ExamGecko
Home Home / Fortinet / NSE4_FGT-7.2

Fortinet NSE4_FGT-7.2 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Refer to the exhibit.

Based on the ZTNA tag, the security posture of the remote endpoint has changed.

What will happen to endpoint active ZTNA sessions?

A.
They will be re-evaluated to match the endpoint policy.
A.
They will be re-evaluated to match the endpoint policy.
Answers
B.
They will be re-evaluated to match the firewall policy.
B.
They will be re-evaluated to match the firewall policy.
Answers
C.
They will be re-evaluated to match the ZTNA policy.
C.
They will be re-evaluated to match the ZTNA policy.
Answers
D.
They will be re-evaluated to match the security policy.
D.
They will be re-evaluated to match the security policy.
Answers
Suggested answer: C

Explanation:

https://docs.fortinet.com/document/fortigate/7.0.0/new-features/580880/posture-check-verification-for-active-ztna-proxy-session-7-0-2

FortiGate Infrastructure 7.2 Study Guide (p.182): 'Endpoint posture changes trigger active ZTNA proxy sessions to be re-verified and terminated if the endpoint is no longer compliant with the ZTNA policy.'

What are two features of collector agent advanced mode? (Choose two.)

A.
In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.
A.
In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.
Answers
B.
In advanced mode, security profiles can be applied only to user groups, not individual users.
B.
In advanced mode, security profiles can be applied only to user groups, not individual users.
Answers
C.
Advanced mode uses the Windows convention---NetBios: Domain\Username.
C.
Advanced mode uses the Windows convention---NetBios: Domain\Username.
Answers
D.
Advanced mode supports nested or inherited groups.
D.
Advanced mode supports nested or inherited groups.
Answers
Suggested answer: A, D

Explanation:

A) In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.

This is true because advanced mode allows FortiGate to query the LDAP server directly for user information and group membership, without relying on the collector agent. This enables FortiGate to apply security policies based on LDAP group filters, which can be configured on FortiGate1

D) Advanced mode supports nested or inherited groups.

This is true because advanced mode can handle complex group structures, such as nested groups or inherited groups, where a user belongs to a group that is a member of another group. This allows FortiGate to apply security policies based on the effective group membership of a user, not just the direct group membership1

FortiGate Infrastructure 7.2 Study Guide (p.146): 'Also, advanced mode supports nested or inherited groups; that is, users can be members of subgroups that belong to monitored parent groups.' 'In advanced mode, you can configure FortiGate as an LDAP client and configure the group filters on FortiGate. You can also configure group filters on the collector agent.'

An administrator wants to simplify remote access without asking users to provide user credentials.

Which access control method provides this solution?

A.
ZTNA IP/MAC filtering mode
A.
ZTNA IP/MAC filtering mode
Answers
B.
ZTNA access proxy
B.
ZTNA access proxy
Answers
C.
SSL VPN
C.
SSL VPN
Answers
D.
L2TP
D.
L2TP
Answers
Suggested answer: B

Explanation:

FortiGate Infrastructure 7.2 Study Guide (p.165): 'ZTNA access proxy allows users to securely access resources through an SSL-encrypted access proxy. This simplifies remote access by eliminating the use of VPNs.'

This is true because ZTNA access proxy is a feature that allows remote users to access internal applications without requiring VPN or user credentials. ZTNA access proxy uses a secure tunnel between the user's device and the FortiGate, and authenticates the user based on device identity and context. The user only needs to install a lightweight agent on their device, and the FortiGate will automatically assign them to the appropriate application group based on their device profile. This simplifies remote access and enhances security by reducing the attack surface12

What are two characteristics of FortiGate HA cluster virtual IP addresses? (Choose two.)

A.
Virtual IP addresses are used to distinguish between cluster members.
A.
Virtual IP addresses are used to distinguish between cluster members.
Answers
B.
Heartbeat interfaces have virtual IP addresses that are manually assigned.
B.
Heartbeat interfaces have virtual IP addresses that are manually assigned.
Answers
C.
The primary device in the cluster is always assigned IP address 169.254.0.1.
C.
The primary device in the cluster is always assigned IP address 169.254.0.1.
Answers
D.
A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster.
D.
A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster.
Answers
Suggested answer: A, D

Explanation:

Fortigate Infrastructure 7.2 Study Guide page 301

FortiGate Infrastructure 7.2 Study Guide (p.301):

'FGCP automatically assigns the heartbeat IP addresses based on the serial number of each device. The IP address 169.254.0.1 is assigned to the device with the highest serial number.'

'A change in the heartbeat IP addresses may happen when a FortiGate device joins or leaves the cluster.'

'The HA cluster uses the heartbeat IP addresses to distinguish the cluster members and synchronize data.'

https://networkinterview.com/fortigate-ha-high-availability/

Refer to the exhibits.

Exhibit A shows a network diagram. Exhibit B shows the firewall policy configuration and a VIP object configuration.

The WAN (port1) interface has the IP address 10.200.1.1/24.

The LAN (port3) interface has the IP address 10.0.1.254/24.

The administrator disabled the WebServer firewall policy.

Which IP address will be used to source NAT the traffic, if a user with address 10.0.1.10 connects over SSH to the host with address 10.200.3.1?

A.
10.200.1.10
A.
10.200.1.10
Answers
B.
10.0.1.254
B.
10.0.1.254
Answers
C.
10.200.1.1
C.
10.200.1.1
Answers
D.
10.200.3.1
D.
10.200.3.1
Answers
Suggested answer: C

Explanation:

Traffic is coming from LAN to WAN, matches policy Full_Access which has NAT enable, so traffic uses source IP address of outgoing interface. Simple SNAT.

Refer to the exhibit.

The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile.

An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category.

What are two solutions for satisfying the requirement? (Choose two.)

A.
Configure a separate firewall policy with action Deny and an FQDN address object for *.download.com as destination address.
A.
Configure a separate firewall policy with action Deny and an FQDN address object for *.download.com as destination address.
Answers
B.
Configure a web override rating for download.com and select Malicious Websites as the subcategory.
B.
Configure a web override rating for download.com and select Malicious Websites as the subcategory.
Answers
C.
Set the Freeware and Software Downloads category Action to Warning.
C.
Set the Freeware and Software Downloads category Action to Warning.
Answers
D.
Configure a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively.
D.
Configure a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively.
Answers
Suggested answer: B, D

Explanation:

FortiGate Security 7.2 Study Guide (p.268-269): 'If you want to make an exception, for example, rather than unblock access to a potentially unwanted category, change the website to an allowed category. You can also do the reverse. You can block a website that belongs to an allowed category.' 'Static URL filtering is another web filter feature. Configured URLs in the URL filter are checked against the visited websites. If a match is found, the configured action is taken. URL filtering has the same patterns as static domain filtering: simple, regular expressions, and wildcard.'

B) Configure a web override rating for download.com and select Malicious Websites as the subcategory.

This is true because a web override rating is a feature that allows the administrator to change the FortiGuard category of a specific website or domain, and apply a different action to it based on the web filter profile. By configuring a web override rating for download.com and selecting Malicious Websites as the subcategory, the administrator can block access to download.com, which belongs to the Freeware and Software Downloads category by default, without affecting other websites in the same category. The Malicious Websites category has the action Block in the web filter profile shown in the exhibit.

D) Configure a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively.

This is true because a static URL filter entry is a feature that allows the administrator to define custom rules for filtering specific URLs or domains, and apply an action to them based on the web filter profile. By configuring a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively, the administrator can block access to download.com and any subdomains or paths under it, without affecting other websites in the Freeware and Software Downloads category. The static URL filter entries have higher priority than the FortiGuard category based filter entries in the web filter profile.

Which statement about the deployment of the Security Fabric in a multi-VDOM environment is true?

A.
VDOMs without ports with connected devices are not displayed in the topology.
A.
VDOMs without ports with connected devices are not displayed in the topology.
Answers
B.
Downstream devices can connect to the upstream device from any of their VDOMs.
B.
Downstream devices can connect to the upstream device from any of their VDOMs.
Answers
C.
Security rating reports can be run individually for each configured VDOM.
C.
Security rating reports can be run individually for each configured VDOM.
Answers
D.
Each VDOM in the environment can be part of a different Security Fabric.
D.
Each VDOM in the environment can be part of a different Security Fabric.
Answers
Suggested answer: A

Explanation:

FortiGate Security 7.2 Study Guide (p.436): 'When you configure FortiGate devices in multi-vdom mode and add them to the Security Fabric, each VDOM with its assigned ports is displayed when one or more devices are detected. Only the ports with discovered and connected devices appear in the Security Fabric view and, because of this, you must enable Device Detection on ports you want to have displayed in the Security Fabric. VDOMs without ports with connected devices are not displayed. All VDOMs configured must be part of a single Security Fabric.'

Refer to the exhibits.

Exhibit A shows the application sensor configuration. Exhibit B shows the Excessive-Bandwidth and Apple filter details.

Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?

A.
Apple FaceTime will be allowed, based on the Categories configuration.
A.
Apple FaceTime will be allowed, based on the Categories configuration.
Answers
B.
Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.
B.
Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.
Answers
C.
Apple FaceTime will be allowed, based on the Apple filter configuration.
C.
Apple FaceTime will be allowed, based on the Apple filter configuration.
Answers
D.
Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.
D.
Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.
Answers
Suggested answer: B

Explanation:

FortiGate Security 7.2 Study Guide (p.310): 'Then, FortiGate scans packets for matches, in this order, for the application control profile: 1. Application and filter overrides: If you have configured any application overrides or filter overrides, the application control profile considers those first. It looks for a matching override starting at the top of the list, like firewall policies. 2. Categories: Finally, the application control profile applies the action that you've configured for applications in your selected categories.'

Which statement is correct regarding the security fabric?

A.
FortiManager is one of the required member devices.
A.
FortiManager is one of the required member devices.
Answers
B.
FortiGate devices must be operating in NAT mode.
B.
FortiGate devices must be operating in NAT mode.
Answers
C.
A minimum of two Fortinet devices is required.
C.
A minimum of two Fortinet devices is required.
Answers
D.
FortiGate Cloud cannot be used for logging purposes.
D.
FortiGate Cloud cannot be used for logging purposes.
Answers
Suggested answer: B

Explanation:

FortiGate Security 7.2 Study Guide (p.428): 'You must have a minimum of two FortiGate devices at the core of the Security Fabric, plus one FortiAnalyzer or cloud logging solution. FortiAnalyzer Cloud or FortiGate Cloud can act as the cloud logging solution. The FortiGate devices must be running in NAT mode.'

If Internet Service is already selected as Destination in a firewall policy, which other configuration object can be selected for the Destination field of a firewall policy?

A.
IP address
A.
IP address
Answers
B.
No other object can be added
B.
No other object can be added
Answers
C.
FQDN address
C.
FQDN address
Answers
D.
User or User Group
D.
User or User Group
Answers
Suggested answer: B

Explanation:

FortiGate Security 7.2 Study Guide (p.59): 'When configuring your firewall policy, you can use Internet Service as the destination in a firewall policy, which contains all the IP addresses, ports, and protocols used by that service. For the same reason, you cannot mix regular address objects with ISDB objects, and you cannot select services on a firewall policy. The ISDB objects already have services information, which is hardcoded.'

This is true because Internet Service is a special type of destination object that can only be used alone in a firewall policy. Internet Service is a feature that allows FortiGate to identify and filter traffic based on the internet service or application that it belongs to, such as Facebook, YouTube, Skype, etc. Internet Service uses a database of IP addresses and ports that are associated with each internet service or application, and updates it regularly from FortiGuard. When Internet Service is selected as the destination in a firewall policy, FortiGate will match the traffic to the corresponding internet service or application, and apply the appropriate action and security profiles to it. However, Internet Service cannot be combined with any other destination object, such as IP address, FQDN address, user or user group, etc., as this would create a conflict or ambiguity in the firewall policy. Therefore, no other object can be added if Internet Service is already selected as the destination in a firewall policy

Total 184 questions
Go to page: of 19