ExamGecko
Home Home / Fortinet / NSE7_EFW-7.2

Fortinet NSE7_EFW-7.2 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit, which shows a network diagram.

Which IPsec phase 2 configuration should you impalement so that only one remote site is connected at any time?

A.
Set route-overlap to allow.
A.
Set route-overlap to allow.
Answers
B.
Set single-source to enable
B.
Set single-source to enable
Answers
C.
Set route-overlap to either use---new or use-old
C.
Set route-overlap to either use---new or use-old
Answers
D.
Set net-device to enable
D.
Set net-device to enable
Answers
Suggested answer: C

Explanation:

To ensure that only one remote site is connected at any given time in an IPsec VPN scenario, you should use route-overlap with the option to either use-new or use-old. This setting dictates which routes are preferred and how overlaps in routes are handled, allowing for one connection to take precedence over the other (C).

FortiOS Handbook - IPsec VPN

Exhibit.

Refer to the exhibit, which contains an ADVPN network diagram and a partial BGP con figuration Which two parameters Should you configure in config neighbor range? (Choose two.)

A.
set prefix 172.16.1.0 255.255.255.0
A.
set prefix 172.16.1.0 255.255.255.0
Answers
B.
set route reflector-client enable
B.
set route reflector-client enable
Answers
C.
set neighbor-group advpn
C.
set neighbor-group advpn
Answers
D.
set prefix 10.1.0 255.255.255.0
D.
set prefix 10.1.0 255.255.255.0
Answers
Suggested answer: A, C

Explanation:

In the ADVPN configuration for BGP, you should specify the prefix that the neighbors can advertise. Option A is correct as you would configure the BGP network prefix that should be advertised to the neighbors, which matches the BGP network in the diagram. Option C is also correct since you should reference the neighbor group configured for the ADVPN setup within the BGP configuration.

You want to configure faster failure detection for BGP

Which parameter should you enable on both connected FortiGate devices?

A.
Ebgp-enforce-multihop
A.
Ebgp-enforce-multihop
Answers
B.
bfd
B.
bfd
Answers
C.
Distribute-list-in
C.
Distribute-list-in
Answers
D.
Graceful-restart
D.
Graceful-restart
Answers
Suggested answer: B

Explanation:

BFD (Bidirectional Forwarding Detection) is a protocol that provides fast failure detection for BGP by sending periodic messages to verify the connectivity between two peers1.BFD can be enabled on both connected FortiGate devices by using the commandset bfd enableunder the BGP configuration2.Reference: =Technical Tip : FortiGate BFD implementation and examples ...,Configure BGP | FortiGate / FortiOS 7.0.2 - Fortinet Documentation

Which two statements about metadata variables are true? (Choose two.)

A.
You create them on FortiGate
A.
You create them on FortiGate
Answers
B.
They apply only to non-firewall objects.
B.
They apply only to non-firewall objects.
Answers
C.
The metadata format is $<metadata_variabie_name>.
C.
The metadata format is $<metadata_variabie_name>.
Answers
D.
They can be used as variables in scripts
D.
They can be used as variables in scripts
Answers
Suggested answer: A, D

Explanation:

Metadata variables in FortiGate are created to store metadata associated with different FortiGate features. These variables can be used in various configurations and scripts to dynamically replace the variable with its actual value during processing. A: You create metadata variables on FortiGate. They are used to store metadata for FortiGate features and can be called upon in different configurations. D: They can be used as variables in scripts. Metadata variables are utilized within the scripts to dynamically insert values as per the context when the script runs.

Fortinet FortiOS Handbook: CLI Reference

Refer to the exhibit, which contains a partial BGP combination.

You want to configure a loopback as the OGP source.

Which two parameters must you set in the BGP configuration? (Choose two)

A.
ebgp-enforce-multihop
A.
ebgp-enforce-multihop
Answers
B.
recursive-next-hop
B.
recursive-next-hop
Answers
C.
ibgp-enfoce-multihop
C.
ibgp-enfoce-multihop
Answers
D.
update-source
D.
update-source
Answers
Suggested answer: A, D

Explanation:

To configure a loopback as the BGP source, you need to set the ''ebgp-enforce-multihop'' and ''update-source'' parameters in the BGP configuration.The ''ebgp-enforce-multihop'' allows EBGP connections to neighbor routers that are not directly connected, while ''update-source'' specifies the IP address that should be used for the BGP session1.Reference:=BGP on loopback,Loopback interface,Technical Tip: Configuring EBGP Multihop Load-Balancing,Technical Tip: BGP routes are not installed in routing table with loopback as update source

Exhibit.

Refer to the exhibit, which shows a partial web filter profile conjuration

What can you cone udo from this configuration about access to www.facebook.com, which is categorized as Social Networking?

A.
The access is blocked based on the Content Filter configuration
A.
The access is blocked based on the Content Filter configuration
Answers
B.
The access is allowed based on the FortiGuard Category Based Filter configuration
B.
The access is allowed based on the FortiGuard Category Based Filter configuration
Answers
C.
The access is blocked based on the URL Filter configuration
C.
The access is blocked based on the URL Filter configuration
Answers
D.
The access is hocked if the local or the public FortiGuard server does not reply
D.
The access is hocked if the local or the public FortiGuard server does not reply
Answers
Suggested answer: C

Explanation:

The access to www.facebook.com is blocked based on the URL Filter configuration.In the exhibit, it shows that the URL ''www.facebook.com'' is specifically set to ''Block'' under the URL Filter section1.Reference:=Fortigate: How to configure Web Filter function on Fortigate,Web filter | FortiGate / FortiOS 7.0.2 | Fortinet Document Library,FortiGate HTTPS web URL filtering ... - Fortinet ... - Fortinet Community

An administrator has configured two fortiGate devices for an HA cluster. While testing HA failover, the administrator notices that some of the switches in the network continue to send traffic to the former primary device What can the administrator do to fix this problem?

A.
Verify that the speed and duplex settings match between me FortiGate interfaces and the connected switch ports
A.
Verify that the speed and duplex settings match between me FortiGate interfaces and the connected switch ports
Answers
B.
Configure set link -failed signal enable under-config system ha on both Cluster members
B.
Configure set link -failed signal enable under-config system ha on both Cluster members
Answers
C.
Configure remote Iink monitoring to detect an issue in the forwarding path
C.
Configure remote Iink monitoring to detect an issue in the forwarding path
Answers
D.
Configure set send-garp-on-failover enables under config system ha on both cluster members
D.
Configure set send-garp-on-failover enables under config system ha on both cluster members
Answers
Suggested answer: B

Explanation:

Virtual MAC Address and Failover

- The new primary broadcasts Gratuitous ARP packets to notify the network that each virtual MAC is now reachable through a different switch port.

- Some high-end switches might not clear their MAC table correctly after a failover - Solution: Force former primary to shut down all its interfaces for one second when the failover happens (excluding heartbeat and reserved management interfaces):

#Config system ha

set link-failed-signal enable

end

- This simulates a link failure that clears the related entries from MAC table of the switches.

Exhibit.

Refer to the exhibit, which shows information about an OSPF interlace

What two conclusions can you draw from this command output? (Choose two.)

A.
The port3 network has more man one OSPF router
A.
The port3 network has more man one OSPF router
Answers
B.
The OSPF routers are in the area ID of 0.0.0.1.
B.
The OSPF routers are in the area ID of 0.0.0.1.
Answers
C.
The interfaces of the OSPF routers match the MTU value that is configured as 1500.
C.
The interfaces of the OSPF routers match the MTU value that is configured as 1500.
Answers
D.
NGFW-1 is the designated router
D.
NGFW-1 is the designated router
Answers
Suggested answer: A, C

Explanation:

From the OSPF interface command output, we can conclude that the port3 network has more than one OSPF router because the Neighbor Count is 2, indicating the presence of another OSPF router besides NGFW-1. Additionally, we can deduce that the interfaces of the OSPF routers match the MTU value configured as 1500, which is necessary for OSPF neighbors to form adjacencies. The MTU mismatch would prevent OSPF from forming a neighbor relationship.

Fortinet FortiOS Handbook: OSPF Configuration

In which two ways does fortiManager function when it is deployed as a local FDS? (Choose two)

A.
lt can be configured as an update server a rating server or both
A.
lt can be configured as an update server a rating server or both
Answers
B.
It provides VM license validation services
B.
It provides VM license validation services
Answers
C.
It supports rating requests from non-FortiGate devices.
C.
It supports rating requests from non-FortiGate devices.
Answers
D.
It caches available firmware updates for unmanaged devices
D.
It caches available firmware updates for unmanaged devices
Answers
Suggested answer: A, B

Explanation:

When deployed as a local FortiGuard Distribution Server (FDS), FortiManager functions in several capacities. It can act as an update server, a rating server, or both, providing firmware updates and FortiGuard database updates. Additionally, it plays a crucial role in VM license validation services, ensuring that the connected FortiGate devices are operating with valid licenses. However, it does not support rating requests from non-FortiGate devices nor cache firmware updates for unmanaged devices.

Fortinet FortiOS Handbook: FortiManager as a Local FDS Configuration

Refer to the exhibit.

which contains a partial configuration of the global system. What can you conclude from this output?

A.
NPs and CPs are enabled
A.
NPs and CPs are enabled
Answers
B.
Only CPs arc disabled
B.
Only CPs arc disabled
Answers
C.
Only NPs are disabled
C.
Only NPs are disabled
Answers
D.
NPs and CPs arc disabled
D.
NPs and CPs arc disabled
Answers
Suggested answer: D

Explanation:

The configuration output shows various global settings for a FortiGate device. The terms NP (Network Processor) and CP (Content Processor) relate to FortiGate's hardware acceleration features. However, the provided configuration output does not directly mention the status (enabled or disabled) of NPs and CPs. Typically, the command to disable or enable hardware acceleration features would specifically mention NP or CP in the command syntax. Therefore, based on the output provided, we cannot conclusively determine the status of NPs and CPs, hence option D is the closest answer since the output does not confirm that they are enabled.

FortiOS Handbook - CLI Reference for FortiOS 5.2

Total 56 questions
Go to page: of 6