New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Fortinet FCSS_EFW_AD-7.6 Dumps Questions Answers

Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Questions and Answers

Question 1

Refer to the exhibits.

The Administrators section of a root FortiGate device and the Security Fabric Settings section of a downstream FortiGate device are shown.

When prompted to sign in with Security Fabric in the downstream FortiGate device, a user enters the AdminSSO credentials.

What is the next status for the user?

Options:

A.

The user is prompted to create an SSO administrator account for AdminSSO.

B.

The user receives an authentication failure message.

C.

The user accesses the downstream FortiGate with super_admin_readonly privileges.

D.

The user accesses the downstream FortiGate with super_admin privileges.

Buy Now
Question 2

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

An administrator must configure a loopback as a BGP source to connect to the ISP.

Which two commands are required to establish the connection? (Choose two.)

Options:

A.

ebgp-enforce-multihop

B.

update-source

C.

ibgp-enforce-multihop

D.

recursive-next-hop

Question 3

Refer to the exhibit, which shows the packet capture output of a three-way handshake between FortiGate and FortiManager Cloud.

What two conclusions can you draw from the exhibit? (Choose two.)

Options:

A.

FortiGate will receive a certificate that supports multiple domains because FortiManager operates in a cloud computing environment.

B.

FortiGate is connecting to the same IP server and will receive an independent certificate for its connection between FortiGate and FortiManager Cloud.

C.

If the TLS handshake contains 17 cipher suites it means the TLS version must be 1.0 on this three-way handshake.

D.

The wildcard for the domain *.fortinet-ca2.support.fortinet.com must be supported by FortiManager Cloud.

Question 4

Refer to the exhibit, which shows a network diagram.

An administrator would like to modify the MED value advertised from FortiGate_1 to a BGP neighbor in the autonomous system 30.

What must the administrator configure on FortiGate_1 to implement this?

Options:

A.

route-map-out

B.

network-import-check

C.

prefix-list-out

D.

distribute-list-out

Question 5

An administrator wants to scale the IBGP sessions and optimize the routing table in an IBGP network.

Which parameter should the administrator configure?

Options:

A.

network-import-check

B.

ibgp-enforce-multihop

C.

neighbor-group

D.

route-reflector-client

Question 6

Refer to the exhibit, which contains a partial VPN configuration.

What can you conclude from this VPN IPsec phase 1 configuration?

Options:

A.

This configuration is the best for networks with regular traffic intervals, providing a balance between connectivity assurance and resource utilization.

B.

Peer IDs are unencrypted and exposed, creating a security risk.

C.

FortiGate will not add a route to its routing or forwarding information base when the dynamic tunnel is negotiated.

D.

A separate interface is created for each dial-up tunnel, which can be slower and more resource intensive, especially in large networks.

Question 7

Refer to the exhibit.

An administrator is deploying a hub and spokes network and using OSPF as dynamic protocol.

Which configuration is mandatory for neighbor adjacency?

Options:

A.

Set bfd enable in the router configuration

B.

Set network-type point-to-multipoint in the hub interface

C.

Set rfc1583-compatible enable in the router configuration

D.

Set virtual-link enable in the hub interface

Question 8

Refer to the exhibit, which shows an ADVPN network

An administrator must configure an ADVPN using IBGP and EBGP to connect overlay network 1 with 2.

What two options must the administrator configure in BGP? (Choose two.)

Options:

A.

set ebgp-enforce-multrhop enable

B.

set next-hop-self enable

C.

set ibgp-enforce-multihop advpn

D.

set attribute-unchanged next-hop

Question 9

You are using Virtual eXtensible LAN (VXLAN) extensively on FortiGate. Which specialized acceleration hardware must you use to improve FortiGate performance? (Choose one answer)

Options:

A.

NP7

B.

SP5

C.

СР9

D.

NTurbo

Question 10

Refer to the exhibit, which shows a corporate network and a new remote office network.

An administrator must integrate the new remote office network with the corporate enterprise network.

What must the administrator do to allow routing between the two networks?

Options:

A.

The administrator must implement BGP to inject the new remote office network into the corporate FortiGate device

B.

The administrator must configure a static route to the subnet 192.168.l.0/24 on the corporate FortiGate device.

C.

The administrator must configure virtual links on both FortiGate devices.

D.

The administrator must implement OSPF over IPsec on both FortiGate devices.

Question 11

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

Options:

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

Question 12

Refer to the exhibit.

A physical topology along with a traffic log is shown. You are using FortiAnalyzer to monitor traffic from the device with IP address 10.0.2.51, which is located behind the FortiGate internal segmentation firewall (ISFW) device. Unified threat management (UTM) is not enabled in the firewall policy on the HQ-ISFW device, and you are surprised to see a log with the action Malware, as shown in the exhibit. What are two reasons why FortiAnalyzer would display this log? (Choose two answers)

Options:

A.

HQ-ISFW is not connected to FortiAnalyzer and traffic must go through HQ-NGFW-1.

B.

UTM is enabled in the firewall policy in HQ-NGFW-1.

C.

HQ-ISFW is in a Security Fabric environment.

D.

Security rating is enabled in HQ-ISFW.

Question 13

An administrator is extensively using VXLAN on FortiGate.

Which specialized acceleration hardware does FortiGate need to improve its performance?

Options:

A.

NP7

B.

SP5

C.

СР9

D.

NTurbo

Question 14

Refer to the exhibit, which shows the ADVPN IPsec interface representing the VPN IPsec phase 1 from Hub A to Spoke 1 and Spoke 2, and from Hub В to Spoke 3 and Spoke 4.

An administrator must configure an ADVPN using IBGP and EBGP to connect overlay network 1 with 2.

What must the administrator configure in the phase 1 VPN IPsec configuration of the ADVPN tunnels?

Options:

A.

set auto-discovery-sender enable and set network-id x

B.

set auto-discovery-forwarder enable and set remote-as x

C.

set auto-discovery-crossover enable and set enforce-multihop enable

D.

set auto-discovery-receiver enable and set npu-offload enable

Question 15

Refer to the exhibit, which contains a partial command output.

The administrator has configured BGP on FortiGate. The status of this new BGP configuration is shown in the exhibit.

What configuration must the administrator consider next?

Options:

A.

Configure a static route to 100.65.4.1.

B.

Configure the local AS to 65300.

C.

Contact the remote peer administrator to enable BGP

D.

Enable ebgp-enforce-multihop.

Question 16

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

Options:

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.

The ISDB limits access by URL and domain.

Question 17

Refer to the exhibit, which contains the partial output of an OSPF command.

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

Which statement on this FortiGate device is correct?

Options:

A.

The FortiGate device can inject external routing information.

B.

The FortiGate device is in the area 0.0.0.5.

C.

The FortiGate device does not support OSPF ECMP.

D.

The FortiGate device is a backup designated router.

Question 18

Refer to the exhibit, which shows the ADVPN network topology and partial BGP configuration.

Which two parameters must an administrator configure in the config neighbor range for spokes shown in the exhibit? (Choose two.)

Options:

A.

set max-neighbor-num 2

B.

set neighbor-group advpn

C.

set route-reflector-client enable

D.

set prefix 172.16.1.0 255.255.255.0

Question 19

An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.

What two conclusions can the administrator draw? (Choose two.)

Options:

A.

The suspicious packet is related to a cluster that has VDOMs enabled.

B.

The network includes FortiGate devices configured with the FGSP protocol.

C.

The suspicious packet is related to a cluster with a group-id value lower than 255.

D.

The suspicious packet corresponds to port 7 on a FortiGate device.