ExamGecko
Home Home / Fortinet / NSE6_WCS-6.4

Fortinet NSE6_WCS-6.4 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

A customer is using the AWS Elastic Load Balancer.

Which two statements are correct about the Elastic Load Balancer configuration? (Choose two.)

A.
The Amazon resource name is used to access the load balancer node and targets.
A.
The Amazon resource name is used to access the load balancer node and targets.
Answers
B.
The DNS name is used to access devices.
B.
The DNS name is used to access devices.
Answers
C.
The load balancer is configured to load balance traffic between devices in two AZS.
C.
The load balancer is configured to load balance traffic between devices in two AZS.
Answers
D.
The load balancer is configured for the internal traffic of the VPC
D.
The load balancer is configured for the internal traffic of the VPC
Answers
Suggested answer: B, C

Refer to the exhibit.

You deployed an active-passive FortiGate HA using a Cloud Formation template on an existing VPC_ Now you want to test active-passive FortiGate HA failover by running a debug so you can see the API calls to change the elastic and secondary IP addresses.

Which statement is correct about the output of the debug?

A.
The routing table for Fgt2 updated successfully. and port2 will provide internet access to Fgt2.
A.
The routing table for Fgt2 updated successfully. and port2 will provide internet access to Fgt2.
Answers
B.
The elastic IP is associated with port1 of Fgt2.
B.
The elastic IP is associated with port1 of Fgt2.
Answers
C.
IP address 10. O. O. L 3 is now associated with eni-Ob61d8afcOaefb8a2.
C.
IP address 10. O. O. L 3 is now associated with eni-Ob61d8afcOaefb8a2.
Answers
D.
The elastic IP is associated with port2 of Fgt2. and the secondary IP address for port1 and port2 was updated successfully.
D.
The elastic IP is associated with port2 of Fgt2. and the secondary IP address for port1 and port2 was updated successfully.
Answers
Suggested answer: C

You want to deploy FortiGate for AWS to protect your production network in the cloud. but you do not need the 2417 support available in the enterprise bundle.

Which license model do you choose?

A.
pay as you go (PAYG).
A.
pay as you go (PAYG).
Answers
B.
Bring your own device (BYOD)
B.
Bring your own device (BYOD)
Answers
C.
Bring your own license (BYOL).
C.
Bring your own license (BYOL).
Answers
D.
Pay as a bundle (PAYB).
D.
Pay as a bundle (PAYB).
Answers
Suggested answer: A

You want to deploy the Fortinet HA cloud formation template to stage and bootstrap the FortiGate configuration in the same that you created your VPC, Which is Ohio US-East-2.

Based on this information, Which statement is correct?

A.
You must create an S3 bucket to stage and bootstrap FortiGate with an FGCP unicast configuration in the Ohio US-East-2 region.
A.
You must create an S3 bucket to stage and bootstrap FortiGate with an FGCP unicast configuration in the Ohio US-East-2 region.
Answers
B.
You must create an S3 bucket to stage and bootstrap FortiGate with an FGCP multicast configuration in the Ohio US-East-2 region.
B.
You must create an S3 bucket to stage and bootstrap FortiGate with an FGCP multicast configuration in the Ohio US-East-2 region.
Answers
C.
You must create an S3 bucket to stage and bootstrap FortiGate with an FGCP unicast configuration in any region.
C.
You must create an S3 bucket to stage and bootstrap FortiGate with an FGCP unicast configuration in any region.
Answers
D.
The Fortinet HA cloud formation template automatically creates an S3 bucket.
D.
The Fortinet HA cloud formation template automatically creates an S3 bucket.
Answers
Suggested answer: D

You connected to the AWS Management Console at 10:00 AM and verified that there are two FortiGate VMS running, You receive a call from a user reporting about a temporary slow Internet connection that lasted only a few minutes.

When you go back to the AWS portal. you notice there are now two additional FortiGate VMS that you did not create. Later that day, the number of VMS returns to two without your intervention. A similar situation occurs several times during the week.

What is the most likely reason for this to happen?

A.
The VMS are in an availability group with dynamic membership.
A.
The VMS are in an availability group with dynamic membership.
Answers
B.
Autoscaling is configured to act as described in the scenario.
B.
Autoscaling is configured to act as described in the scenario.
Answers
C.
The user ran a script to create the extra VMS to get faster connectivity.
C.
The user ran a script to create the extra VMS to get faster connectivity.
Answers
D.
The AWS portal is not refreshed automatically. and another administrator is creating and removing the VMS as needed.
D.
The AWS portal is not refreshed automatically. and another administrator is creating and removing the VMS as needed.
Answers
Suggested answer: B

Which three statements are correct about Amazon Web Services networking? (Choose three.)

A.
You can configure instant IP failover in AWS.
A.
You can configure instant IP failover in AWS.
Answers
B.
You cannot configure gratuitous ARP but you can configure proxy ARP.
B.
You cannot configure gratuitous ARP but you can configure proxy ARP.
Answers
C.
You cannot deploy FortiGate in transparent mode in AWS.
C.
You cannot deploy FortiGate in transparent mode in AWS.
Answers
D.
You cannot use custom frames in AWS
D.
You cannot use custom frames in AWS
Answers
E.
You can use unicast the FGCP protocol
E.
You can use unicast the FGCP protocol
Answers
Suggested answer: C, D, E

Which three statements are correct about VPC flow (Choose three.)

A.
Flow logs can capture real-time log streams for the network interfaces.
A.
Flow logs can capture real-time log streams for the network interfaces.
Answers
B.
Flow logs do not capture DHCP traffic.
B.
Flow logs do not capture DHCP traffic.
Answers
C.
Flow logs can capture traffic to the reserved IP address for the default VPC router.
C.
Flow logs can capture traffic to the reserved IP address for the default VPC router.
Answers
D.
Flow logs can be used as a security tool to monitor the traffic that is reaching the instance.
D.
Flow logs can be used as a security tool to monitor the traffic that is reaching the instance.
Answers
E.
Flow logs do not capture traffic to and from 169.2 54 .169.254 for instance metadata.
E.
Flow logs do not capture traffic to and from 169.2 54 .169.254 for instance metadata.
Answers
Suggested answer: B, D, E

Refer to the exhibit.

You have created an autoscale configuration using a FortiGate HA Cloud Formation template. You want to examine the autoscale FortiOS configuration to confirm that FortiGate autoscale is configured to synchronize primary and secondary devices. On one of the FortiGate devices, you execute the command shown in the exhibit Which statement is correct about the output of the command?

A.
The device is the primary in the HA configuration. with the IP address 10.0.0.173.
A.
The device is the primary in the HA configuration. with the IP address 10.0.0.173.
Answers
B.
The device is the secondary in the HA configuration, and the IP address Of the primary device is 10.0.0.173.
B.
The device is the secondary in the HA configuration, and the IP address Of the primary device is 10.0.0.173.
Answers
C.
The device is the primary in the HA configuration and the IP address of the secondary device is 10.0.0.173.
C.
The device is the primary in the HA configuration and the IP address of the secondary device is 10.0.0.173.
Answers
D.
The device is the secondary in the HA configuration. with the IP address 10.0.0.173.
D.
The device is the secondary in the HA configuration. with the IP address 10.0.0.173.
Answers
Suggested answer: B

A customer deployed Fortinet Managed Rules for Amazon Web Services (AWS) Web-Application Firewall (WAF) to protect web application servers from attacks.

Which statement about Fortinet Managed Rules for AWS WAF is correct?

A.
It offers a negative security model.
A.
It offers a negative security model.
Answers
B.
It can provide Layer 7 DOS protection.
B.
It can provide Layer 7 DOS protection.
Answers
C.
It can provide IP Reputation (WAF subscription FortiGuard).
C.
It can provide IP Reputation (WAF subscription FortiGuard).
Answers
D.
It can perform bot and known search engine identification and protection
D.
It can perform bot and known search engine identification and protection
Answers
Suggested answer: D

Which three statements are correct about AWS security groups? (Choose three)

A.
a Security group rules are always permissive: you cannot create rules that deny access.
A.
a Security group rules are always permissive: you cannot create rules that deny access.
Answers
B.
By default, security groups block all outbound traffic.
B.
By default, security groups block all outbound traffic.
Answers
C.
When associate multiple security groups With an instance, the rules from each security group are effectively aggregated to create one set Of rules
C.
When associate multiple security groups With an instance, the rules from each security group are effectively aggregated to create one set Of rules
Answers
D.
Security groups are statetul
D.
Security groups are statetul
Answers
E.
By default, security groups allow all inbound traffic.
E.
By default, security groups allow all inbound traffic.
Answers
Suggested answer: A, C, D

Explanation:


Total 30 questions
Go to page: of 3