ExamGecko
Home Home / Fortinet / NSE7_EFW-7.2

Fortinet NSE7_EFW-7.2 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Which two statements about the Security fabric are true? (Choose two.)

A.
FortiGate uses the FortiTelemetry protocol to communicate with FortiAnatyzer.
A.
FortiGate uses the FortiTelemetry protocol to communicate with FortiAnatyzer.
Answers
B.
Only the root FortiGate sends logs to FortiAnalyzer
B.
Only the root FortiGate sends logs to FortiAnalyzer
Answers
C.
Only FortiGate devices with configuration-sync receive and synchronize global CMDB objects that the toot FortiGate sends
C.
Only FortiGate devices with configuration-sync receive and synchronize global CMDB objects that the toot FortiGate sends
Answers
D.
Only the root FortiGate collects network topology information and forwards it to FortiAnalyzer
D.
Only the root FortiGate collects network topology information and forwards it to FortiAnalyzer
Answers
Suggested answer: B, C

Explanation:

In the Security Fabric, only the root FortiGate sends logs to FortiAnalyzer (B). Additionally, only FortiGate devices with configuration-sync enabled receive and synchronize global Central Management Database (CMDB) objects that the root FortiGate sends (C). FortiGate uses the FortiTelemetry protocol to communicate with other FortiGates, not FortiAnalyzer (A). The last option (D) is incorrect as all FortiGates can collect and forward network topology information to FortiAnalyzer.

FortiOS Handbook - Security Fabric

Exhibit.

Refer to the exhibit, which shows the output from the webfilter fortiguard cache dump and webfilter categories commands.

Using the output, how can an administrator determine the category of the training.fortinet.com am website?

A.
The administrator must convert the first three digits of the IP hex value to binary
A.
The administrator must convert the first three digits of the IP hex value to binary
Answers
B.
The administrator can look up the hex value of 34 in the second command output.
B.
The administrator can look up the hex value of 34 in the second command output.
Answers
C.
The administrator must add both the Pima in and Iphex values of 34 to get the category number
C.
The administrator must add both the Pima in and Iphex values of 34 to get the category number
Answers
D.
The administrator must convert the first two digits of the Domain hex value to a decimal value
D.
The administrator must convert the first two digits of the Domain hex value to a decimal value
Answers
Suggested answer: B

Explanation:

Option B is correct because the administrator can determine the category of the training.fortinet.com website by looking up the hex value of 34 in the second command output.This is because the first command output shows that the domain and the IP of the website are both in category (Hex) 34, which corresponds to Information Technology in the second command output1.

Option A is incorrect because the administrator does not need to convert the first three digits of the IP hex value to binary.The IP hex value is already in the same format as the category hex value, so the administrator can simply compare them without any conversion2.

Option C is incorrect because the administrator does not need to add both the Pima in and Iphex values of 34 to get the category number.The Pima in and Iphex values are not related to the category number, but to the cache TTL and the database version respectively3.

Option D is incorrect because the administrator does not need to convert the first two digits of the Domain hex value to a decimal value.The Domain hex value is already in the same format as the category hex value, so the administrator can simply compare them without any conversion2.Reference: =

1: Technical Tip: Verify the webfilter cache content4

2: Hexadecimal to Decimal Converter5

3: FortiGate - Fortinet Community6

: Web filter | FortiGate / FortiOS 7.2.0 - Fortinet Documentation7

Which two statements about bfd are true? (Choose two)

A.
It can support neighbor only over the next hop in BGP
A.
It can support neighbor only over the next hop in BGP
Answers
B.
You can disable it at the protocol level
B.
You can disable it at the protocol level
Answers
C.
It works for OSPF and BGP
C.
It works for OSPF and BGP
Answers
D.
You must configure n globally only
D.
You must configure n globally only
Answers
Suggested answer: B, C

Explanation:

BFD (Bidirectional Forwarding Detection) is a protocol that can quickly detect failures in the forwarding path between two adjacent devices. You can disable BFD at the protocol level by using the ''set bfd disable'' command under the OSPF or BGP configuration. BFD works for both OSPF and BGP protocols, as well as static routes and SD-WAN rules.Reference:=BFD | FortiGate / FortiOS 7.2.0 - Fortinet Document Library, section ''BFD''.

Refer to the exhibit, which shows a custom signature.

Which two modifications must you apply to the configuration of this custom signature so that you can save it on FortiGate? (Choose two.)

A.
Add severity.
A.
Add severity.
Answers
B.
Add attack_id.
B.
Add attack_id.
Answers
C.
Ensure that the header syntax is F-SBID.
C.
Ensure that the header syntax is F-SBID.
Answers
D.
Start options with --.
D.
Start options with --.
Answers
Suggested answer: A, B

Explanation:

For a custom signature to be valid and savable on a FortiGate device, it must include certain mandatory fields. Severity is used to specify the level of threat that the signature represents, and attack_id is a unique identifier for the signature. Without these, the signature would not be complete and could not be correctly utilized by the FortiGate's Intrusion Prevention System (IPS).

Refer to the exhibit, which shows the output of a BGP summary.

What two conclusions can you draw from this BGP summary? (Choose two.)

A.
External BGP (EBGP) exchanges routing information.
A.
External BGP (EBGP) exchanges routing information.
Answers
B.
The BGP session with peer 10. 127. 0. 75 is established.
B.
The BGP session with peer 10. 127. 0. 75 is established.
Answers
C.
The router 100. 64. 3. 1 has the parameter bfd set to enable.
C.
The router 100. 64. 3. 1 has the parameter bfd set to enable.
Answers
D.
The neighbors displayed are linked to a local router with the neighbor-range set to a value of 4.
D.
The neighbors displayed are linked to a local router with the neighbor-range set to a value of 4.
Answers
Suggested answer: A, B

Explanation:

The output of the BGP (Border Gateway Protocol) summary shows details about the BGP neighbors of a router, their Autonomous System (AS) numbers, the state of the BGP session, and other metrics like messages received and sent.

From the BGP summary provided:

A. External BGP (EBGP) exchanges routing information. This conclusion can be inferred because the AS numbers for the neighbors are different from the local AS number (65117), which suggests that these are external connections.

B. The BGP session with peer 10.127.0.75 is established. This is indicated by the state/prefix received column showing a numeric value (1), which typically means that the session is established and a number of prefixes has been received.

C. The router 100.64.3.1 has the parameter bfd set to enable. This cannot be concluded directly from the summary without additional context or commands specifically showing BFD (Bidirectional Forwarding Detection) configuration.

D. The neighbors displayed are linked to a local router with the neighbor-range set to a value of 4. The neighbor-range concept does not apply here; the value 4 in the 'V' column stands for the BGP version number, which is typically 4.

Refer to the exhibit, which shows two configured FortiGate devices and peering over FGSP.

The main link directly connects the two FortiGate devices and is configured using the set session-syn-dev <interface> command.

What is the primary reason to configure the main link?

A.
To have both sessions and configuration synchronization in layer 2
A.
To have both sessions and configuration synchronization in layer 2
Answers
B.
To load balance both sessions and configuration synchronization between layer 2 and 3
B.
To load balance both sessions and configuration synchronization between layer 2 and 3
Answers
C.
To have only configuration synchronization in layer 3
C.
To have only configuration synchronization in layer 3
Answers
D.
To have both sessions and configuration synchronization in layer 3
D.
To have both sessions and configuration synchronization in layer 3
Answers
Suggested answer: D

Explanation:

The primary purpose of configuring a main link between the devices is to synchronize session information so that if one unit fails, the other can continue processing traffic without dropping active sessions.

A. To have both sessions and configuration synchronization in layer 2. This is incorrect because FGSP is used for session synchronization, not configuration synchronization.

B. To load balance both sessions and configuration synchronization between layer 2 and 3. FGSP does not perform load balancing and is not used for configuration synchronization.

C. To have only configuration synchronization in layer 3. The main link is not used solely for configuration synchronization.

D. To have both sessions and configuration synchronization in layer 3. The main link in an FGSP setup is indeed used to synchronize session information across the devices, and it operates at layer 3 since it uses IP addresses to establish the peering.


Which ADVPN configuration must be configured using a script on fortiManager, when using VPN Manager to manage fortiGate VPN tunnels?

A.
Enable AD-VPN in IPsec phase 1
A.
Enable AD-VPN in IPsec phase 1
Answers
B.
Disable add-route on hub
B.
Disable add-route on hub
Answers
C.
Configure IP addresses on IPsec virtual interlaces
C.
Configure IP addresses on IPsec virtual interlaces
Answers
D.
Set protected network to all
D.
Set protected network to all
Answers
Suggested answer: A

Explanation:

To enable AD-VPN, you need to edit an SD-WAN overlay template and enable the Auto-Discovery VPN toggle. This will automatically add the required settings to the IPsec template and the BGP template. You cannot enable AD-VPN directly in the IPsec phase 1 settings using VPN Manager.Reference:=ADVPN | FortiManager 7.2.0 - Fortinet Documentation

Exhibit.

Refer to the exhibit, which provides information on BGP neighbors.

Which can you conclude from this command output?

A.
The router are in the number to match the remote peer.
A.
The router are in the number to match the remote peer.
Answers
B.
You must change the AS number to match the remote peer.
B.
You must change the AS number to match the remote peer.
Answers
C.
BGP is attempting to establish a TCP connection with the BGP peer.
C.
BGP is attempting to establish a TCP connection with the BGP peer.
Answers
D.
The bfd configuration to set to enable.
D.
The bfd configuration to set to enable.
Answers
Suggested answer: C

Explanation:

The BGP state is ''Idle'', indicating that BGP is attempting to establish a TCP connection with the peer. This is the first state in the BGP finite state machine, and it means that no TCP connection has been established yet. If the TCP connection fails, the BGP state will reset to either active or idle, depending on the configuration.Reference: You can find more information about BGP states and troubleshooting in the following Fortinet Enterprise Firewall 7.2 documents:

Troubleshooting BGP

How BGP works

Exhibit.

Refer to the exhibit, which contains the partial ADVPN configuration of a spoke.

Which two parameters must you configure on the corresponding single hub? (Choose two.)

A.
Set auto-discovery-sender enable
A.
Set auto-discovery-sender enable
Answers
B.
Set ike-version 2
B.
Set ike-version 2
Answers
C.
Set auto-discovery-forwarder enable
C.
Set auto-discovery-forwarder enable
Answers
D.
Set auto-discovery-receiver enable
D.
Set auto-discovery-receiver enable
Answers
Suggested answer: A, C

Explanation:

For an ADVPN spoke configuration shown, the corresponding hub must have auto-discovery-sender enabled to send shortcut advertisement messages to the spokes. Also, the hub would need to have auto-discovery-forwarder enabled if it is to forward on those shortcut advertisements to other spokes. This allows the hub to inform all spokes about the best path to reach each other. The ike-version does not need to be reconfigured on the hub if it's already set to version 2 and auto-discovery-receiver is not necessary on the hub because it's the one sending the advertisements, not receiving.

FortiOS Handbook - ADVPN

Which FortiGate in a Security I auric sends togs to FortiAnalyzer?

A.
Only the root FortiGate.
A.
Only the root FortiGate.
Answers
B.
Each FortiGate in the Security fabric.
B.
Each FortiGate in the Security fabric.
Answers
C.
The FortiGate devices performing network address translation (NAT) or unified threat management (UTM). if configured.
C.
The FortiGate devices performing network address translation (NAT) or unified threat management (UTM). if configured.
Answers
D.
Only the last FortiGate that handled a session in the Security Fabric
D.
Only the last FortiGate that handled a session in the Security Fabric
Answers
Suggested answer: B

Explanation:

Option B is correct because each FortiGate in the Security Fabric can send logs to FortiAnalyzer for centralized logging and analysis12. This allows you to monitor and manage the entire Security Fabric from a single console and view aggregated reports and dashboards.

Option A is incorrect because the root FortiGate is not the only device that can send logs to FortiAnalyzer.The root FortiGate is the device that initiates the Security Fabric and acts as the central point of contact for other FortiGate devices3. However, it does not have to be the only log source for FortiAnalyzer.

Option C is incorrect because the FortiGate devices performing NAT or UTM are not the only devices that can send logs to FortiAnalyzer.These devices can perform additional security functions on the traffic that passes through them, such as firewall, antivirus, web filtering, etc4. However, they are not the only devices that generate logs in the Security Fabric.

Option D is incorrect because the last FortiGate that handled a session in the Security Fabric is not the only device that can send logs to FortiAnalyzer.The last FortiGate is the device that terminates the session and applies the final security policy5. However, it does not have to be the only device that reports the session information to FortiAnalyzer.Reference: =

1: Security Fabric - Fortinet Documentation1

2: FortiAnalyzer Demo6

3: Security Fabric topology

4: Security Fabric UTM features

5: Security Fabric session handling

Total 56 questions
Go to page: of 6