option
Questions
ayuda
daypo
search.php

ERASED TEST, YOU MAY BE INTERESTED ON FCP_FGT_AD-7.4: Fortinet FCP 5/6

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
FCP_FGT_AD-7.4: Fortinet FCP 5/6

Description:
Fortinet Fortigate FCP

Author:
tereusmatheus
Other tests from this author

Creation Date: 09/09/2024

Category: Entertainment

Number of questions: 50
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
When IPS fail open is triggered, what is the expected behavior if the IPS fail open option is set to enabled? New packets will be dropped The device enters a conservative mode, minimizing traffic flow. New packets will pass through All traffic is rerouted through a secondary IPS system.
Of these options, which one is a possible reason why an administrator might not be able to gain access to a specific VDOM? The administrator has full unrestricted internet access. The administrator is using the Super Admin profile. The administrator is using an IP address not specified as a trusted host. The VDOM is currently in a passive state in a High Availability configuration.
With email alerts, you can trigger alert emails based on ____ or log severity level. event Network traffic volume User activity threat weight.
Examine the exhibit, which shows the output of a web filtering real time debug. Why is the site www.bing.com being blocked? The web site www.bing.com is categorized by FortGuard as Malicious Websites. The rating for the web site www.bing.com has been locally overridden to a category that is being blocked. The user has not authenticated with the FortiGate yet. The web server IP address 204.79.197.200 is categorized by FortGuard as Malicious Websites.
An administrator is configuring an IPsec VPN between site A and site B. The Remote Gateway setting in both sites has been configured as Static IP Address. For site A, the local quick mode selector is 192.168.1.0/24 and the remote quick mode selector is 192.168.2.0/24. Which subnet must the administrator configure for the local quick mode selector for site B? 192.168.0.0/8 192.168.3.0/24 192.168.2.0/24 192.168.1.0/24.
Which of the following statements are best practices for troubleshooting FSSO? (Choose two.) Guarantee at least 34 Kbps bandwidth between FortiGate and domain controllers. Include the group of guest users in a policy. Ensure all firewalls allow the FSSO required port. Extend timeout timers.
Refer to the exhibit, which contains a session diagnostic output. Which statement is true about the session diagnostic output? The session is in ESTABLISHED state The session is in SYN_SENT state The session is in FIN_WAIT state The session is in FIN_ACK state.
What setting on your firewall policy must you enable to generate logs on traffic sent through that firewall policy? Event Logging Real-Time Monitoring Log Allowed Traffic Intrusion Prevention System (IPS) logging.
Examine the network diagram shown in the exhibit, then answer the following question: Which one of the following routes is the best candidate route for FGT1 to route traffic from the Workstation to the Web server? 172.16.32.0/24 is directly connected, port1 172.16.0.0/16 [50/0] via 10.4.200.2, port2 [5/0] 10.4.200.0/30 is directly connected, port2 0.0.0.0/0 [20/0] via 10.4.200.2, port2.
What devices form the core of the security fabric? Two FortiGate devices and one FortiAnalyzer device Two FortiGate devices and one FortiManager device One FortiGate device and one FortiManager device One FortiGate device and one FortiAnalyzer device.
Which two statements about virtual domains (VDOMs) are true? (Choose two.) Each VDOM has its own routing table. Transparent mode and NAT mode VDOMs cannot be combined on the same FortiGate. Each VDOM can be configured with different system hostnames. Different VLAN subinterfaces of the same physical interface can be assigned to different VDOMs.
Which two statements about FortiGate antivirus databases are true? (Choose two.) The quick scan database is part of the normal database. The extended database is available only if grayware scanning is enabled. The extreme database is available only on certain FortiGate models The extended database is available on all FortiGate models.
The exhibit shows proxy policies and proxy addresses, the authentication rule and authentication scheme, users, and firewall address. An explicit web proxy is configured for subnet range 10.0.1.0/24 with three explicit web proxy policies. The authentication rule is configured to authenticate HTTP requests for subnet range 10.0.1.0/24 with a form-based authentication scheme for the FortiGate local user database. Users will be prompted for authentication. How will FortiGate process the traffic when the HTTP request comes from a machine with the source IP 10.0.1.10 to the destination http:// www.fortinet.com? (Choose two.) If a Mozilla Firefox browser is used with User-A credentials, the HTTP request will be allowed. If a Mozilla Firefox browser is used with User-B credentials, the HTTP request will be allowed. If a Microsoft Internet Explorer browser is used with User-B credentials, the HTTP request will be allowed. If a Google Chrome browser is used with User-B credentials, the HTTP request will be allowed.
How can you block or allow access to Twitter using a firewall policy? Configure the Action field as Learn and select Twitter. Configure the Service field as Internet Service objects for Twitter. Configure the Source field as Internet Service objects for Twitter Configure the Destination field as Internet Service objects for Twitter.
Which of the following features requires full SSL inspection to maximize it's detection capability? WAF Application Control DoS Intrusion Prevention System (IPS).
Which firewall authentication methods does FortiGate support? (Choose three.) Server-based password authentication Local password authentication Biometric authentication Out-of-band authentication Two-factor authentication.
Examine the IPS sensor and DoS policy configuration shown in the exhibit, then answer the question below. When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first? ip_src_session SMTP.Login.Brute.Force Location: server Protocol: SMTP IMAP.Login.brute.Force.
To access the maintainer account during a recovery, begin by: Holding down the reset button for 10 seconds Unplugging or turning off the device Typing execute reboot on the CLI Accessing the device's web-based interface.
What is the purpose of setting a Role for an interface? It provides an alias for the interface. Firewall policies show the interface with this alias. It defines the configuration settings available for the interface. It reserves the interface for management. It creates a new interface on FortiGate, such as link aggregation.
Which chipset uses NTurbo to accelerate IPS sessions? CP9 SoC3 NP6 FortiASIC.
What information is synchronized between two FortiGate devices that belong to the same HA cluster? Local traffic logs stored on each device Firewall policies and objects FortiGate hostname Individual user login sessions.
Which of the following is a WPAD methods? LDAP query HTTP request DHCP query DNS lookup.
Which encapsulation mode is used for end-to-end (or client-to-client) VPNs? Transport mode Tunnel mode L2TP PPTP.
Examine this FortiGate configuration: How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires authorization? It authenticates the traffic using the authentication scheme SCHEME1. It authenticates the traffic using the authentication scheme SCHEME2. It drops the traffic. It always authorizes the traffic without requiring authentication.
Which two types of traffic are managed only by the management VDOM? (Choose two.) Traffic shaping PKI DNS FortiGuard web filter queries.
Which two SD-WAN load balancing methods use interface weight value to distribute traffic? Spillover Volume Sessions Source IP.
Refer to the exhibits. Exhibit A shows a topology for a FortiGate HA cluster that performs proxy-based inspection on traffic. Exhibit B shows the HA configuration and the partial output of the get system ha status command. Based on the exhibits, which two statements about the traffic passing through the cluster are true? (Choose two.) The traffic sourced from the client and destined to the server is sent to FGT-1. For non-load balanced connections, packets forwarded by the cluster to the server contain the virtual MAC address of port2 as source. For load balanced connections, the primary encapsulates TCP SYN packets before forwarding them to the secondary. The cluster can load balance ICMP connections to the secondary.
Which two configuration settings are synchronized when FortiGate devices are in an active-active HA cluster? (Choose two.) FortiGate hostname NTP FortiGuard web filter cache DNS.
Which protocol does FortiGate use to download antivirus and IPS packages? UDP TCP HTTPS HTTP.
Refer to the exhibit to view the authentication rule configuration. In this scenario, which statement is true? Policy-based authentication is enabled Session-based authentication is enabled Route-based authentication is enabled IP-based authentication is enabled.
Which of the following statements about proxy-based web filtering is true? Transparently analyzes the TCP flow of the traffic Proxy-based web filtering is less secure than flow-based filtering. Requires more resources than flow-based Proxy-based web filtering can't inspect encrypted HTTPS traffic.
Which two statements about SSL VPN between two FortiGate devices are true? (Choose two.) The client FortiGate uses the SSL VPN tunnel interface type to connect SSL VPN. The client FortiGate requires a manually added route to remote subnets. Server FortiGate requires a CA certificate to verify the client FortiGate certificate. The client FortiGate requires a client certificate signed by the CA on the server FortiGate.
What does the logging of oversized files option do? Logs the details of files only when they are detected as malicious, regardless of size. Logs all files that are over 5MB. Disables scanning and logging of all oversized files. Enables logging of all files that cannot be scanned due to oversize limit.
When is a new TCP session allocated? When a FIN packet is received When a SYN packets is allowed When a SYN/ACK packet is allowed When any ICMP packet is allowed.
How do you format the FortiGate flash disk? Select the format boot device option from the BIOS menu. Load the hardware test (HQIP) image. Load a debug FortiOS image. Execute the CLI command execute format log disk.
On FortiGate, which type of logs record information about traffic directly to and from the FortiGate management IP addresses? System event logs Forward traffic logs Security logs Local traffic logs.
What must be selected in the Source field of a firewall policy? At least one source user and one source address object At least one address object At least one service object. The specific time schedule for the policy.
Which of the following statements about FortiGate operating in transparent mode is true? Each interlace has its own IP address. FortiGate acts as a Layer 3 router. It has a managements IP address. Transparent mode does not support VLANs.
An administrator wants to configure a FortiGate as a DNS server. FotiGate must use a DNS database first, and then relay all irresolvable queries to an external DNS server. Which DNS method must you use? Recursive Non-recursive Forward to primary and secondary DNS Forward to system DNS.
What does this raw log indicate? (Choose two.) Traffic matches the application profile on firewall policy ID 1 Traffic originated from 13.32.69.150 FortiGate allowed the traffic to pass 10.0.1.10 is the IP address for *.cdn.mozilla.net.
Which attribute does FortiGate use to determine the best route for a packet, if it matches multiple dynamic routes that have the same Distance? Metric Load Balancing Administrative Distance Priority.
Which is an advantage of transparent web proxy over explicit web proxy? Web browsers do not need to be configured to use the proxy. PAC Net can be used to speedy which peaky to Use. A specific browser extension is needed to connect to the proxy. Web browsers require manual configuration for each proxy server.
Why is it necessary to run a client integrity check (host—check)? To check whether a specific security certificate is running on SSL-VPN users' web browsers To ensure the SSL-VPN client version matches the server version To validate the user's network speed To check whether specific security software is running on SSL-VPN users' computers.
Which two statements are true when FortiGate is in transparent mode? (Choose two.) The existing network IP schema must be changed when installing a transparent mode. By default, all interfaces are part of the same broadcast domain. Static routes are required to allow traffic to the next hop. FortiGate forwards frames without changing the MAC address.
What TCP port is used to contact to FortiGuard servers for antivirus updates? 25 53 443 80.
Firewall policy name is mandatory when configuring on the ________ CLI GUI API EMP.
What information is displayed in the output of a debug flow? Physical location and IP address of the end user Historical data and user browsing history Incoming Interface and matching firewall policy Matching content profiles and traffic log.
Refer to the exhibits. The exhibits show the firewall policies and the objects used in the firewall policies. The administrator is using the Policy Lookup feature and has entered the search criteria shown in the exhibit. Policy with ID 4. Policy with ID 5. Policy with ID 4. Policies with ID 2 and 3.
Which is the recommended mode for FSSO deployments? RSSO (RADIUS Single Sign-On) DC agent mode LDAP synchronization mode Polling mode: Agentless.
When configuring FortiGate as a DHCP server to restrict access by MAC address, what does the Assign IP option do? Dynamically assign an IP to a MAC address Blocks the MAC address from accessing the network. Assign a specific IP address to a MAC address Assigns a random IP address from a different subnet.
Report abuse