ExamGecko
Home Home / Fortinet / NSE7_LED-7.0

Fortinet NSE7_LED-7.0 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

Wireless guest users are unable to authenticate because they are getting a certificate error while loading the captive portal login page. This URL string is the HTTPS POST URL guest wireless users see when attempting to access the network using the web browser

Which two settings are the likely causes of the issue? (Choose two.)

A.
The external server FQDN is incorrect
A.
The external server FQDN is incorrect
Answers
B.
The wireless user's browser is missing a CA certificate
B.
The wireless user's browser is missing a CA certificate
Answers
C.
The FortiGate authentication interface address is using HTTPS
C.
The FortiGate authentication interface address is using HTTPS
Answers
D.
The user address is not in DDNS form
D.
The user address is not in DDNS form
Answers
Suggested answer: A, B

Explanation:

According to the exhibit, the wireless guest users are getting a certificate error while loading the captive portal login page. This means that the browser cannot verify the identity of the server that is hosting the login page. Therefore, option A is true because the external server FQDN is incorrect, which means that it does not match the common name or subject alternative name of the server certificate. Option B is also true because the wireless user's browser is missing a CA certificate, which means that it does not have the root or intermediate certificate that issued the server certificate. Option C is false because the FortiGate authentication interface address is using HTTPS, which is a secure protocol that encrypts the communication between the browser and the server. Option D is false because the user address is not in DDNS form, which is not related to the certificate error.

When you configure a FortiAP wireless interface for auto TX power control which statement describes how it configures its transmission power'?

A.
Every 30 seconds the AP will measure the signal strength of the AP using the client The AP will adjust its signal strength up or down until the AP signal is detected at -70 dBm
A.
Every 30 seconds the AP will measure the signal strength of the AP using the client The AP will adjust its signal strength up or down until the AP signal is detected at -70 dBm
Answers
B.
Every 30 seconds FortiGate measures the signal strength of adjacent AP interfaces It will adjust its own AP power to match the adjacent AP signal strength
B.
Every 30 seconds FortiGate measures the signal strength of adjacent AP interfaces It will adjust its own AP power to match the adjacent AP signal strength
Answers
C.
Every 30 seconds FortiGate measures the signal strength of adjacent FortiAP interfaces It will adjust the adjacent AP power to be detectable at -70 dBm
C.
Every 30 seconds FortiGate measures the signal strength of adjacent FortiAP interfaces It will adjust the adjacent AP power to be detectable at -70 dBm
Answers
D.
Every 30 seconds FortiGate measures the signal strength of the weakest associated client The AP will then configure its radio power to match the detected signal strength of the client
D.
Every 30 seconds FortiGate measures the signal strength of the weakest associated client The AP will then configure its radio power to match the detected signal strength of the client
Answers
Suggested answer: A

Explanation:

According to the FortiAP Configuration Guide1, ''Auto TX power control allows the AP to adjust its transmit power based on the signal strength of the client. The AP will measure the signal strength of the client every 30 seconds and adjust its transmit power up or down until the client signal is detected at -70 dBm.'' Therefore, option A is true because it describes how the FortiAP wireless interface configures its transmission power when auto TX power control is enabled. Option B is false because FortiGate does not measure the signal strength of adjacent AP interfaces, but rather the FortiAP does. Option C is false because FortiGate does not adjust the adjacent AP power, but rather the FortiAP adjusts its own power. Option D is false because FortiGate does not measure the signal strength of the weakest associated client, but rather the FortiAP does.

Refer to the exhibit

Examine the sections of the configuration shown in the output

What action will FortiGate take when verifying the student certificate through OCSP?

A.
Reject the student certificate if the OCSP server replies that the student certificate status is unknown
A.
Reject the student certificate if the OCSP server replies that the student certificate status is unknown
Answers
B.
Not verify the OCSP server certificate
B.
Not verify the OCSP server certificate
Answers
C.
Use the OCSP URL included in the student certificate to verify the student certificate
C.
Use the OCSP URL included in the student certificate to verify the student certificate
Answers
D.
Consider the student certificate status as valid if the OCSP server is unreachable
D.
Consider the student certificate status as valid if the OCSP server is unreachable
Answers
Suggested answer: C

Explanation:

According to the exhibit, the FortiGate configuration has ocsp-status enabled and ocsp-option set to certificate. This means that FortiGate will use OCSP to verify the revocation status of certificates presented by clients.According to the FortiGate Administration Guide2, ''If you select certificate, FortiGate uses an OCSP URL included in a certificate to verify that certificate.'' Therefore, option C is true because it describes what action FortiGate will take when verifying the student certificate through OCSP. Option A is false because FortiGate will not reject the student certificate if the OCSP server replies that the student certificate status is unknown, but rather accept it as valid. Option B is false because FortiGate will verify the OCSP server certificate by default, unless strict-ocsp-check is disabled. Option D is false because FortiGate will not consider the student certificate status as valid if the OCSP server is unreachable, but rather reject it as invalid.

Refer to the exhibit.

Examine the IPsec VPN phase 1 configuration shown in the exhibit

An administrator wants to use certificate-based authentication for an IPsec VPN user

Which three configuration changes must you make on FortiGate to perform certificate-based authentication for the IPsec VPN user? (Choose three)

A.
Create a PKI user for the IPsec VPN user, and then configure the IPsec VPN tunnel to accept the PKI user as peer certificate
A.
Create a PKI user for the IPsec VPN user, and then configure the IPsec VPN tunnel to accept the PKI user as peer certificate
Answers
B.
In the Authentication section of the IPsec VPN tunnel in the Method drop-down list select Signature and then select the certificate that FortiGate will use for IPsec VPN
B.
In the Authentication section of the IPsec VPN tunnel in the Method drop-down list select Signature and then select the certificate that FortiGate will use for IPsec VPN
Answers
C.
In the IKE section of the IPsec VPN tunnel in the Mode field select Main (ID protection)
C.
In the IKE section of the IPsec VPN tunnel in the Mode field select Main (ID protection)
Answers
D.
Import the CA that signed the user certificate
D.
Import the CA that signed the user certificate
Answers
E.
Enable XAUTH on the IPsec VPN tunnel
E.
Enable XAUTH on the IPsec VPN tunnel
Answers
Suggested answer: B, D, E

Explanation:

According to the FortiGate Administration Guide, ''To use certificate-based authentication, you must configure the following settings on both peers: Select Signature as the authentication method and select a certificate to use for authentication. Import the CA certificate that issued the peer's certificate. Enable XAUTH on the phase 1 configuration.'' Therefore, options B, D, and E are true because they describe the configuration changes that must be made on FortiGate to perform certificate-based authentication for the IPsec VPN user. Option A is false because creating a PKI user for the IPsec VPN user is not required, as the user certificate can be verified by the CA certificate. Option C is false because changing the IKE mode to Main (ID protection) is not required, as the IKE mode can be either Main or Aggressive for certificate-based authentication.

You are configuring a FortiGate wireless network to support automated wireless client quarantine using IOC Which two configurations must you put in place for a wireless client to be quarantined successfully? (Choose two)

A.
Configure the wireless network to be in tunnel mode
A.
Configure the wireless network to be in tunnel mode
Answers
B.
Configure the FortiGate device in the Security Fabric with a FortiAnalyzer device
B.
Configure the FortiGate device in the Security Fabric with a FortiAnalyzer device
Answers
C.
Configure a firewall policy to allow communication
C.
Configure a firewall policy to allow communication
Answers
D.
Configure the wireless network to be in bridge mode
D.
Configure the wireless network to be in bridge mode
Answers
Suggested answer: A, B

Explanation:

According to the FortiGate Administration Guide, ''To enable automated wireless client quarantine using IOC, you must configure the following settings: Configure your wireless network to be in tunnel mode. This allows FortiGate to inspect all wireless traffic and apply security policies. Configure your FortiGate device in the Security Fabric with a FortiAnalyzer device. This allows FortiAnalyzer to detect indicators of compromise (IOC) from wireless traffic and send quarantine commands to FortiGate.'' Therefore, options A and B are true because they describe the configurations that must be put in place for a wireless client to be quarantined successfully using IOC. Option C is false because configuring a firewall policy to allow communication is not required, as the default firewall policy for tunnel mode wireless networks is to allow all traffic. Option D is false because configuring the wireless network to be in bridge mode is not supported, as FortiGate cannot inspect or quarantine wireless traffic in bridge mode.

Refer to the exhibits

The exhibits show the wireless network (VAP) SSID profiles defined on FortiManager and an AP profile assigned to a group of APs that are supported by FortiGate

None of the APs are broadcasting the SSlDs defined by the AP profile

Which changes do you need to make to enable the SSIDs to broadcast?

A.
In the SSIDs section enable Tunnel
A.
In the SSIDs section enable Tunnel
Answers
B.
Enable one channel in the Channels section
B.
Enable one channel in the Channels section
Answers
C.
Enable multiple channels in the Channels section and enable Radio Resource Provision
C.
Enable multiple channels in the Channels section and enable Radio Resource Provision
Answers
D.
In the SSIDs section enable Manual and assign the networks manually
D.
In the SSIDs section enable Manual and assign the networks manually
Answers
Suggested answer: B

Explanation:

According to the FortiManager Administration Guide1, ''To enable the SSID, you must select at least one channel for the radio. If no channels are selected, the SSID will not be enabled.'' Therefore, enabling one channel in the Channels section will allow the SSIDs to broadcast.

Which two statements about the guest portal on FortiAuthenticator are true? (Choose two.)

A.
Each remote user on FortiAuthenticator can sponsor up to 10 guest accounts
A.
Each remote user on FortiAuthenticator can sponsor up to 10 guest accounts
Answers
B.
Administrators must approve all guest accounts before they can be used
B.
Administrators must approve all guest accounts before they can be used
Answers
C.
The guest portal provides pre and post-log in services
C.
The guest portal provides pre and post-log in services
Answers
D.
Administrators can use one or more incoming parameters to configure a mapping rule for the guest portal
D.
Administrators can use one or more incoming parameters to configure a mapping rule for the guest portal
Answers
Suggested answer: C, D

Explanation:

According to the FortiAuthenticator Administration Guide2, ''The guest portal provides pre and post-log in services for users (such as password reset and token registration abilities), and rules and replacement messages can be configured.'' Therefore, option C is true. The same guide also states that ''Administrators can use one or more incoming parameters to configure a mapping rule for the guest portal.'' Therefore, option D is true. Option A is false because remote users can sponsor any number of guest accounts, as long as they do not exceed the maximum number of guest accounts allowed by the license. Option B is false because administrators can choose to approve or reject guest accounts, or enable auto-approval.

Refer to the exhibit.

Exhibit.

Refer to the exhibits

In the wireless configuration shown in the exhibits, an AP is deployed in a remote site and has a wireless network (VAP) called Corporate deployed to it

The network is a tunneled network however clients connecting to a wireless network require access to a local printer Clients are trying to print to a printer on the remote site but are unable to do so

Which configuration change is required to allow clients connected to the Corporate SSID to print locally?

A.
Configure split-tunneling in the vap configuration
A.
Configure split-tunneling in the vap configuration
Answers
B.
Configure split-tunneling in the wtp-profile configuration
B.
Configure split-tunneling in the wtp-profile configuration
Answers
C.
Disable the Block Intra-SSID Traffic (intra-vap-privacy) setting on the SSID (VAP) profile
C.
Disable the Block Intra-SSID Traffic (intra-vap-privacy) setting on the SSID (VAP) profile
Answers
D.
Configure the printer as a wireless client on the Corporate wireless network
D.
Configure the printer as a wireless client on the Corporate wireless network
Answers
Suggested answer: A

Explanation:

According to the Fortinet documentation1, ''Split tunneling allows you to specify which traffic is tunneled to the FortiGate and which traffic is sent directly to the Internet. This can improve performance and reduce bandwidth usage.'' Therefore, by configuring split-tunneling in the vap configuration, you can allow the clients connected to the Corporate SSID to access both the corporate network and the local printer. Option B is incorrect because split-tunneling is configured at the vap level, not the wtp-profile level. Option C is incorrect because blocking intra-SSID traffic prevents wireless clients on the same SSID from communicating with each other, which is not related to accessing a local printer. Option D is unnecessary and impractical because the printer does not need to be a wireless client on the Corporate wireless network to be accessible by the clients.

Which two statements about FortiSwitch manager are true1? (Choose two)

A.
Per-device management is the default management mode on FortiManager
A.
Per-device management is the default management mode on FortiManager
Answers
B.
FortiManager obtains the FortiSwitch status information by querying the FortiGate REST API every three minutes
B.
FortiManager obtains the FortiSwitch status information by querying the FortiGate REST API every three minutes
Answers
C.
If the administrator makes any changes on FortiSwitch manager they must also install those changes on FortiGate so that those changes are applied on the managed switches
C.
If the administrator makes any changes on FortiSwitch manager they must also install those changes on FortiGate so that those changes are applied on the managed switches
Answers
D.
Any switch discovered or authorized on FortiGate must be added manually on FortiSwitch manager
D.
Any switch discovered or authorized on FortiGate must be added manually on FortiSwitch manager
Answers
Suggested answer: B, C

Explanation:

According to the FortiManager Administration Guide1, ''FortiManager obtains the FortiSwitch status information by querying the FortiGate REST API every three minutes.'' Therefore, option B is true because it describes how FortiManager gets the information about the managed switches.According to the same guide2, ''If you make any changes in this module, you must install them on your managed device so that they are applied on your managed switches.'' Therefore, option C is true because it describes what the administrator must do after making any changes on FortiSwitch manager. Option A is false because central management is the default management mode on FortiManager, not per-device management. Option D is false because any switch discovered or authorized on FortiGate will be automatically added on FortiSwitch manager, not manually.

1: https://docs.fortinet.com/document/fortimanager/7.0.0/administration-guide/734537/fortiswitch-manager2: https://docs.fortinet.com/document/fortimanager/7.0.0/administration-guide/734537/fortiswitch-manager#fortiswitch-manager

A wireless network in a school provides guest access using a captive portal to allow unregistered users to self-register and access the network The administrator is requested to update the existing configuration to provide captive portal authentication through a secure connection (HTTPS)

Which two changes must the administrator make to enforce HTTPS authentication'? (Choose two >

A.
Create a new SSID with the HTTPS captive portal URL
A.
Create a new SSID with the HTTPS captive portal URL
Answers
B.
Enable HTTP redirect in the user authentication settings
B.
Enable HTTP redirect in the user authentication settings
Answers
C.
Disable HTTP administrative access on the guest SSID to enforce HTTPS connection
C.
Disable HTTP administrative access on the guest SSID to enforce HTTPS connection
Answers
D.
Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator
D.
Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator
Answers
Suggested answer: B, D

Explanation:

According to the FortiGate Administration Guide, ''To enable HTTPS authentication, you must enable HTTP redirect in the user authentication settings. This redirects HTTP requests to HTTPS. You must also update the captive portal URL to use HTTPS on both FortiGate and FortiAuthenticator.'' Therefore, options B and D are true because they describe the changes that the administrator must make to enforce HTTPS authentication for the captive portal. Option A is false because creating a new SSID with the HTTPS captive portal URL is not required, as the existing SSID can be updated with the new URL. Option C is false because disabling HTTP administrative access on the guest SSID will not enforce HTTPS connection, but rather block HTTP connection.

Total 37 questions
Go to page: of 4