ExamGecko
Home Home / Fortinet / NSE7_PBC-7.2

Fortinet NSE7_PBC-7.2 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Which statement about immutable infrastructure in automation is true?

A.
It is the practice of deploying a new server for every configuration change
A.
It is the practice of deploying a new server for every configuration change
Answers
B.
It is the practice of modifying the existing server configuration after it is deployed
B.
It is the practice of modifying the existing server configuration after it is deployed
Answers
C.
It is the practice of deploying two parallel servers for high availability.
C.
It is the practice of deploying two parallel servers for high availability.
Answers
D.
It is the practice of applying hotfixes and OS patches after deployment
D.
It is the practice of applying hotfixes and OS patches after deployment
Answers
Suggested answer: A

Explanation:

The statement that best describes the concept of immutable infrastructure in the context of automation is:

A) It is the practice of deploying a new server for every configuration change.

Immutable Infrastructure Concept: This approach to infrastructure management involves replacing servers or components entirely rather than making changes to existing configurations once they are deployed. When a change is needed, a new server instance is provisioned with the desired configuration and the old one is decommissioned after the new one is successfully deployed and tested.

Benefits: Immutable infrastructure minimizes the risks associated with in-place updates, such as inconsistencies or failures due to configuration drift. It enhances reliability and predictability by ensuring that the deployed environment matches exactly what was tested in staging. This practice is particularly aligned with modern deployment strategies like blue/green or canary deployments.

Refer to the exhibit.

What would be the impact of confirming to delete all the resources in Terraform?

A.
It destroys all the resources in the . tfvars file
A.
It destroys all the resources in the . tfvars file
Answers
B.
It destroys all the resources tied to the AWS Identity and Access Management (1AM) user.
B.
It destroys all the resources tied to the AWS Identity and Access Management (1AM) user.
Answers
C.
It destroys all the resources in the resource group
C.
It destroys all the resources in the resource group
Answers
D.
It destroys all the resources in the state file.
D.
It destroys all the resources in the state file.
Answers
Suggested answer: D

Explanation:

Confirming to delete all the resources in Terraform will have the following impact:

D) It destroys all the resources in the state file.

Terraform State File Role: The terraform.tfstate file contains a real-time mapping of the resources that Terraform manages, including their current configuration and relationships. This file tracks the actual state of resources provisioned by Terraform.

Impact of Destruction: When Terraform prompts for confirmation to destroy resources, and 'yes' is entered, Terraform reads the state file and systematically removes all the resources that are managed as part of that state. This is not limited to a specific .tfvars file, IAM user, or resource group---it is a global action that affects all resources tracked by the state file associated with the current Terraform workspace and configuration.

Refer to the exhibit.

An administrator has deployed a FortiGate VM in Amazon Web Services (AWS) and is trying to access it using its public IP address from their local computer However, the connection is not successful and at the same time FortiGate is not receiving any HTTPS or SSH traffic to its external interface

What should the administrator check for possible issue?

A.
Run a debug flow to check any network ACLs
A.
Run a debug flow to check any network ACLs
Answers
B.
Check the FortiGate firewall policies
B.
Check the FortiGate firewall policies
Answers
C.
Check the FortiGate instance ID
C.
Check the FortiGate instance ID
Answers
D.
Check the inbound network security group rules
D.
Check the inbound network security group rules
Answers
Suggested answer: D

Explanation:

Considering the situation where the administrator is unable to access the FortiGate VM using its public IP address and no traffic is reaching the FortiGate's external interface, the administrator should check:

D) Check the inbound network security group rules.

Network Security Group Rules: AWS uses security groups as a virtual firewall that controls inbound and outbound traffic to AWS resources such as EC2 instances. If the FortiGate VM's public interface is not receiving HTTPS or SSH traffic, it's likely because the inbound security group rules associated with that interface are not allowing access on the necessary ports (HTTPS - port 443, SSH - port 22).

Troubleshooting: The administrator should verify that the security group rules for the FortiGate VM's network interface allow inbound traffic on the specific ports used for management access. If these rules are absent or misconfigured, the intended traffic will be blocked, resulting in the inability to connect.

Your goal is to deploy resources in multiple places and regions in the public cloud using Terraform.

What is the most efficient way to deploy resources without changing much of the Terraform code?

A.
Use multiple terraform.tfvars files With a variables.tf file.
A.
Use multiple terraform.tfvars files With a variables.tf file.
Answers
B.
Use the provider. tf file to add all the new values
B.
Use the provider. tf file to add all the new values
Answers
C.
Install and configure two Terraform staging servers to deploy resources.
C.
Install and configure two Terraform staging servers to deploy resources.
Answers
D.
Use the variable, tf file and edit its values to match multiple resources
D.
Use the variable, tf file and edit its values to match multiple resources
Answers
Suggested answer: A

Explanation:

When deploying resources in multiple places and regions in the public cloud using Terraform, the most efficient way is:

A) Use multiple terraform.tfvars files with a variables.tf file.

Terraform.tfvars File: This file is used to assign values to variables defined in your Terraform configuration. By having multiple .tfvars files, you can define different sets of values for different deployments, such as for different regions or environments, without changing the main configuration.

Variables.tf File: This file contains the definition of variables that will be used within your Terraform configuration. It works in conjunction with terraform.tfvars files, allowing you to parameterize your configuration so that you can deploy the same template in multiple environments with different variables.

You are using Red Hat Ansible to change the FortiGate VM configuration.

What is the minimum number of files you must create and which file must you use to configure the target FortiGate IP address?

A.
Create two files and use the .yami file.
A.
Create two files and use the .yami file.
Answers
B.
Create two files and use the hosts file
B.
Create two files and use the hosts file
Answers
C.
Create one file and use the variable file
C.
Create one file and use the variable file
Answers
D.
Create three files and use the .yarai file.
D.
Create three files and use the .yarai file.
Answers
Suggested answer: B

Explanation:

In using Red Hat Ansible for changing the configuration of a FortiGate VM, the minimum number of files you must create and the file to configure the target FortiGate IP address are:

B) Create two files and use the hosts file.

Ansible Playbook File (YAML): The playbook file, which is typically a YAML file, contains the desired states and tasks that Ansible will execute on the target hosts.

Inventory File (Hosts): The inventory file, commonly named hosts, is where you define the target machines, including the FortiGate VM's IP address. Ansible uses this file to determine on which machines to run the playbook.

By creating these two files, you will have the necessary components to configure Ansible for the deployment. The playbook contains the automation tasks, and the hosts file lists the machines where those tasks will be executed.

Refer to the exhibit.

You deployed an HA active-active load balance sandwich with two FortiGate VMs in Microsoft Azure.

After the deployment, you prefer to use FGSP to synchronize sessions, and allow asymmetric return traffic In the environment, FortiGate port 1 and port 2 are facing external and internal load balancers respectively

What IP address must you use in the peerip configuration?

A.
The opposite FortiGate port 1 IP address.
A.
The opposite FortiGate port 1 IP address.
Answers
B.
The public load balancer port 2 IP address
B.
The public load balancer port 2 IP address
Answers
C.
The internal load balancer port 1 IP address.
C.
The internal load balancer port 1 IP address.
Answers
D.
The opposite FortiGate port 2 IP address.
D.
The opposite FortiGate port 2 IP address.
Answers
Suggested answer: D

Explanation:

In an HA active-active load balance configuration with FortiGate VMs, especially in Microsoft Azure where FGSP (FortiGate Session Life Support Protocol) is used for session synchronization, the correct configuration for the peerip is:

D) The opposite FortiGate port 2 IP address.

HA Synchronization Requirements: FGSP requires direct communication between the FortiGates to synchronize the session table. This synchronization typically occurs over a dedicated HA link that connects the HA pair.

Asymmetric Traffic Considerations: FGSP allows asymmetric traffic to rejoin the correct session by synchronizing session information, including NAT and TCP sequence tracking between the FortiGate units in a cluster.

Configuration Specifics: For port 2, which is facing the internal load balancer, the peerip should be set to the corresponding port 2 IP address of the opposite FortiGate. This allows the internal interfaces to communicate directly with each other for session synchronization purposes, which is crucial in an active-active deployment to ensure sessions persist during failover scenarios.

Refer to the exhibit.

What value or values must the administrator use in the SSH Key section to deploy a FortiGate VM using Terraform in Amazon Web Services (AWS)?

A.
Use the Name and ID values of the key pair
A.
Use the Name and ID values of the key pair
Answers
B.
Use the Name of the key pair
B.
Use the Name of the key pair
Answers
C.
Use the ID value of the key pair.
C.
Use the ID value of the key pair.
Answers
D.
Use the Fingerprint value of the key pair
D.
Use the Fingerprint value of the key pair
Answers
Suggested answer: B

Explanation:

For deploying a FortiGate VM using Terraform in AWS, the administrator must use:

B) Use the Name of the key pair.

Terraform and AWS SSH Keys: When deploying instances in AWS using Terraform, it is required to specify the name of the SSH key pair to enable key-based authentication to the instance post-deployment.

Configuration Syntax: The variable keyname within the Terraform configuration should match the exact name of the SSH key pair as it is stored in AWS. This ensures that Terraform can reference the correct key during the deployment process to set up SSH access to the FortiGate VM.

Terraform Variables: The variable 'keyname' block in the Terraform configuration will look for the key pair name as it should be declared in the terraform.tfvars file or passed as a variable during execution. This does not require the key pair's ID or fingerprint, just its name.

An administrator decides to use the Use managed identity option on the FortiGate SDN connector with Microsoft Azure However, the SDN connector is failing on the connection What must the administrator do to correct this issue?

A.
Make sure to add the Tenant ID on FortiGate side of the configuration
A.
Make sure to add the Tenant ID on FortiGate side of the configuration
Answers
B.
Make sure to set the type to system managed identity on FortiGate SDN connector settings
B.
Make sure to set the type to system managed identity on FortiGate SDN connector settings
Answers
C.
Make sure to enable the system assigned managed identity on Azure
C.
Make sure to enable the system assigned managed identity on Azure
Answers
D.
Make sure to add the Client secret on FortiGate side of the configuration
D.
Make sure to add the Client secret on FortiGate side of the configuration
Answers
Suggested answer: C

Explanation:

When an administrator decides to use the 'Use managed identity' option for the FortiGate SDN connector with Microsoft Azure and faces a connection failure, the correct action to take is:

C) Make sure to enable the system assigned managed identity on Azure.

Managed Identity Configuration: The system assigned managed identity is a feature in Azure that provides an identity for the Azure service instance (in this case, the FortiGate SDN connector) within Azure Active Directory and eliminates the need for credentials to be stored in the configuration.

Troubleshooting Connection Issues: If the SDN connector is failing to connect, it could be because the system assigned managed identity has not been enabled or configured properly in Azure for the FortiGate service.

You are configuring the failover settings on a FortiGate active-passive SDN connector solution in Microsoft Azure. Which two mandatory settings are required after the initial deployment? (Choose two)

A.
Subscription-id
A.
Subscription-id
Answers
B.
FortiGate license file
B.
FortiGate license file
Answers
C.
Active FortiGate serial number
C.
Active FortiGate serial number
Answers
D.
Resource group name
D.
Resource group name
Answers
Suggested answer: A, D

Explanation:

For configuring the failover settings on a FortiGate active-passive SDN connector solution in Microsoft Azure, the two mandatory settings required after the initial deployment are:

A) Subscription-id

D) Resource group name

Subscription ID: This is a unique identifier for your Azure subscription under which all resources are created and billed. FortiGate needs this to interact with the Azure resources associated with that subscription.

Resource Group Name: A resource group in Azure is a container that holds related resources for an Azure solution. The SDN connector requires the resource group name to correctly identify and manage the resources it should control, especially in a failover scenario.

An administrator would like to keep track of sensitive data files located in the Amazon Web Services (AWS) S3 bucket and protect it from malware. Which Fortinet product or feature should the administrator use?

A.
FortiCNP application control policies
A.
FortiCNP application control policies
Answers
B.
FortiCNP web sensitive polices
B.
FortiCNP web sensitive polices
Answers
C.
FortiCNP DLP policies
C.
FortiCNP DLP policies
Answers
D.
FortiCNP compliance scanning policies
D.
FortiCNP compliance scanning policies
Answers
Suggested answer: C

Explanation:

To keep track of sensitive data files located in AWS S3 buckets and protect them from malware, the administrator should use:

C) FortiCNP DLP policies.

Data Loss Prevention (DLP): DLP policies are designed to detect and prevent unauthorized access or sharing of sensitive data. In the context of AWS S3, DLP policies can be used to scan for sensitive information stored in S3 objects and enforce protective measures to prevent data exfiltration or compromise.

FortiCNP Integration: FortiCNP is Fortinet's cloud-native protection platform that offers security and compliance solutions across cloud environments. By applying DLP policies within FortiCNP, the administrator can ensure sensitive data within S3 is monitored and protected consistently.


Total 59 questions
Go to page: of 6