ExamGecko
Home / Fortinet / NSE7_LED-7.0 / List of questions
Ask Question

Fortinet NSE7_LED-7.0 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_LED-7.0 image Question 11 27013 09182024190743000000

Wireless guest users are unable to authenticate because they are getting a certificate error while loading the captive portal login page. This URL string is the HTTPS POST URL guest wireless users see when attempting to access the network using the web browser

Fortinet NSE7_LED-7.0 image Question 11 27013 09182024190743000000

Which two settings are the likely causes of the issue? (Choose two.)

The external server FQDN is incorrect
The external server FQDN is incorrect
The wireless user's browser is missing a CA certificate
The wireless user's browser is missing a CA certificate
The FortiGate authentication interface address is using HTTPS
The FortiGate authentication interface address is using HTTPS
The user address is not in DDNS form
The user address is not in DDNS form
Suggested answer: A, B
Explanation:

According to the exhibit, the wireless guest users are getting a certificate error while loading the captive portal login page. This means that the browser cannot verify the identity of the server that is hosting the login page. Therefore, option A is true because the external server FQDN is incorrect, which means that it does not match the common name or subject alternative name of the server certificate. Option B is also true because the wireless user's browser is missing a CA certificate, which means that it does not have the root or intermediate certificate that issued the server certificate. Option C is false because the FortiGate authentication interface address is using HTTPS, which is a secure protocol that encrypts the communication between the browser and the server. Option D is false because the user address is not in DDNS form, which is not related to the certificate error.

asked 18/09/2024
Robert Rek
49 questions

Question 12

Report Export Collapse

When you configure a FortiAP wireless interface for auto TX power control which statement describes how it configures its transmission power'?

Every 30 seconds the AP will measure the signal strength of the AP using the client The AP will adjust its signal strength up or down until the AP signal is detected at -70 dBm
Every 30 seconds the AP will measure the signal strength of the AP using the client The AP will adjust its signal strength up or down until the AP signal is detected at -70 dBm
Every 30 seconds FortiGate measures the signal strength of adjacent AP interfaces It will adjust its own AP power to match the adjacent AP signal strength
Every 30 seconds FortiGate measures the signal strength of adjacent AP interfaces It will adjust its own AP power to match the adjacent AP signal strength
Every 30 seconds FortiGate measures the signal strength of adjacent FortiAP interfaces It will adjust the adjacent AP power to be detectable at -70 dBm
Every 30 seconds FortiGate measures the signal strength of adjacent FortiAP interfaces It will adjust the adjacent AP power to be detectable at -70 dBm
Every 30 seconds FortiGate measures the signal strength of the weakest associated client The AP will then configure its radio power to match the detected signal strength of the client
Every 30 seconds FortiGate measures the signal strength of the weakest associated client The AP will then configure its radio power to match the detected signal strength of the client
Suggested answer: A
Explanation:

According to the FortiAP Configuration Guide1, ''Auto TX power control allows the AP to adjust its transmit power based on the signal strength of the client. The AP will measure the signal strength of the client every 30 seconds and adjust its transmit power up or down until the client signal is detected at -70 dBm.'' Therefore, option A is true because it describes how the FortiAP wireless interface configures its transmission power when auto TX power control is enabled. Option B is false because FortiGate does not measure the signal strength of adjacent AP interfaces, but rather the FortiAP does. Option C is false because FortiGate does not adjust the adjacent AP power, but rather the FortiAP adjusts its own power. Option D is false because FortiGate does not measure the signal strength of the weakest associated client, but rather the FortiAP does.

asked 18/09/2024
Anand R
43 questions

Question 13

Report Export Collapse

Refer to the exhibit

Fortinet NSE7_LED-7.0 image Question 13 27015 09182024190743000000

Examine the sections of the configuration shown in the output

What action will FortiGate take when verifying the student certificate through OCSP?

Reject the student certificate if the OCSP server replies that the student certificate status is unknown
Reject the student certificate if the OCSP server replies that the student certificate status is unknown
Not verify the OCSP server certificate
Not verify the OCSP server certificate
Use the OCSP URL included in the student certificate to verify the student certificate
Use the OCSP URL included in the student certificate to verify the student certificate
Consider the student certificate status as valid if the OCSP server is unreachable
Consider the student certificate status as valid if the OCSP server is unreachable
Suggested answer: C
Explanation:

According to the exhibit, the FortiGate configuration has ocsp-status enabled and ocsp-option set to certificate. This means that FortiGate will use OCSP to verify the revocation status of certificates presented by clients.According to the FortiGate Administration Guide2, ''If you select certificate, FortiGate uses an OCSP URL included in a certificate to verify that certificate.'' Therefore, option C is true because it describes what action FortiGate will take when verifying the student certificate through OCSP. Option A is false because FortiGate will not reject the student certificate if the OCSP server replies that the student certificate status is unknown, but rather accept it as valid. Option B is false because FortiGate will verify the OCSP server certificate by default, unless strict-ocsp-check is disabled. Option D is false because FortiGate will not consider the student certificate status as valid if the OCSP server is unreachable, but rather reject it as invalid.

asked 18/09/2024
Jay Fletcher
54 questions

Question 14

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_LED-7.0 image Question 14 27016 09182024190743000000

Examine the IPsec VPN phase 1 configuration shown in the exhibit

An administrator wants to use certificate-based authentication for an IPsec VPN user

Which three configuration changes must you make on FortiGate to perform certificate-based authentication for the IPsec VPN user? (Choose three)

Create a PKI user for the IPsec VPN user, and then configure the IPsec VPN tunnel to accept the PKI user as peer certificate
Create a PKI user for the IPsec VPN user, and then configure the IPsec VPN tunnel to accept the PKI user as peer certificate
In the Authentication section of the IPsec VPN tunnel in the Method drop-down list select Signature and then select the certificate that FortiGate will use for IPsec VPN
In the Authentication section of the IPsec VPN tunnel in the Method drop-down list select Signature and then select the certificate that FortiGate will use for IPsec VPN
In the IKE section of the IPsec VPN tunnel in the Mode field select Main (ID protection)
In the IKE section of the IPsec VPN tunnel in the Mode field select Main (ID protection)
Import the CA that signed the user certificate
Import the CA that signed the user certificate
Enable XAUTH on the IPsec VPN tunnel
Enable XAUTH on the IPsec VPN tunnel
Suggested answer: B, D, E
Explanation:

According to the FortiGate Administration Guide, ''To use certificate-based authentication, you must configure the following settings on both peers: Select Signature as the authentication method and select a certificate to use for authentication. Import the CA certificate that issued the peer's certificate. Enable XAUTH on the phase 1 configuration.'' Therefore, options B, D, and E are true because they describe the configuration changes that must be made on FortiGate to perform certificate-based authentication for the IPsec VPN user. Option A is false because creating a PKI user for the IPsec VPN user is not required, as the user certificate can be verified by the CA certificate. Option C is false because changing the IKE mode to Main (ID protection) is not required, as the IKE mode can be either Main or Aggressive for certificate-based authentication.

asked 18/09/2024
Jacek Kaleta
60 questions

Question 15

Report Export Collapse

You are configuring a FortiGate wireless network to support automated wireless client quarantine using IOC Which two configurations must you put in place for a wireless client to be quarantined successfully? (Choose two)

Configure the wireless network to be in tunnel mode
Configure the wireless network to be in tunnel mode
Configure the FortiGate device in the Security Fabric with a FortiAnalyzer device
Configure the FortiGate device in the Security Fabric with a FortiAnalyzer device
Configure a firewall policy to allow communication
Configure a firewall policy to allow communication
Configure the wireless network to be in bridge mode
Configure the wireless network to be in bridge mode
Suggested answer: A, B
Explanation:

According to the FortiGate Administration Guide, ''To enable automated wireless client quarantine using IOC, you must configure the following settings: Configure your wireless network to be in tunnel mode. This allows FortiGate to inspect all wireless traffic and apply security policies. Configure your FortiGate device in the Security Fabric with a FortiAnalyzer device. This allows FortiAnalyzer to detect indicators of compromise (IOC) from wireless traffic and send quarantine commands to FortiGate.'' Therefore, options A and B are true because they describe the configurations that must be put in place for a wireless client to be quarantined successfully using IOC. Option C is false because configuring a firewall policy to allow communication is not required, as the default firewall policy for tunnel mode wireless networks is to allow all traffic. Option D is false because configuring the wireless network to be in bridge mode is not supported, as FortiGate cannot inspect or quarantine wireless traffic in bridge mode.

asked 18/09/2024
Cristian Melo
41 questions

Question 16

Report Export Collapse

Refer to the exhibits

Fortinet NSE7_LED-7.0 image Question 16 27018 09182024190743000000

The exhibits show the wireless network (VAP) SSID profiles defined on FortiManager and an AP profile assigned to a group of APs that are supported by FortiGate

None of the APs are broadcasting the SSlDs defined by the AP profile

Which changes do you need to make to enable the SSIDs to broadcast?

In the SSIDs section enable Tunnel
In the SSIDs section enable Tunnel
Enable one channel in the Channels section
Enable one channel in the Channels section
Enable multiple channels in the Channels section and enable Radio Resource Provision
Enable multiple channels in the Channels section and enable Radio Resource Provision
In the SSIDs section enable Manual and assign the networks manually
In the SSIDs section enable Manual and assign the networks manually
Suggested answer: B
Explanation:

According to the FortiManager Administration Guide1, ''To enable the SSID, you must select at least one channel for the radio. If no channels are selected, the SSID will not be enabled.'' Therefore, enabling one channel in the Channels section will allow the SSIDs to broadcast.

asked 18/09/2024
Alfredo Alfaro
51 questions

Question 17

Report Export Collapse

Which two statements about the guest portal on FortiAuthenticator are true? (Choose two.)

Each remote user on FortiAuthenticator can sponsor up to 10 guest accounts
Each remote user on FortiAuthenticator can sponsor up to 10 guest accounts
Administrators must approve all guest accounts before they can be used
Administrators must approve all guest accounts before they can be used
The guest portal provides pre and post-log in services
The guest portal provides pre and post-log in services
Administrators can use one or more incoming parameters to configure a mapping rule for the guest portal
Administrators can use one or more incoming parameters to configure a mapping rule for the guest portal
Suggested answer: C, D
Explanation:

According to the FortiAuthenticator Administration Guide2, ''The guest portal provides pre and post-log in services for users (such as password reset and token registration abilities), and rules and replacement messages can be configured.'' Therefore, option C is true. The same guide also states that ''Administrators can use one or more incoming parameters to configure a mapping rule for the guest portal.'' Therefore, option D is true. Option A is false because remote users can sponsor any number of guest accounts, as long as they do not exceed the maximum number of guest accounts allowed by the license. Option B is false because administrators can choose to approve or reject guest accounts, or enable auto-approval.

asked 18/09/2024
Yusuf Sivrikaya
45 questions

Question 18

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_LED-7.0 image Question 18 27020 09182024190743000000

Exhibit.

Fortinet NSE7_LED-7.0 image Question 18 27020 09182024190743000000

Refer to the exhibits

In the wireless configuration shown in the exhibits, an AP is deployed in a remote site and has a wireless network (VAP) called Corporate deployed to it

The network is a tunneled network however clients connecting to a wireless network require access to a local printer Clients are trying to print to a printer on the remote site but are unable to do so

Which configuration change is required to allow clients connected to the Corporate SSID to print locally?

Configure split-tunneling in the vap configuration
Configure split-tunneling in the vap configuration
Configure split-tunneling in the wtp-profile configuration
Configure split-tunneling in the wtp-profile configuration
Disable the Block Intra-SSID Traffic (intra-vap-privacy) setting on the SSID (VAP) profile
Disable the Block Intra-SSID Traffic (intra-vap-privacy) setting on the SSID (VAP) profile
Configure the printer as a wireless client on the Corporate wireless network
Configure the printer as a wireless client on the Corporate wireless network
Suggested answer: A
Explanation:

According to the Fortinet documentation1, ''Split tunneling allows you to specify which traffic is tunneled to the FortiGate and which traffic is sent directly to the Internet. This can improve performance and reduce bandwidth usage.'' Therefore, by configuring split-tunneling in the vap configuration, you can allow the clients connected to the Corporate SSID to access both the corporate network and the local printer. Option B is incorrect because split-tunneling is configured at the vap level, not the wtp-profile level. Option C is incorrect because blocking intra-SSID traffic prevents wireless clients on the same SSID from communicating with each other, which is not related to accessing a local printer. Option D is unnecessary and impractical because the printer does not need to be a wireless client on the Corporate wireless network to be accessible by the clients.

asked 18/09/2024
Ron Yan Paglinawan
40 questions

Question 19

Report Export Collapse

Which two statements about FortiSwitch manager are true1? (Choose two)

Per-device management is the default management mode on FortiManager
Per-device management is the default management mode on FortiManager
FortiManager obtains the FortiSwitch status information by querying the FortiGate REST API every three minutes
FortiManager obtains the FortiSwitch status information by querying the FortiGate REST API every three minutes
If the administrator makes any changes on FortiSwitch manager they must also install those changes on FortiGate so that those changes are applied on the managed switches
If the administrator makes any changes on FortiSwitch manager they must also install those changes on FortiGate so that those changes are applied on the managed switches
Any switch discovered or authorized on FortiGate must be added manually on FortiSwitch manager
Any switch discovered or authorized on FortiGate must be added manually on FortiSwitch manager
Suggested answer: B, C
Explanation:

According to the FortiManager Administration Guide1, ''FortiManager obtains the FortiSwitch status information by querying the FortiGate REST API every three minutes.'' Therefore, option B is true because it describes how FortiManager gets the information about the managed switches.According to the same guide2, ''If you make any changes in this module, you must install them on your managed device so that they are applied on your managed switches.'' Therefore, option C is true because it describes what the administrator must do after making any changes on FortiSwitch manager. Option A is false because central management is the default management mode on FortiManager, not per-device management. Option D is false because any switch discovered or authorized on FortiGate will be automatically added on FortiSwitch manager, not manually.

1: https://docs.fortinet.com/document/fortimanager/7.0.0/administration-guide/734537/fortiswitch-manager2: https://docs.fortinet.com/document/fortimanager/7.0.0/administration-guide/734537/fortiswitch-manager#fortiswitch-manager

asked 18/09/2024
Jimmy Wasson
42 questions

Question 20

Report Export Collapse

A wireless network in a school provides guest access using a captive portal to allow unregistered users to self-register and access the network The administrator is requested to update the existing configuration to provide captive portal authentication through a secure connection (HTTPS)

Which two changes must the administrator make to enforce HTTPS authentication'? (Choose two >

Create a new SSID with the HTTPS captive portal URL
Create a new SSID with the HTTPS captive portal URL
Enable HTTP redirect in the user authentication settings
Enable HTTP redirect in the user authentication settings
Disable HTTP administrative access on the guest SSID to enforce HTTPS connection
Disable HTTP administrative access on the guest SSID to enforce HTTPS connection
Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator
Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator
Suggested answer: B, D
Explanation:

According to the FortiGate Administration Guide, ''To enable HTTPS authentication, you must enable HTTP redirect in the user authentication settings. This redirects HTTP requests to HTTPS. You must also update the captive portal URL to use HTTPS on both FortiGate and FortiAuthenticator.'' Therefore, options B and D are true because they describe the changes that the administrator must make to enforce HTTPS authentication for the captive portal. Option A is false because creating a new SSID with the HTTPS captive portal URL is not required, as the existing SSID can be updated with the new URL. Option C is false because disabling HTTP administrative access on the guest SSID will not enforce HTTPS connection, but rather block HTTP connection.

asked 18/09/2024
Danilo Ferrareis
41 questions
Total 37 questions
Go to page: of 4
Search

Related questions