ExamGecko
Home Home / Fortinet / NSE7_EFW-7.2

Fortinet NSE7_EFW-7.2 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











Which two statements about ADVPN are true? (Choose two.)

A.
You must disable add-route in the hub.
A.
You must disable add-route in the hub.
Answers
B.
AllFortiGate devices must be in the same autonomous system (AS).
B.
AllFortiGate devices must be in the same autonomous system (AS).
Answers
C.
The hub adds routes based on IKE negotiations.
C.
The hub adds routes based on IKE negotiations.
Answers
D.
You must configure phase 2 quick mode selectors to 0.0.0.0 0.0.0.0.
D.
You must configure phase 2 quick mode selectors to 0.0.0.0 0.0.0.0.
Answers
Suggested answer: C, D

Explanation:

C) The hub adds routes based on IKE negotiations: This is part of the ADVPN functionality where the hub learns about the networks behind the spokes and can add routes dynamically based on the IKE negotiations with the spokes.

You must configure phase 2 quick mode selectors to 0.0.0.0 0.0.0.0: This wildcard setting in the phase 2 selectors allows any-to-any tunnel establishment, which is necessary for the dynamic creation of spoke-to-spoke tunnels. These configurations are outlined in Fortinet's documentation for setting up ADVPN, where the hub's role in route control and the use of wildcard selectors for phase 2 are emphasized to enable dynamic tunneling between spokes.


You want to improve reliability over a lossy IPSec tunnel.

Which combination of IPSec phase 1 parameters should you configure?

A.
fec-ingress and fec-egress
A.
fec-ingress and fec-egress
Answers
B.
Odpd and dpd-retryinterval
B.
Odpd and dpd-retryinterval
Answers
C.
fragmentation and fragmentation-mtu
C.
fragmentation and fragmentation-mtu
Answers
D.
keepalive and keylive
D.
keepalive and keylive
Answers
Suggested answer: C

Explanation:

For improving reliability over a lossy IPSec tunnel, the fragmentation and fragmentation-mtu parameters should be configured. In scenarios where there might be issues with packet size or an unreliable network, setting the IPsec phase 1 to allow for fragmentation will enable large packets to be broken down, preventing them from being dropped due to size or poor network quality. The fragmentation-mtu specifies the size of the fragments. This is aligned with Fortinet's recommendations for handling IPsec VPN over networks with potential packet loss or size limitations.

Which two statements about IKE version 2 fragmentation are true? (Choose two.)

A.
Only some IKE version 2 packets are considered fragmentable.
A.
Only some IKE version 2 packets are considered fragmentable.
Answers
B.
The reassembly timeout default value is 30 seconds.
B.
The reassembly timeout default value is 30 seconds.
Answers
C.
It is performed at the IP layer.
C.
It is performed at the IP layer.
Answers
D.
The maximum number of IKE version 2 fragments is 128.
D.
The maximum number of IKE version 2 fragments is 128.
Answers
Suggested answer: A, D

Explanation:

In IKE version 2, not all packets are fragmentable. Only certain messages within the IKE negotiation process can be fragmented. Additionally, there is a limit to the number of fragments that IKE version 2 can handle, which is 128. This is specified in the Fortinet documentation and ensures that the IKE negotiation process can proceed even in networks that have issues with large packets. The reassembly timeout and the layer at which fragmentation occurs are not specified in this context within Fortinet documentation.

Which two statements about the BFD parameter in BGP are true? (Choose two.)

A.
It allows failure detection in less than one second.
A.
It allows failure detection in less than one second.
Answers
B.
The two routers must be connected to the same subnet.
B.
The two routers must be connected to the same subnet.
Answers
C.
It is supported for neighbors over multiple hops.
C.
It is supported for neighbors over multiple hops.
Answers
D.
It detects only two-way failures.
D.
It detects only two-way failures.
Answers
Suggested answer: A, C

Explanation:

Bidirectional Forwarding Detection (BFD) is a rapid protocol for detecting failures in the forwarding path between two adjacent routers, including interfaces, data links, and forwarding planes. BFD is designed to detect forwarding path failures in a very short amount of time, often less than one second, which is significantly faster than traditional failure detection mechanisms like hold-down timers in routing protocols.

Fortinet supports BFD for BGP, and it can be used over multiple hops, which allows the detection of failures even if the BGP peers are not directly connected. This functionality enhances the ability to maintain stable BGP sessions over a wider network topology and is documented in Fortinet's guides.

Refer to the exhibit, which shows config system central-management information.

Which setting must you configure for the web filtering feature to function?

A.
Add server. fortiguard. net to the server list.
A.
Add server. fortiguard. net to the server list.
Answers
B.
Configure securewf.fortiguard. net on the default servers.
B.
Configure securewf.fortiguard. net on the default servers.
Answers
C.
Set update-server-location to automatic.
C.
Set update-server-location to automatic.
Answers
D.
Configure server-type with the rating option.
D.
Configure server-type with the rating option.
Answers
Suggested answer: D

Explanation:

For the web filtering feature to function effectively, the FortiGate device needs to have a server configured for rating services. The rating option in the server-type setting specifies that the server is used for URL rating lookup, which is essential for web filtering. The displayed configuration does not list any FortiGuard web filtering servers, which would be necessary for web filtering. The setting set include-default-servers disable indicates that the default FortiGuard servers are not being used, and hence, a specific server for web filtering (like securewf.fortiguard.net) needs to be configured.

Which two statements about the neighbor-group command are true? (Choose two.)

A.
You can configure it on the GUI.
A.
You can configure it on the GUI.
Answers
B.
It applies common settings in an OSPF area.
B.
It applies common settings in an OSPF area.
Answers
C.
It is combined with the neighbor-range parameter.
C.
It is combined with the neighbor-range parameter.
Answers
D.
You can apply it in Internal BGP (IBGP) and External BGP (EBGP).
D.
You can apply it in Internal BGP (IBGP) and External BGP (EBGP).
Answers
Suggested answer: B, D

Explanation:

The neighbor-group command in FortiOS allows for the application of common settings to a group of neighbors in OSPF, and can also be used to simplify configuration by applying common settings to both IBGP and EBGP neighbors. This grouping functionality is a part of the FortiOS CLI and is documented in the Fortinet CLI reference.

Refer to the exhibits, which show the configurations of two address objects from the same FortiGate.

Why can you modify the Engineering address object, but not the Finance address object?

A.
You have read-only access.
A.
You have read-only access.
Answers
B.
FortiGate joined the Security Fabric and the Finance address object was configured on the root FortiGate.
B.
FortiGate joined the Security Fabric and the Finance address object was configured on the root FortiGate.
Answers
C.
FortiGate is registered on FortiManager.
C.
FortiGate is registered on FortiManager.
Answers
D.
Another user is editing the Finance address object in workspace mode.
D.
Another user is editing the Finance address object in workspace mode.
Answers
Suggested answer: B

Explanation:

The inability to modify the Finance address object while being able to modify the Engineering address object suggests that the Finance object is being managed by a higher authority in the Security Fabric, likely the root FortiGate. When a FortiGate is part of a Security Fabric, address objects and other configurations may be managed centrally. This aligns with the Fortinet FortiGate documentation on Security Fabric and central management of address objects.

Refer to the exhibit, which shows a network diagram.

Which protocol should you use to configure the FortiGate cluster?

A.
FGCP in active-passive mode
A.
FGCP in active-passive mode
Answers
B.
OFGSP
B.
OFGSP
Answers
C.
VRRP
C.
VRRP
Answers
D.
FGCP in active-active mode
D.
FGCP in active-active mode
Answers
Suggested answer: A

Explanation:

Given the network diagram and the presence of two FortiGate devices, the Fortinet Gate Clustering Protocol (FGCP) in active-passive mode is the most appropriate for setting up a FortiGate cluster. FGCP supports high availability configurations and is designed to allow one FortiGate to seamlessly take over if the other fails, providing continuous network availability. This is supported by Fortinet documentation for high availability configurations using FGCP.

After enabling IPS you receive feedback about traffic being dropped.

What could be the reason?

A.
Np-accel-mode is set to enable
A.
Np-accel-mode is set to enable
Answers
B.
Traffic-submit is set to disable
B.
Traffic-submit is set to disable
Answers
C.
IPS is configured to monitor
C.
IPS is configured to monitor
Answers
D.
Fail-open is set to disable
D.
Fail-open is set to disable
Answers
Suggested answer: D

Explanation:

Fail-open is a feature that allows traffic to pass through the IPS sensor without inspection when the sensor fails or is overloaded.If fail-open is set to disable, traffic will be dropped in such scenarios1.Reference: =IPS | FortiGate / FortiOS 7.2.3 - Fortinet Documentation

When IPS (Intrusion Prevention System) is configured, if fail-open is set to disable, it means that if the IPS engine fails, traffic will not be allowed to pass through, which can result in traffic being dropped (D). This is in contrast to a fail-open setting, which would allow traffic to bypass the IPS engine if it is not operational.

Which, three conditions are required for two FortiGate devices to form an OSPF adjacency? (Choose three.)

A.
OSPF interface network types match
A.
OSPF interface network types match
Answers
B.
OSPF router IDs are unique
B.
OSPF router IDs are unique
Answers
C.
OSPF interface priority settings are unique
C.
OSPF interface priority settings are unique
Answers
D.
OSPF link costs match
D.
OSPF link costs match
Answers
E.
Authentication settings match
E.
Authentication settings match
Answers
Suggested answer: A, B, E

Explanation:

Option A is correct because the OSPF interface network types determine how the routers form adjacencies and exchange LSAs on a network segment.The network types must match for the routers to become neighbors1.

Option B is correct because the OSPF router IDs are used to identify each router in the OSPF domain and to establish adjacencies.The router IDs must be unique for the routers to become neighbors2.

Option E is correct because the authentication settings control how the routers authenticate each other before exchanging OSPF packets.The authentication settings must match for the routers to become neighbors3.

Option C is incorrect because the OSPF interface priority settings are used to elect the designated router (DR) and the backup designated router (BDR) on a broadcast or non-broadcast multi-access network.The priority settings do not have to be unique for the routers to become neighbors, but they affect the DR/BDR election process4.

Option D is incorrect because the OSPF link costs are used to calculate the shortest path to a destination network based on the bandwidth of the links.The link costs do not have to match for the routers to become neighbors, but they affect the routing decisions5.Reference: =

1: OSPF network types

2: OSPF router ID

3: OSPF authentication

4: OSPF interface priority

5: OSPF link cost

Total 56 questions
Go to page: of 6