ExamGecko
Home Home / Fortinet / NSE7_LED-7.0

Fortinet NSE7_LED-7.0 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit

Examine the FortiGate RSSO configuration shown in the exhibit

FortiGate is configured to receive RADIUS accounting messages on port3 to authenticate RSSO users The users are located behind port3 and the internet link is connected to port1 FortiGate is processing incoming RADIUS accounting messages successfully and RSSO users are getting associated with the RSSO Group user group However all the users are able to access the internet, and the administrator wants to restrict internet access to RSSO users only

Which configuration change should the administrator make to fix the problem?

A.
Change the RADIUS Attribute Value selling to match the name of the RADIUS attribute containing the group membership information of the RSSO users
A.
Change the RADIUS Attribute Value selling to match the name of the RADIUS attribute containing the group membership information of the RSSO users
Answers
B.
Add RSSO Group to the firewall policy
B.
Add RSSO Group to the firewall policy
Answers
C.
Enable Security Fabric Connection on port3
C.
Enable Security Fabric Connection on port3
Answers
D.
Create a second firewall policy from port3 lo port1 and select the target destination subnets
D.
Create a second firewall policy from port3 lo port1 and select the target destination subnets
Answers
Suggested answer: B

Explanation:

According to the exhibit, the firewall policy from port3 to port1 has no user group specified, which means that it allows all users to access the internet. Therefore, option B is true because adding RSSO Group to the firewall policy will restrict internet access to RSSO users only. Option A is false because changing the RADIUS Attribute Value setting will not affect the firewall policy, but rather the RSSO user group membership. Option C is false because enabling Security Fabric Connection on port3 will not affect the firewall policy, but rather the communication between FortiGate and other Security Fabric devices. Option D is false because creating a second firewall policy from port3 to port1 will not affect the existing firewall policy, but rather create a redundant or conflicting policy.

Which two statements about MAC address quarantine by redirect mode are true? (Choose two)

A.
The quarantined device is moved to the quarantine VLAN
A.
The quarantined device is moved to the quarantine VLAN
Answers
B.
The device MAC address is added to the Quarantined Devices firewall address group
B.
The device MAC address is added to the Quarantined Devices firewall address group
Answers
C.
It is the default mode for MAC address quarantine
C.
It is the default mode for MAC address quarantine
Answers
D.
The quarantined device is kept in the current VLAN
D.
The quarantined device is kept in the current VLAN
Answers
Suggested answer: B, D

Explanation:

According to the FortiGate Administration Guide, ''MAC address quarantine by redirect mode allows you to quarantine devices by adding their MAC addresses to a firewall address group called Quarantined Devices. The quarantined devices are kept in their current VLANs, but their traffic is redirected to a quarantine portal.'' Therefore, options B and D are true because they describe the statements about MAC address quarantine by redirect mode. Option A is false because the quarantined device is not moved to the quarantine VLAN, but rather kept in the current VLAN. Option C is false because redirect mode is not the default mode for MAC address quarantine, but rather an alternative mode that can be enabled by setting mac-quarantine-mode to redirect.

: https://docs.fortinet.com/document/fortiap/7.0.0/configuration-guide/734537/radius-authenticated-dynamic-vlan-allocation : https://docs.fortinet.com/document/fortigate/7.0.0/administration-guide/734537/mac-address-quarantine

Refer to the exhibit.

Refer to the exhibit showing a network topology and SSID settings.

FortiGate is configured to use an external captive portal However wireless users are not able to see the captive portal login page

Which configuration change should the administrator make to fix the problem?

A.
Enable NAT in the firewall policy with the ID 13.
A.
Enable NAT in the firewall policy with the ID 13.
Answers
B.
Add the FortiAuthenticator and WindowsAD address objects as exempt destinations services
B.
Add the FortiAuthenticator and WindowsAD address objects as exempt destinations services
Answers
C.
Enable the captive-portal-exempt option in the firewall policy with the ID 12
C.
Enable the captive-portal-exempt option in the firewall policy with the ID 12
Answers
D.
Remove the guest.portal user group in the firewall policy with the ID 12
D.
Remove the guest.portal user group in the firewall policy with the ID 12
Answers
Suggested answer: B

Explanation:

According to the exhibit, the network topology and SSID settings show that FortiGate is configured to use an external captive portal hosted on FortiAuthenticator, which is connected to a Windows AD server for user authentication. However, wireless users are not able to see the captive portal login page, which means that they are not redirected to the external captive portal URL. Therefore, option B is true because adding the FortiAuthenticator and WindowsAD address objects as exempt destinations services will allow the wireless users to access the external captive portal URL without being blocked by the firewall policy. Option A is false because enabling NAT in the firewall policy with the ID 13 will not affect the redirection to the external captive portal URL, but rather the source IP address of the wireless traffic. Option C is false because enabling the captive-portal-exempt option in the firewall policy with the ID 12 will bypass the captive portal authentication for the wireless users, which is not the desired outcome. Option D is false because removing the guest.portal user group in the firewall policy with the ID 12 will prevent the wireless users from being authenticated by FortiGate, which is required for accessing the external captive portal.

Refer to the exhibit.

Examine the debug output shown in the exhibit

Which two statements about the RADIUS debug output are true'' (Choose two)

A.
The user student belongs to the SSLVPN group
A.
The user student belongs to the SSLVPN group
Answers
B.
User authentication failed
B.
User authentication failed
Answers
C.
The RADIUS server sent a vendor-specific attribute in the RADIUS response
C.
The RADIUS server sent a vendor-specific attribute in the RADIUS response
Answers
D.
User authentication succeeded using MSCHAP
D.
User authentication succeeded using MSCHAP
Answers
Suggested answer: A, D

Explanation:

According to the exhibit, the debug output shows a RADIUS debug output from FortiGate. The output shows that FortiGate sent a RADIUS Access-Request packet to FortiAuthenticator with the username student and received a RADIUS Access-Accept packet from FortiAuthenticator with a Class attribute containing SSLVPN. Therefore, option A is true because it indicates that the user student belongs to the SSLVPN group on FortiAuthenticator. The output also shows that FortiGate used MSCHAP as the authentication method and received a MS-MPPE-Send-Key and a MS-MPPE-Recv-Key from FortiAuthenticator. Therefore, option D is true because it indicates that user authentication succeeded using MSCHAP. Option B is false because user authentication did not fail, but rather succeeded. Option C is false because FortiAuthenticator did not send a vendor-specific attribute in the RADIUS response, but rather standard attributes defined by RFCs.

An administrator is testing the connectivity for a new VLAN The devices in the VLAN are connected to a FortiSwitch device that is managed by FortiGate Quarantine is disabled on FortiGate

While testing the administrator noticed that devices can ping FortiGate and FortiGate can ping the devices The administrator also noticed that inter-VLAN communication works However intra-VLAN communication does not work

Which scenario is likely to cause this issue?

A.
Access VLAN is enabled on the VLAN
A.
Access VLAN is enabled on the VLAN
Answers
B.
The native VLAN configured on the ports is incorrect
B.
The native VLAN configured on the ports is incorrect
Answers
C.
The FortiSwitch MAC address table is missing entries
C.
The FortiSwitch MAC address table is missing entries
Answers
D.
The FortiGate ARP table is missing entries
D.
The FortiGate ARP table is missing entries
Answers
Suggested answer: C

Explanation:

According to the scenario, the devices in the VLAN are connected to a FortiSwitch device that is managed by FortiGate. Quarantine is disabled on FortiGate, which means that the devices are not blocked by any security policy. The devices can ping FortiGate and FortiGate can ping the devices, which means that the IP connectivity is working. Inter-VLAN communication works, which means that the routing between VLANs is working. However, intra-VLAN communication does not work, which means that the switching within the VLAN is not working. Therefore, option C is true because the FortiSwitch MAC address table is missing entries, which means that the FortiSwitch does not know how to forward frames to the destination MAC addresses within the VLAN. Option A is false because access VLAN is enabled on the VLAN, which means that the VLAN ID is added to the frames on ingress and removed on egress. This does not affect intra-VLAN communication. Option B is false because the native VLAN configured on the ports is incorrect, which means that the frames on the native VLAN are not tagged with a VLAN ID. This does not affect intra-VLAN communication. Option D is false because the FortiGate ARP table is missing entries, which means that FortiGate does not know how to map IP addresses to MAC addresses. This does not affect intra-VLAN communication.

You are investigating a report of poor wireless performance in a network that you manage. The issue is related to an AP interface in the 5 GHz range You are monitoring the channel utilization over time.

What is the recommended maximum utilization value that an interface should not exceed?

A.
85%
A.
85%
Answers
B.
95%
B.
95%
Answers
C.
75%
C.
75%
Answers
D.
65%
D.
65%
Answers
Suggested answer: D

Explanation:

According to the FortiAP Configuration Guide, ''Channel utilization measures how busy a channel is over a given period of time. It includes both Wi-Fi and non-Wi-Fi interference sources. A high channel utilization indicates a congested channel and can result in poor wireless performance. The recommended maximum utilization value that an interface should not exceed is 65%.'' Therefore, option D is true because it gives the recommended maximum utilization value for an interface in the 5 GHz range. Options A, B, and C are false because they give higher utilization values that can cause poor wireless performance.

: https://docs.fortinet.com/document/fortiap/7.0.0/configuration-guide/734537/wireless-radio-settings#channel-utilization

Refer to the exhibit

A device connected to port2 on FortiSwitch cannot access the network The port is assigned a security policy to enforce 802 1X authentication While troubleshooting the issue, the administrator obtains the debug output shown in the exhibit

Which two scenarios are likely to cause this issue? (Choose two.)

A.
The device is not configured for 802 IX authentication.
A.
The device is not configured for 802 IX authentication.
Answers
B.
The device has been quarantined for 3600 seconds.
B.
The device has been quarantined for 3600 seconds.
Answers
C.
The device has been assigned the guest VLAN
C.
The device has been assigned the guest VLAN
Answers
D.
The device does not support 802 1X authentication
D.
The device does not support 802 1X authentication
Answers
Suggested answer: A, D

Explanation:

According to the exhibit, the debug output shows that the device connected to port2 on FortiSwitch is sending an EAPOL-Start message, which is the first step of the 802.1X authentication process. However, the output also shows that the device is not sending any EAP-Response messages, which are required to complete the authentication process. Therefore, option A is true because the device is not configured for 802.1X authentication, which means that it does not have the correct credentials or settings to authenticate with the RADIUS server. Option D is also true because the device does not support 802.1X authentication, which means that it does not have the capability or software to perform 802.1X authentication. Option B is false because the device has not been quarantined for 3600 seconds, but rather has a session timeout of 3600 seconds, which is the default value for 802.1X sessions. Option C is false because the device has not been assigned the guest VLAN, but rather has been assigned the default VLAN, which is VLAN 1.

Which two pieces of information can the diagnose test authserver ldap command provide? (Choose two.)

A.
It displays whether the admin bind user credentials are correct
A.
It displays whether the admin bind user credentials are correct
Answers
B.
It displays whether the user credentials are correct
B.
It displays whether the user credentials are correct
Answers
C.
It displays the LDAP codes returned by the LDAP server
C.
It displays the LDAP codes returned by the LDAP server
Answers
D.
It displays the LDAP groups found for the user
D.
It displays the LDAP groups found for the user
Answers
Suggested answer: B, C

Explanation:

According to the FortiGate CLI Reference Guide, ''The diagnose test authserver ldap command tests LDAP authentication with a specific LDAP server. The command displays whether the user credentials are correct and whether the user belongs to any groups that match a firewall policy. The command also displays the LDAP codes returned by the LDAP server.'' Therefore, options B and C are true because they describe the information that the diagnose test authserver ldap command can provide. Option A is false because the command does not display whether the admin bind user credentials are correct, but rather whether the user credentials are correct. Option D is false because the command does not display the LDAP groups found for the user, but rather whether the user belongs to any groups that match a firewall policy.

You are setting up an SSID (VAP) to perform RADlUS-authenticated dynamic VLAN allocation

Which three RADIUS attributes must be supplied by the RADIUS server to enable successful VLAN allocation'' (Choose three.)

A.
Tunnel-Private-Group-ID
A.
Tunnel-Private-Group-ID
Answers
B.
Tunnel-Pvt-Group-ID
B.
Tunnel-Pvt-Group-ID
Answers
C.
Tunnel-Preference
C.
Tunnel-Preference
Answers
D.
Tunnel-Type
D.
Tunnel-Type
Answers
E.
Tunnel-Medium-Type
E.
Tunnel-Medium-Type
Answers
Suggested answer: A, D, E

Explanation:

According to the FortiAP Configuration Guide, 'To perform RADIUS-authenticated dynamic VLAN allocation, the RADIUS server must supply the following RADIUS attributes: Tunnel-Private-Group-ID, which specifies the VLAN ID to assign to the user. Tunnel-Type, which specifies the tunneling protocol used for the VLAN. The value must be 13 (VLAN). Tunnel-Medium-Type, which specifies the transport medium used for the VLAN. The value must be 6 (802). Therefore, options A, D, and E are true because they describe the RADIUS attributes that must be supplied by the RADIUS server to enable successful VLAN allocation. Option B is false because Tunnel-Pvt-Group-ID is not a valid RADIUS attribute name, but rather a typo for Tunnel-Private-Group-ID. Option C is false because Tunnel-Preference is not a required RADIUS attribute for dynamic VLAN allocation, but rather an optional attribute that specifies the priority of the VLAN.

Refer to the exhibit.

By default FortiOS creates the following DHCP server scope for the FortiLink interface as shown in the exhibit

What is the objective of the vci-string setting?

A.
To ignore DHCP requests coming from FortiSwitch and FortiExtender devices
A.
To ignore DHCP requests coming from FortiSwitch and FortiExtender devices
Answers
B.
To reserve IP addresses for FortiSwitch and FortiExtender devices
B.
To reserve IP addresses for FortiSwitch and FortiExtender devices
Answers
C.
To restrict the IP address assignment to FortiSwitch and FortiExtender devices
C.
To restrict the IP address assignment to FortiSwitch and FortiExtender devices
Answers
D.
To restrict the IP address assignment to devices that have FortiSwitch or FortiExtender as their hostname
D.
To restrict the IP address assignment to devices that have FortiSwitch or FortiExtender as their hostname
Answers
Suggested answer: C

Explanation:

According to the exhibit, the DHCP server scope for the FortiLink interface has a vci-string setting with the value ''Cisco AP c2700''. This setting is used to match the vendor class identifier (VCI) of the DHCP clients that request an IP address from the DHCP server. The VCI is a text string that uniquely identifies a type of vendor device. Therefore, option C is true because the vci-string setting restricts the IP address assignment to FortiSwitch and FortiExtender devices, which use the VCI ''Cisco AP c2700''. Option A is false because the vci-string setting does not ignore DHCP requests coming from FortiSwitch and FortiExtender devices, but rather accepts them. Option B is false because the vci-string setting does not reserve IP addresses for FortiSwitch and FortiExtender devices, but rather assigns them dynamically. Option D is false because the vci-string setting does not restrict the IP address assignment to devices that have FortiSwitch or FortiExtender as their hostname, but rather to devices that have ''Cisco AP c2700'' as their VCI.

Total 37 questions
Go to page: of 4