps it up, regardless of activity on the IPsec tunnel.
Answers
Suggested answer: D

Explanation:

https://kb.fortinet.com/kb/documentLink.do?externalID=12069

FortiGate Infrastructure 7.2 Study Guide (p.264): '...then FortiGate might drop interesting traffic because of the absence of active SAs. To prevent this, you can enable Auto-negotiate. When you do this, FortiGate not only negotiates new SAs before the current SAs expire, but it also starts using the new SAs right away.' 'Another benefit of enabling Auto-negotiate is that the tunnel comes up and stays up automatically, even when there is no interesting traffic. When you enable Autokey Keep Alive and keep Auto-negotiate disabled, the tunnel does not come up automatically unless there is interesting traffic. However, after the tunnel is up, it stays that way because FortiGate periodically sends keep alive packets over the tunnel. Note that when you enable Auto-negotiate, Autokey Keep Alive is implicitly enabled.'

If the Services field is configured in a Virtual IP (VIP), which statement is true when central NAT is used?

A.
The Services field prevents SNAT and DNAT from being combined in the same policy.
A.
The Services field prevents SNAT and DNAT from being combined in the same policy.
Answers
B.
The Services field is used when you need to bundle several VIPs into VIP groups.
B.
The Services field is used when you need to bundle several VIPs into VIP groups.
Answers
C.
The Services field removes the requirement to create multiple VIPs for different services.
C.
The Services field removes the requirement to create multiple VIPs for different services.
Answers
D.
The Services field prevents multiple sources of traffic from using multiple services to connect to a single computer.
D.
The Services field prevents multiple sources of traffic from using multiple services to connect to a single computer.
Answers
Suggested answer: C
Total 184 questions
Go to page: of 19