Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Fortinet FCP_FGT_AD-7.4 FCP - FortiGate 7.4 Administrator Exam Practice Test

Page: 1 / 9
Total 88 questions

FCP - FortiGate 7.4 Administrator Questions and Answers

Question 1

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

Options:

A.

FortiGate directs the collector agent to use a remote LDAP server.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.

FortiGate does not support workstation check.

D.

FortiGate uses the AD server as the collector agent.

Question 2

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

Options:

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

B.

The browser does not trust the certificate used by FortiGate for SSL inspection

C.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

D.

The matching firewall policy is set to proxy inspection mode

Question 3

Which three statements about SD-WAN zones are true? (Choose three.)

Options:

A.

An SD-WAN zone can contain physical and logical interfaces

B.

You can use an SD-WAN zone in static route definitions

C.

You can define up to three SD-WAN zones per FortiGate device

D.

An SD-WAN zone must contains at least two members

E.

An SD-WAN zone is a logical grouping of members

Question 4

An administrator has configured the following settings:

Question # 4

What are the two results of this configuration? (Choose two.)

Options:

A.

Denied users are blocked for 30 minutes.

B.

A session for denied traffic is created.

C.

The number of logs generated by denied traffic is reduced.

D.

Device detection on all interfaces is enforced for 30 minutes.

Question 5

Refer to the exhibits.

Question # 5

The exhibits show a diagram of a FortiGate device connected to the network, VIP configuration, firewall policy. and the sniffer CLI output on the FortiGate device.

The WAN (port1) interface has the IP address 10.200.1.1 /24.

The LAN (port3) interface has the IP address 10.0.1.254/24.

The webserver host (10. 0.1. 10) must use its VIP external IP address as the source NAT (SNAT) when It pings remote server (10.200.3.1).

Which two statements are valid to achieve this goal? (Choose two.)

Options:

A.

Enable NAT on the Allow_access firewall policy.

B.

Create a new firewall policy before lnternet_Access for the webserver and apply the IP pool.

C.

Disable NAT on the lnternet_Access firewall policy.

D.

Disable port forwarding on the VIP object.

Question 6

Refer to the exhibits, which show the firewall policy and the security profile for Facebook.

Question # 6

Question # 6

Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other types of posts.

Which part of the configuration must you change to resolve the issue?

Options:

A.

Make the SSL inspection a deep content inspection

B.

Add Facebook to the URL category in the security policy

C.

Disable HTTP redirect to HTTPS on the web browser

D.

Get the additional application signatures required to add to the security policy

Question 7

Refer to the exhibits.

Question # 7

Question # 7

Question # 7

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall policies configuration VIP configuration and IP pool configuration on the FortiGate device

The WAN (port1) interface has the IP address 10.200. l. 1/24 The LAN (port3) interface has the IP address 10.0.1.254/24

The first firewall policy has NAT enabled using the IP pool The second firewall policy is configured with a VIP as the destination address.

Which IP address will be used to source NAT (SNAT) the internet traffic coming from a workstation with the IP address 10.0.1.10?

Options:

A.

10.200.1.1

B.

10.200.1.10

C.

10.0.1.254

D.

10.200.1.100

Question 8

Which method allows management access to the FortiGate CLI without network connectivity?

Options:

A.

SSH console

B.

CLI console widget

C.

Serial console

D.

Telnet console

Question 9

Which two pieces of information are synchronized between FortiGate HA members? (Choose two.)

Options:

A.

OSPF adjacencies

B.

IPsec security associations

C.

BGP peerings

D.

DHCP leases

Question 10

Refer to the exhibit.

Question # 10

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

Options:

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Question 11

Refer to the exhibit.

Question # 11

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name.

FortiGate allows the traffic according to policy ID 1. This is the policy that allows SD-WAN traffic.

Despite these settings the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows.

What can be the reason?

Options:

A.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

B.

There is no application control profile applied to the firewall policy.

C.

Destination in the SD-WAN rules are configured per application but the feature visibility is not enabled.

D.

SD-WAN rule names do not appear immediately. The administrator needs to refresh the page.

Question 12

Which two statements describe how the RPF check is used? (Choose two.)

Options:

A.

The RPF check is run on the first sent packet of any new session.

B.

The RPF check is run on the first reply packet of any new session.

C.

The RPF check is run on the first sent and reply packet of any new session.

D.

The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.

Question 13

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.

Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)

Options:

A.

Allow & Warning

B.

Trust & Allow

C.

Allow

D.

Block & Warning

E.

Block

Question 14

Refer to the exhibits, which show a diagram of a FortiGate device connected to the network. VIP object configuration, and the firewall policy configuration.

Question # 14

Question # 14

Question # 14

The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IP address 10.0.1.254/24.

If the host 10.200.3.1 sends a TCP SYN packet on port 8080 to 10.200.1.10, what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?

Options:

A.

10.0.1.254, 10.200.1.10, and 8080, respectively

B.

10.0.1.254, 10.0.1.10, and 80, respectively

C.

10.200.3.1, 10.0.1.10, and 80, respectively

D.

10.200.3.1, 10.0.1.10, and 8080, respectively

Question 15

Refer to the exhibits.

Question # 15

Question # 15

The SSL VPN connection fails when a user attempts to connect to it.

What should the user do to successfully connect to the SSL VPN?

Options:

A.

Change the SSL VPN portal to the tunnel.

B.

Change the idle timeout.

C.

Change the server IP address.

D.

Change the SSL VPN port on the client.

Question 16

Refer to the exhibit.

Question # 16

Which statement about this firewall policy list is true?

Options:

A.

The Implicit group can include more than one deny firewall policy.

B.

The firewall policies are listed by ID sequence view.

C.

The firewall policies are listed by ingress and egress interfaces pairing view.

D.

LAN to WAN. WAN to LAN. and Implicit are sequence grouping view lists.

Question 17

Which statement is a characteristic of automation stitches?

Options:

A.

They can be run only on devices in the Security Fabric.

B.

They can be created only on downstream devices in the fabric.

C.

They can have one or more triggers.

D.

They can run multiple actions at the same time.

Question 18

A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.

Which IPsec Wizard template must the administrator apply?

Options:

A.

Remote Access

B.

Site to Site

C.

Dial up User

D.

iHub-and-Spoke

Question 19

Which three CLI commands, can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.)

Options:

A.

execute ping

B.

execute traceroute

C.

diagnose sys top

D.

get system arp

E.

diagnose sniffer packet any

Question 20

A FortiGate firewall policy is configured with active authentication however, the user cannot authenticate when accessing a website.

Which protocol must FortiGate allow even though the user cannot authenticate?

Options:

A.

ICMP

B.

DNS

C.

DHCP

D.

LDAP

Question 21

Refer to the exhibit, which shows a partial configuration from the remote authentication server.

Question # 21

Why does the FortiGate administrator need this configuration?

Options:

A.

To authenticate only the Training user group.

B.

To set up a RADIUS server Secret

C.

To authenticate and match the Training OU on the RADIUS server.

D.

To authenticate Any FortiGate user groups.

Question 22

Refer to the exhibits.

Question # 22

Question # 22

Question # 22

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration.

An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2.

The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver.

Which two configuration changes can the administrator make to the policy to deny Webserver access for Remote-User2? (Choose two.)

Options:

A.

Enable match-vip in the Deny policy.

B.

Set the Destination address as Webserver in the Deny policy.

C.

Disable match-vip in the Deny policy.

D.

Set the Destination address as Deny_IP in the Allow_access policy.

Question 23

An administrator is configuring an IPsec VPN between site A and site В. The Remote Gateway setting in both sites has been configured as Static IP Address.

For site A, the local quick mode selector is 192.168.1.0/24 and the remote quick mode selector is 192.168.2.0/24.

Which subnet must the administrator configure for the local quick mode selector for site B?

Options:

A.

192.168.3.0/24

B.

192.168.0.0/8

C.

192.168.2.0/24

D.

192.168.1.0/24

Question 24

An administrator manages a FortiGate model that supports NTurbo.

How does NTurbo enhance performance for flow-based inspection?

Options:

A.

NTurbo offloads traffic to the content processor.

B.

NTurbo creates two inspection sessions on the FortiGate device.

C.

NTurbo buffers the whole file and then sends it to the antivirus engine.

D.

NTurbo creates a special data path to redirect traffic between the IPS engine its ingress and egress interfaces.

Question 25

Refer to the exhibit.

Question # 25

FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt.

What is the most likely reason for this situation?

Options:

A.

The Service DNS is required in the firewall policy.

B.

The user is using an incorrect user name.

C.

The Remote-users group is not added to the Destination.

D.

No matching user account exists for this user.

Question 26

Refer to the exhibit.

Question # 26

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

Options:

A.

Enable the parameter Never Timeout in the admin profiles

B.

Increase the admintimeout value under config system accprofile super_admin.

C.

Increase the admintimeout value under config system global

D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Page: 1 / 9
Total 88 questions