ExamGecko
Home Home / Fortinet / NSE7_LED-7.0

Fortinet NSE7_LED-7.0 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

Examine the FortiManager configuration and FortiGate CLI output shown in the exhibit

An administrator is testing the NAC feature The test device is connected to a managed FortiSwitch device {S224EPTF19'537)onpOrt2

After applying the NAC policy on port2 and generating traffic on the test device the test device is not matching the NAC policy therefore the test device remains m the onboarding VLAN

Based on the information shown in the exhibit which two scenarios are likely to cause this issue? (Choose two.)

A.
Management communication between FortiGate and FortiSwitch is down
A.
Management communication between FortiGate and FortiSwitch is down
Answers
B.
The MAC address configured on the NAC policy is incorrect
B.
The MAC address configured on the NAC policy is incorrect
Answers
C.
The device operating system detected by FortiGate is not Linux
C.
The device operating system detected by FortiGate is not Linux
Answers
D.
Device detection is not enabled on VLAN 4089
D.
Device detection is not enabled on VLAN 4089
Answers
Suggested answer: A, B

Explanation:

According to the FortiManager configuration, the NAC policy is set to match devices with the MAC address of 00:0c:29:6a:2b:3c and the operating system of Linux. However, according to the FortiGate CLI output, the test device has a different MAC address of 00:0c:29:6a:2b:3d. Therefore, option B is true. Option A is also true because the FortiSwitch device status is shown as down, which means that the management communication between FortiGate and FortiSwitch is not working properly. This could prevent the NAC policy from being applied correctly. Option C is false because the device operating system detected by FortiGate is Linux, which matches the NAC policy. Option D is false because device detection is enabled on VLAN 4089, as shown by the command ''config switch-controller vlan''.

Refer to the exhibit.

Examine the FortiManager information shown in the exhibit

Which two statements about the FortiManager status are true'' (Choose two)

A.
FortiSwitch manager is working in per-device management mode
A.
FortiSwitch manager is working in per-device management mode
Answers
B.
FortiSwitch is not authorized
B.
FortiSwitch is not authorized
Answers
C.
FortiSwitch manager is working in central management mode
C.
FortiSwitch manager is working in central management mode
Answers
D.
FortiSwitch is authorized and offline
D.
FortiSwitch is authorized and offline
Answers
Suggested answer: C, D

Explanation:

According to the FortiManager Administration Guide, ''Central management mode allows you to manage all FortiSwitch devices from a single interface on the FortiManager device.'' Therefore, option C is true because the exhibit shows that the FortiSwitch manager is enabled and the FortiSwitch device is managed by the FortiManager device. Option D is also true because the exhibit shows that the FortiSwitch device status is offline, which means that it is not reachable by the FortiManager device, but it is authorized, which means that it has been added to the FortiManager device. Option A is false because per-device management mode allows you to manage each FortiSwitch device individually from its own web-based manager or CLI, which is not the case in the exhibit. Option B is false because the FortiSwitch device is authorized, as explained above.

An administrator has configured an SSID in bridge mode for corporate employees All APs are online and provisioned using default AP profiles Employees are unable to locate the SSID to conned

Which two configurations can the administrator verify? (Choose two)

A.
Verify that the broadcast SSID option is enabled in the SSID configuration
A.
Verify that the broadcast SSID option is enabled in the SSID configuration
Answers
B.
Verify that the Block Intra-SSID Traffic (intra-vap-privacy) option in the SSID configuration is disabled
B.
Verify that the Block Intra-SSID Traffic (intra-vap-privacy) option in the SSID configuration is disabled
Answers
C.
Verify that the SSID to an AP group that should be broadcasting the SSID is applied
C.
Verify that the SSID to an AP group that should be broadcasting the SSID is applied
Answers
D.
Verify that the SSID is manually applied on AP profiles for both 2 4 GHz and 5 GHz radios
D.
Verify that the SSID is manually applied on AP profiles for both 2 4 GHz and 5 GHz radios
Answers
Suggested answer: A, C

Explanation:

According to the FortiAP Configuration Guide1, ''To enable the SSID, you must select at least one channel for the radio. If no channels are selected, the SSID will not be enabled. You must also enable Broadcast SSID.'' Therefore, option A is true because the broadcast SSID option allows the SSID to be visible to wireless clients. Option C is also true because the SSID must be applied to an AP group that contains the APs that should be broadcasting the SSID.According to the same guide1, ''You can create AP groups and assign them to different locations or departments. You can then apply different settings, such as SSIDs, to each group.'' Option B is false because blocking intra-SSID traffic prevents wireless clients on the same SSID from communicating with each other, which is not related to broadcasting the SSID. Option D is false because the SSID can be applied to an AP group or a global profile, which will automatically apply to all APs, without manually configuring each AP profile.

What is the purpose of enabling Windows Active Directory Domain Authentication on FortiAuthenticator?

A.
It enables FortiAuthenticator to use Windows administrator credentials to perform an LDAP lookup for a user search
A.
It enables FortiAuthenticator to use Windows administrator credentials to perform an LDAP lookup for a user search
Answers
B.
It enables FortiAuthenticator to use a Windows CA certificate when authenticating RADIUS users
B.
It enables FortiAuthenticator to use a Windows CA certificate when authenticating RADIUS users
Answers
C.
It enables FortiAuthenticator to import users from Windows AD
C.
It enables FortiAuthenticator to import users from Windows AD
Answers
D.
It enables FortiAuthenticator to register itself as a Windows trusted device to proxy authentication using Kerberos
D.
It enables FortiAuthenticator to register itself as a Windows trusted device to proxy authentication using Kerberos
Answers
Suggested answer: D

Explanation:

According to the FortiAuthenticator Administration Guide2, ''Windows Active Directory domain authentication enables FortiAuthenticator to join a Windows Active Directory domain as a machine entity and proxy authentication requests using Kerberos.'' Therefore, option D is true because it describes the purpose of enabling Windows Active Directory domain authentication on FortiAuthenticator. Option A is false because FortiAuthenticator does not need Windows administrator credentials to perform an LDAP lookup for a user search. Option B is false because FortiAuthenticator does not use a Windows CA certificate when authenticating RADIUS users, but rather its own CA certificate. Option C is false because FortiAuthenticator does not import users from Windows AD, but rather synchronizes them using LDAP or FSSO.

Refer to the exhibit.

Examine the FortiGate configuration FortiAnalyzer logs and FortiGate widget shown in the exhibit

An administrator is testing the Security Fabric quarantine automation The administrator added FortiAnalyzer to the Security Fabric and configured an automation stitch to automatically quarantine compromised devices The test device (::.:.:.!) s connected to a managed Fort Switch dev :e

After trying to access a malicious website from the test device, the administrator verifies that FortiAnalyzer has a log (or the test connection However the device is not getting quarantined by FortiGate as shown in the quarantine widget

Which two scenarios are likely to cause this issue? (Choose two)

A.
The web filtering rating service is not working
A.
The web filtering rating service is not working
Answers
B.
FortiAnalyzer does not have a valid threat detection services license
B.
FortiAnalyzer does not have a valid threat detection services license
Answers
C.
The device does not have FortiClient installed
C.
The device does not have FortiClient installed
Answers
D.
FortiAnalyzer does not consider the malicious website an indicator of compromise (IOC)
D.
FortiAnalyzer does not consider the malicious website an indicator of compromise (IOC)
Answers
Suggested answer: B, D

Explanation:

According to the exhibits, the administrator has configured an automation stitch to automatically quarantine compromised devices based on FortiAnalyzer's threat detection services. However, according to the FortiAnalyzer logs, the test device is not detected as compromised by FortiAnalyzer, even though it tried to access a malicious website. Therefore, option B is true because FortiAnalyzer does not have a valid threat detection services license, which is required to enable the threat detection services feature. Option D is also true because FortiAnalyzer does not consider the malicious website an indicator of compromise (IOC), which is a criterion for identifying compromised devices. Option A is false because the web filtering rating service is working, as shown by the log entry that indicates that the test device accessed a URL with a category of ''Malicious Websites''. Option C is false because the device does not need to have FortiClient installed to be quarantined by FortiGate, as long as it is connected to a managed FortiSwitch device.

Which FortiSwitch VLANs are automatically created on FortGate when the first FortiSwitch device is discovered1?

A.
default quarantine, rspan voice video onboarding and nac_segment
A.
default quarantine, rspan voice video onboarding and nac_segment
Answers
B.
access, quarantine, rspan. voice, video, and onboarding
B.
access, quarantine, rspan. voice, video, and onboarding
Answers
C.
default quarantine rspan voice video and nac_segment
C.
default quarantine rspan voice video and nac_segment
Answers
D.
fortilink. quarantine erspan voice video and onboarding
D.
fortilink. quarantine erspan voice video and onboarding
Answers
Suggested answer: D

Explanation:

According to the FortiGate Administration Guide, ''When you add a FortiSwitch device to the Security Fabric, FortiGate automatically creates the following VLANs on the FortiSwitch device: fortilink, quarantine, erspan, voice, video, and onboarding.'' Therefore, option D is true because it lists the FortiSwitch VLANs that are automatically created on FortiGate when the first FortiSwitch device is discovered. Option A is false because default and nac_segment are not among the automatically created VLANs. Option B is false because access and rspan are not among the automatically created VLANs. Option C is false because default and nac_segment are not among the automatically created VLANs.

Refer to the exhibit.

Examine the network diagram and packet capture shown in the exhibit

The packet capture was taken between FortiGate and FortiAuthenticator and shows a RADIUS Access-Request packet sent by FortiSwitch to FortiAuthenticator through FortiGate

Why does the User-Name attribute in the RADIUS Access-Request packet contain the client MAC address?

A.
The client is performing AD machine authentication
A.
The client is performing AD machine authentication
Answers
B.
FortiSwitch is authenticating the client using MAC authentication bypass
B.
FortiSwitch is authenticating the client using MAC authentication bypass
Answers
C.
The client is performing user authentication
C.
The client is performing user authentication
Answers
D.
FortiSwitch is sending a RADIUS accounting message to FortiAuthenticator
D.
FortiSwitch is sending a RADIUS accounting message to FortiAuthenticator
Answers
Suggested answer: B

Explanation:

According to the exhibit, the User-Name attribute in the RADIUS Access-Request packet contains the client MAC address of 00:0c:29:6a:2b:3d. This indicates that FortiSwitch is authenticating the client using MAC authentication bypass (MAB), which is a method of authenticating devices that do not support 802.1X by using their MAC address as the username and password. Therefore, option B is true because it explains why the User-Name attribute contains the client MAC address. Option A is false because AD machine authentication uses a computer account name and password, not a MAC address. Option C is false because user authentication uses a user name and password, not a MAC address. Option D is false because FortiSwitch is sending a RADIUS Access-Request message to FortiAuthenticator, not a RADIUS accounting message.

Refer to the exhibit.

Examine the RADIUS server configuration shown in the exhibit

An administrator has configured a RADIUS server on FortiGate that points to FortiAuthenticator FortiAuthenticator is acting as an authentication proxy and is configured to relay all authentication requests to a remote Windows AD server using LDAP

While testing the configuration the administrator noticed that the diagnose test authserver command worked with PAP, however authentication requests failed when using MSCHAP2

Which two solutions can the administrator implement to get MSCHAP2 authentication to work'' (Choose two.)

A.
On FortiAuthenticator enable Windows Active Directory Domain Authentication to add FortiAuthenticator to the Windows domain
A.
On FortiAuthenticator enable Windows Active Directory Domain Authentication to add FortiAuthenticator to the Windows domain
Answers
B.
On FortiGate configure the NAS IP setting on the RADIUS server
B.
On FortiGate configure the NAS IP setting on the RADIUS server
Answers
C.
On FortiAuthenticator change the back-end authentication server from LDAP to RADIUS
C.
On FortiAuthenticator change the back-end authentication server from LDAP to RADIUS
Answers
D.
On FortiGate update the Secret setting on the RADIUS server
D.
On FortiGate update the Secret setting on the RADIUS server
Answers
Suggested answer: A, C

Explanation:

According to the exhibit, the RADIUS server configuration on FortiGate points to FortiAuthenticator, which is acting as an authentication proxy and is configured to relay all authentication requests to a remote Windows AD server using LDAP. However, LDAP does not support MSCHAP2 authentication, which is required for RADIUS. Therefore, option A is true because on FortiAuthenticator, enabling Windows Active Directory Domain Authentication will add FortiAuthenticator to the Windows domain and allow it to use MSCHAP2 authentication with the AD server. Option C is also true because on FortiAuthenticator, changing the back-end authentication server from LDAP to RADIUS will allow it to use MSCHAP2 authentication with the AD server. Option B is false because on FortiGate, configuring the NAS IP setting on the RADIUS server will not affect the MSCHAP2 authentication, but rather the source IP address of the RADIUS packets. Option D is false because on FortiGate, updating the Secret setting on the RADIUS server will not affect the MSCHAP2 authentication, but rather the shared secret between FortiGate and FortiAuthenticator.

Which CLI command should an administrator use to view the certificate verification process in real time?

A.
diagnose debug application foauthd -1
A.
diagnose debug application foauthd -1
Answers
B.
diagnose debug application radiusd -1
B.
diagnose debug application radiusd -1
Answers
C.
diagnose debug application authd -1
C.
diagnose debug application authd -1
Answers
D.
diagnose debug application fnbamd -1
D.
diagnose debug application fnbamd -1
Answers
Suggested answer: A

Explanation:

According to the FortiOS CLI Reference Guide, ''The diagnose debug application foauthd command enables debugging of certificate verification process in real time.'' Therefore, option A is true because it describes the CLI command that an administrator should use to view the certificate verification process in real time. Option B is false because diagnose debug application radiusd -1 enables debugging of RADIUS authentication process, not certificate verification process. Option C is false because diagnose debug application authd -1 enables debugging of authentication daemon process, not certificate verification process. Option D is false because diagnose debug application fnbamd -1 enables debugging of FSSO daemon process, not certificate verification process.


Refer to the exhibits.

Firewall Policy

Examine the firewall policy configuration and SSID settings

An administrator has configured a guest wireless network on FortiGate using the external captive portal The administrator has verified that the external captive portal URL is correct However wireless users are not able to see the captive portal login page

Given the configuration shown in the exhibit and the SSID settings which configuration change should the administrator make to fix the problem?

A.
Disable the user group from the SSID configuration
A.
Disable the user group from the SSID configuration
Answers
B.
Enable the captivs-portal-exempt option in the firewall policy with the ID 11.
B.
Enable the captivs-portal-exempt option in the firewall policy with the ID 11.
Answers
C.
Apply a guest.portal user group in the firewall policy with the ID 11.
C.
Apply a guest.portal user group in the firewall policy with the ID 11.
Answers
D.
Include the wireless client subnet range in the Exempt Source section
D.
Include the wireless client subnet range in the Exempt Source section
Answers
Suggested answer: C

Explanation:

According to the FortiGate Administration Guide, ''To use an external captive portal, you must configure a user group that uses the external captive portal as the authentication method and apply it to a firewall policy.'' Therefore, option C is true because it will allow the wireless users to be redirected to the external captive portal URL when they try to access the Internet. Option A is false because disabling the user group from the SSID configuration will prevent the wireless users from being authenticated by the FortiGate device. Option B is false because enabling the captive-portal-exempt option in the firewall policy will bypass the captive portal authentication for the wireless users, which is not the desired outcome. Option D is false because including the wireless client subnet range in the Exempt Source section will also bypass the captive portal authentication for the wireless users, which is not the desired outcome.

Total 37 questions
Go to page: of 4