ExamGecko
Home Home / Fortinet / NSE4_FGT-7.2

Fortinet NSE4_FGT-7.2 Practice Test - Questions Answers, Page 18

Question list
Search
Search

Refer to the exhibit.

The exhibit shows the output of a diagnose command.

What does the output reveal about the policy route?

A.
It is an ISDB route in policy route.
A.
It is an ISDB route in policy route.
Answers
B.
It is a regular policy route.
B.
It is a regular policy route.
Answers
C.
It is an ISDB policy route with an SDWAN rule.
C.
It is an ISDB policy route with an SDWAN rule.
Answers
D.
It is an SDWAN rule in policy route.
D.
It is an SDWAN rule in policy route.
Answers
Suggested answer: D

Explanation:

FortiGate Infrastructure 7.2 Study Guide (p.59): 'ISDB routes and SD-WAN rules are assigned an ID higher than 65535. However, SD-WAN rule entries include the vwl_service field, and ISDB route entries don't.'

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up.

Based on the phase 2 configuration shown in the exhibit, which configuration change will bring phase 2 up?

A.
On Remote-FortiGate, set Seconds to 43200.
A.
On Remote-FortiGate, set Seconds to 43200.
Answers
B.
On HQ-FortiGate, set Encryption to AES256.
B.
On HQ-FortiGate, set Encryption to AES256.
Answers
C.
On HQ-FortiGate, enable Diffie-Hellman Group 2.
C.
On HQ-FortiGate, enable Diffie-Hellman Group 2.
Answers
D.
On HQ-FortiGate, enable Auto-negotiate.
D.
On HQ-FortiGate, enable Auto-negotiate.
Answers
Suggested answer: B

An administrator configures FortiGuard servers as DNS servers on FortiGate using default settings.

What is true about the DNS connection to a FortiGuard server?

A.
It uses UDP 8888.
A.
It uses UDP 8888.
Answers
B.
It uses UDP 53.
B.
It uses UDP 53.
Answers
C.
It uses DNS over HTTPS.
C.
It uses DNS over HTTPS.
Answers
D.
It uses DNS overTLS.
D.
It uses DNS overTLS.
Answers
Suggested answer: D

Explanation:

FortiGate Security 7.2 Study Guide (p.15): 'When using FortiGuard servers for DNS, FortiOS uses DNS over TLS (DoT) by default to secure the DNS traffic.'

When using FortiGuard servers for DNS, FortiOS defaults to using DNS over TLS (DoT) to secure the DNS traffic1. DNS over TLS is a protocol that encrypts and authenticates DNS queries and responses using the Transport Layer Security (TLS) protocol2. This prevents eavesdropping, tampering, and spoofing of DNS data by third parties.

The default FortiGuard DNS servers are 96.45.45.45 and 96.45.46.46, and they use the hostname globalsdns.fortinet.net1. The FortiGate verifies the server hostname using the server-hostname setting in the system dns configuration1.

Which two statements describe how the RPF check is used? (Choose two.)

A.
The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.
A.
The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.
Answers
B.
The RPF check is run on the first sent and reply packet of any new session.
B.
The RPF check is run on the first sent and reply packet of any new session.
Answers
C.
The RPF check is run on the first sent packet of any new session.
C.
The RPF check is run on the first sent packet of any new session.
Answers
D.
The RPF check is run on the first reply packet of any new session.
D.
The RPF check is run on the first reply packet of any new session.
Answers
Suggested answer: A, C

Explanation:

FortiGate Infrastructure 7.2 Study Guide (p.41): 'The RPF check is a mechanism that protects FortiGate and your network from IP spoofing attacks by checking for a return path to the source in the routing table.' 'FortiGate performs an RPF check only on the first packet of a new session. That is, after the first packet passes the RPF check and FortiGate accepts the session, FortiGate doesn't perform any additional RPF checks on that session.'

A) The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.

This is true because the RPF check verifies that the source IP address of an incoming packet matches the reverse route for that address, meaning that the packet came from a legitimate source and not from an attacker who is trying to impersonate another host. This prevents IP spoofing attacks, where an attacker sends packets with a forged source IP address to bypass security policies or launch denial-of-service attacks1

C) The RPF check is run on the first sent packet of any new session.

This is true because the RPF check is performed only once per session, on the first packet sent by either the client or the server, depending on the direction of the session initiation. This reduces the processing overhead and improves performance2

What is a reason for triggering IPS fail open?

A.
The IPS socket buffer is full and the IPS engine cannot process additional packets.
A.
The IPS socket buffer is full and the IPS engine cannot process additional packets.
Answers
B.
The IPS engine cannot decode a packet.
B.
The IPS engine cannot decode a packet.
Answers
C.
The IPS engine is upgraded.
C.
The IPS engine is upgraded.
Answers
D.
The administrator enabled NTurbo acceleration.
D.
The administrator enabled NTurbo acceleration.
Answers
Suggested answer: A

How can you disable RPF checking?

A.
Disable strict-src-check under system settings.
A.
Disable strict-src-check under system settings.
Answers
B.
Disable src-check on the interface level settings
B.
Disable src-check on the interface level settings
Answers
C.
Unset fail-alert-interfaces on the interface level settings.
C.
Unset fail-alert-interfaces on the interface level settings.
Answers
D.
Disable fail-detect on the interface level settings.
D.
Disable fail-detect on the interface level settings.
Answers
Suggested answer: B

What are two features of the NGFW policy-based mode? (Choose two.)

A.
NGFW policy-based mode does not require the use of central source NAT policy.
A.
NGFW policy-based mode does not require the use of central source NAT policy.
Answers
B.
NGFW policy-based mode can only be applied globally and not on individual VDOMs_
B.
NGFW policy-based mode can only be applied globally and not on individual VDOMs_
Answers
C.
NGFW policy-based mode policies support only flow inspection.
C.
NGFW policy-based mode policies support only flow inspection.
Answers
D.
NGFW policy-based mode supports creating applications and web filtering categories directly in a firewall policy
D.
NGFW policy-based mode supports creating applications and web filtering categories directly in a firewall policy
Answers
Suggested answer: C, D

Explanation:

C) NGFW policy-based mode policies support only flow inspection. This is correct.This is a feature of the NGFW policy-based mode, according to the Fortinet documentation 'Profile-based NGFW vs policy-based NGFW'1. The documentation states that ''In policy-based NGFW mode, you can only select flow inspection. Proxy inspection is not supported.''

D) NGFW policy-based mode supports creating applications and web filtering categories directly in a firewall policy. This is correct.This is a feature of the NGFW policy-based mode, according to the Fortinet documentation 'Profile-based NGFW vs policy-based NGFW'1. The documentation states that ''In policy-based NGFW mode, you allow applications and URL categories to be used directly in security policies, without requiring web filter or application control profiles.''

Refer to the exhibit.

The exhibit shows a diagram of a FortiGate device connected to the network and the firewall policy and IP pool configuration on the FortiGate device.

Two PCS, PCI and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the Intarnet_

Based on the information shown in the exhibit, which three configuration changes should the administrator make to fix the connectivity issue for PC3? (Choose three.)

A.
In the IP pool configuration, set type to overload.
A.
In the IP pool configuration, set type to overload.
Answers
B.
Configure 192.2. O. 12/24 as the secondary IP address on port1
B.
Configure 192.2. O. 12/24 as the secondary IP address on port1
Answers
C.
Configure another firewall policy that matches only the address of PC3 as source, and then place the policy on top of the list.
C.
Configure another firewall policy that matches only the address of PC3 as source, and then place the policy on top of the list.
Answers
D.
In the IP pool configuration, set endip to 192.2. O .12
D.
In the IP pool configuration, set endip to 192.2. O .12
Answers
E.
In the firewall policy configuration, disable ippool.
E.
In the firewall policy configuration, disable ippool.
Answers
Suggested answer: A, D, E

What are two scanning techniques supported by FortiGate? (Choose two.)

A.
Machine learning scan
A.
Machine learning scan
Answers
B.
Antivirus scan
B.
Antivirus scan
Answers
C.
Ransomware scan
C.
Ransomware scan
Answers
D.
Trojan scan
D.
Trojan scan
Answers
Suggested answer: A, B

Explanation:

FortiGate Security 7.2 Study Guide (p.341):

'Like viruses, which use many methods to avoid detection, FortiGate uses many techniques to detect viruses. These detection techniques include:

* Antivirus scan

* Grayware scan

* Machine learning (AI) scan

If all antivirus features are enabled, FortiGate applies the following scanning order: antivirus scan, followed by grayware scan, followed by AI scan.'

Refer to the exhibit.

In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output as shown in the exhibit.

What should the administrator do next to troubleshoot the problem?

A.
Run a sniffer on the web server.
A.
Run a sniffer on the web server.
Answers
B.
Capture the traffic using an external sniffer connected to port1.
B.
Capture the traffic using an external sniffer connected to port1.
Answers
C.
Execute another sniffer in the FortiGate, this time with the filter host 10.0.1.10
C.
Execute another sniffer in the FortiGate, this time with the filter host 10.0.1.10
Answers
D.
Execute a debug flow.
D.
Execute a debug flow.
Answers
Suggested answer: D

Explanation:

This solution will help the administrator troubleshoot the problem by tracing the packet flow through the FortiGate device and displaying the details of each step.A debug flow can show the source and destination interfaces, the firewall policy, the routing table, the NAT translation, the security profiles, and the session information of the packet1. A debug flow can also show any errors or anomalies that occur during the packet processing.To execute a debug flow, the administrator can use the diagnose debug flow command in the CLI

Total 184 questions
Go to page: of 19