ExamGecko
Home / Fortinet / NSE7_EFW-7.2 / List of questions
Ask Question

Fortinet NSE7_EFW-7.2 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Refer to the exhibit, which shows a routing table.

Fortinet NSE7_EFW-7.2 image Question 31 26983 09182024190732000000

What two options can you configure in OSPF to block the advertisement of the 10.1.10.0 prefix? (Choose two.)

Remove the 16.1.10.C prefix from the OSPF network
Remove the 16.1.10.C prefix from the OSPF network
Configure a distribute-list-out
Configure a distribute-list-out
Configure a route-map out
Configure a route-map out
Disable Redistribute Connected
Disable Redistribute Connected
Suggested answer: B, C
Explanation:

To block the advertisement of the 10.1.10.0 prefix in OSPF, you can configure a distribute-list-out or a route-map out.A distribute-list-out is used to filter outgoing routing updates from being advertised to OSPF neighbors1.A route-map out can also be used for filtering and is applied to outbound routing updates2.Reference:=Technical Tip: Inbound route filtering in OSPF usi ... - Fortinet Community,OSPF | FortiGate / FortiOS 7.2.2 - Fortinet Documentation

asked 18/09/2024
Rua Tebas
46 questions

Question 32

Report Export Collapse

Exhibit.

Fortinet NSE7_EFW-7.2 image Question 32 26984 09182024190732000000

Refer to the exhibit, which shows a partial touting table

What two concisions can you draw from the corresponding FortiGate configuration? (Choose two.)

IPSec Tunnel aggregation is configured
IPSec Tunnel aggregation is configured
net-device is enabled in the tunnel IPSec phase 1 configuration
net-device is enabled in the tunnel IPSec phase 1 configuration
OSPI is configured to run over IPSec.
OSPI is configured to run over IPSec.
add-route is disabled in the tunnel IPSec phase 1 configuration.
add-route is disabled in the tunnel IPSec phase 1 configuration.
Suggested answer: B, D
Explanation:

Option B is correct because the routing table shows that the tunnel interfaces have a netmask of 255.255.255.255, which indicates that net-device is enabled in the phase 1 configuration.This option allows the FortiGate to use the tunnel interface as a next-hop for routing, without adding a route to the phase 2 destination1.

Option D is correct because the routing table does not show any routes to the phase 2 destination networks, which indicates that add-route is disabled in the phase 1 configuration.This option controls whether the FortiGate adds a static route to the phase 2 destination network using the tunnel interface as the gateway2.

Option A is incorrect because IPSec tunnel aggregation is a feature that allows multiple phase 2 selectors to share a single phase 1 tunnel, reducing the number of tunnels and improving performance3. This feature is not related to the routing table or the phase 1 configuration.

Option C is incorrect because OSPF is a dynamic routing protocol that can run over IPSec tunnels, but it requires additional configuration on the FortiGate and the peer device4. This option is not related to the routing table or the phase 1 configuration.Reference: =

1: Technical Tip: 'set net-device' new route-based IPsec logic2

2: Adding a static route5

3: IPSec VPN concepts6

4: Dynamic routing over IPsec VPN7

asked 18/09/2024
Justin Schowalter
41 questions

Question 33

Report Export Collapse

Which configuration can be used to reduce the number of BGP sessions in on IBGP network?

Route-reflector-peer enable
Route-reflector-peer enable
Route-reflector-client enable
Route-reflector-client enable
Route-reflector enable
Route-reflector enable
Route-reflector-server enable
Route-reflector-server enable
Suggested answer: B
Explanation:

To reduce the number of BGP sessions in an IBGP network, you can use a route reflector, which acts as a focal point for IBGP sessions and readvertises the prefixes to all other peers. To configure a route reflector, you need to enable the route-reflector-client option on the neighbor-group settings of the hub device. This will make the hub device act as a route reflector server and the other devices as route reflector clients.Reference:=Route exchange | FortiGate / FortiOS 7.2.0 - Fortinet Documentation

asked 18/09/2024
Leandro Ruwer
50 questions

Question 34

Report Export Collapse

Exhibit.

Fortinet NSE7_EFW-7.2 image Question 34 26986 09182024190732000000

Refer to the exhibit, which contains a partial policy configuration.

Which setting must you configure to allow SSH?

Specify SSH in the Service field
Specify SSH in the Service field
Configure pot 22 in the Protocol Options field.
Configure pot 22 in the Protocol Options field.
Include SSH in the Application field
Include SSH in the Application field
Select an application control profile corresponding to SSH in the Security Profiles section
Select an application control profile corresponding to SSH in the Security Profiles section
Suggested answer: A
Explanation:

Option A is correct because to allow SSH, you need to specify SSH in the Service field of the policy configuration.This is because the Service field determines which types of traffic are allowed by the policy1. By default, the Service field is set to App Default, which means that the policy will use the default ports defined by the applications.However, SSH is not one of the default applications, so you need to specify it manually or create a custom service for it2.

Option B is incorrect because configuring port 22 in the Protocol Options field is not enough to allow SSH.The Protocol Options field allows you to customize the protocol inspection and anomaly protection settings for the policy3. However, this field does not override the Service field, which still needs to match the traffic type.

Option C is incorrect because including SSH in the Application field is not enough to allow SSH.The Application field allows you to filter the traffic based on the application signatures and categories4. However, this field does not override the Service field, which still needs to match the traffic type.

Option D is incorrect because selecting an application control profile corresponding to SSH in the Security Profiles section is not enough to allow SSH. The Security Profiles section allows you to apply various security features to the traffic, such as antivirus, web filtering, IPS, etc. However, this section does not override the Service field, which still needs to match the traffic type.Reference: =

1: Firewall policies

2: Services

3: Protocol options profiles

4: Application control

asked 18/09/2024
Juan Jose Montero Caletrio
37 questions

Question 35

Report Export Collapse

You want to block access to the website ww.eicar.org using a custom IPS signature.

Which custom IPS signature should you configure?

A)

Fortinet NSE7_EFW-7.2 image Question 35 26987 09182024190732000000

B)

Fortinet NSE7_EFW-7.2 image Question 35 26987 09182024190732000000

C)

Fortinet NSE7_EFW-7.2 image Question 35 26987 09182024190732000000

D)

Fortinet NSE7_EFW-7.2 image Question 35 26987 09182024190732000000

Option A
Option A
Option B
Option B
Option C
Option C
Option D
Option D
Suggested answer: D
Explanation:

Option D is the correct answer because it specifically blocks access to the website ''www.eicar.org'' using TCP protocol and HTTP service, which are commonly used for web browsing. The other options either use the wrong protocol (UDP), the wrong service (DNS or SSL), or the wrong pattern (''eicar'' instead of ''www.eicar.org'').Reference:=Configuring custom signatures | FortiGate / FortiOS 7.4.0 - Fortinet Document Library, section ''Signature to block access to example.com''.

asked 18/09/2024
Mike Werts
36 questions

Question 36

Report Export Collapse

Exhibit.

Fortinet NSE7_EFW-7.2 image Question 36 26988 09182024190732000000

Refer to the exhibit, which shows an ADVPN network.

The client behind Spoke-1 generates traffic to the device located behind Spoke-2.

Which first message floes the hub send to Spoke-110 bring up the dynamic tunnel?

Shortcut query
Shortcut query
Shortcut reply
Shortcut reply
Shortcut offer
Shortcut offer
Shortcut forward
Shortcut forward
Suggested answer: A
Explanation:

In an ADVPN scenario, when traffic is initiated from a client behind one spoke to another spoke, the hub sends a shortcut query to the initiating spoke. This query is used to determine if there is a more direct path for the traffic, which can then trigger the establishment of a dynamic tunnel between the spokes.

asked 18/09/2024
Heritier kandolo
50 questions

Question 37

Report Export Collapse

Exhibit.

Fortinet NSE7_EFW-7.2 image Question 37 26989 09182024190732000000

Refer to the exhibit, which contains a partial VPN configuration.

What can you conclude from this configuration1?

FortiGate creates separate virtual interfaces for each dial up client.
FortiGate creates separate virtual interfaces for each dial up client.
The VPN should use the dynamic routing protocol to exchange routing information Through the tunnels.
The VPN should use the dynamic routing protocol to exchange routing information Through the tunnels.
Dead peer detection s disabled.
Dead peer detection s disabled.
The routing table shows a single IPSec virtual interface.
The routing table shows a single IPSec virtual interface.
Suggested answer: C
Explanation:

The configuration line ''set dpd on-idle'' indicates that dead peer detection (DPD) is set to trigger only when the tunnel is idle, not actively disabled1.Reference:FortiGate IPSec VPN User Guide - Fortinet Document Library

From the given VPN configuration, dead peer detection (DPD) is set to 'on-idle', indicating that DPD is enabled and will be used to detect if the other end of the VPN tunnel is still alive when no traffic is detected. Hence, option C is incorrect. The configuration shows the tunnel set to type 'dynamic', which does not create separate virtual interfaces for each dial-up client (A), and it is not specified that dynamic routing will be used (B). Since this is a phase 1 configuration snippet, the routing table aspect (D) cannot be concluded from this alone.

asked 18/09/2024
Maria Lilian Tongson
44 questions

Question 38

Report Export Collapse

You contoured an address object on the tool fortiGate in a Security Fabric. This object is not synchronized with a downstream device. Which two reasons could be the cause? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 39

Report Export Collapse

Exhibit.

Fortinet NSE7_EFW-7.2 image Question 39 26991 09182024190732000000

Refer to the exhibit, which contains a CLI script configuration on fortiManager. An administrator configured the CLI script on FortiManager rut the script tailed to apply any changes to the managed device after being executed.

What are two reasons why the script did not make any changes to the managed device? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 40

Report Export Collapse

You created a VPN community using VPN Manager on FortiManager. You also added gateways to the VPN community. Now you are trying to create firewall policies to permit traffic over the tunnel however, the VPN interfaces do not appear as available options.

Become a Premium Member for full access
  Unlock Premium Member
Total 64 questions
Go to page: of 7
Search

Related questions