Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Fortinet FCSS_EFW_AD-7.6 Dumps Questions Answers

Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Questions and Answers

Question 1

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

Options:

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.

The ISDB limits access by URL and domain.

Buy Now
Question 2

How will configuring set tcp-mss-sender and set tcp-mss-receiver in a firewall policy affect the size and handling of TCP packets in the network?

Options:

A.

The maximum segment size permitted in the firewall policy determines whether TCP packets are allowed or denied.

B.

Applying commands in a firewall policy determines the largest payload a device can handle in a single TCP segment.

C.

The administrator must consider the payload size of the packet and the size of the IP header to configure a correct value in the firewall policy.

D.

The TCP packet modifies the packet size only if the size of the packet is less than the one the administrator configured in the firewall policy.

Question 3

Which three approaches can successfully deploy advanced initial configurations?

Options:

A.

Metadata variables

B.

Model device ZTP/LTP

C.

Jinja scripting

D.

Global ADOM

Question 4

You are trying to efficiently deploy ADVPN within the enterprise network. Which two approaches can facilitate this deployment? (Choose two.)

Options:

A.

On FortiManager, enable ADVPN on VPN Manager.

B.

On FortiGate, connect only the links with the best status.

C.

On FortiGate, utilize loopback interfaces to reduce the number of routes and peers.

D.

On FortiManager, activate the recommended IPsec tunnel provisioning templates and enable ADVPN.

Question 5

You must configure a loopback as a BGP source to connect to the ISP.

Which two commands must you use to establish the connection? (Choose two.)

Options:

A.

ebgp-enforce-multihop

B.

update-source

C.

ibgp-enforce-multihop

D.

recursive-next-hop

Question 6

In which two ways does FortiGate utilize the Internet Service Database (ISDB)?

Options:

A.

Blocks IPs and ports

B.

Limits by URL

C.

Works in proxy mode

D.

Provides predefined IPs and ports

Question 7

Refer to the exhibit, which shows the ADVPN network topology and partial BGP configuration.

Which two parameters must an administrator configure in the config neighbor range for spokes shown in the exhibit? (Choose two.)

Options:

A.

set max-neighbor-num 2

B.

set neighbor-group advpn

C.

set route-reflector-client enable

D.

set prefix 172.16.1.0 255.255.255.0

Question 8

How can FortiGate analyze HTTPS traffic on non-standard port 8443?

Options:

A.

Proxy mode

B.

TLS 1.2

C.

Add 443 and 8443 mapping

D.

Enable IPS

Question 9

Refer to the exhibit.

The partial output of an OSPF command is shown. While checking the OSPF status of FortiGate, you receive the output shown in the exhibit. Based on the output, which two statements about FortiGate are correct? (Choose two answers)

Options:

A.

FortiGate has OSPF ECMP enabled.

B.

FortiGate is a backup designated router.

C.

FortiGate injects external routing information.

D.

FortiGate is connected to multiple areas.

Question 10

Refer to the exhibit.

The packet capture output of a client hello message is shown.

You are updating a firewall policy that includes SSL certificate inspection. You are capturing packets from the traffic passing through this firewall policy.

Which two statements about the packet capture are correct? (Choose two.)

Options:

A.

You can effectively apply an antivirus security profile to this traffic.

B.

You can effectively apply a web filtering profile to this traffic.

C.

The subject alternative name (SAN) is necessary to apply security profiles.

D.

The client supports only TLS versions 1.2 and 1.3.

Question 11

A user reports that their computer was infected with malware after accessing a secured HTTPS website. However, when the administrator checks the FortiGate logs, they do not see that the website was detected as insecure despite having an SSL certificate and correct profiles applied on the policy.

How can an administrator ensure that FortiGate can analyze encrypted HTTPS traffic on a website?

Options:

A.

The administrator must enable reputable websites to allow only SSL/TLS websites rated by FortiGuard web filter.

B.

The administrator must enable URL extraction from SNI on the SSL certificate inspection to ensure the TLS three-way handshake is correctly analyzed by FortiGate.

C.

The administrator must enable DNS over TLS to protect against fake Server Name Indication (SNI) that cannot be analyzed in common DNS requests on HTTPS websites.

D.

The administrator must enable full SSL inspection in the SSL/SSH Inspection Profile to decrypt packets and ensure they are analyzed as expected.

Question 12

What happens when an SSO user logs into a downstream FortiGate?

Options:

A.

Denied

B.

Readonly admin

C.

Super admin

D.

No account

Question 13

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

Options:

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

Question 14

Refer to the exhibits.

The firewall policy ID 1 of the DCFW policy package and the reinstall preview window for the DCFW policy package installation are shown.

Why is FortiManager installing set srcaddr " SSLVPN_tunnel_addr1 " on firewall policy ID 1 when the policy package DCFW has the source address 10.0.5 on the firewall policy ID 1?

Options:

A.

The reinstall policy package ignores recent changes to the policy layer. The administrator must run the Install Wizard.

B.

FortiManager is installing the global policy package, which has higher priority than the ADOM policy package.

C.

FortiManager has assigned firewall HQ-DCFW a CLI template that can overwrite configurations at the policy layer.

D.

The firewall policy and reinstall preview use the same addresses, but they have different names because of per-device mapping.

Question 15

What should be configured to provide hardware-accelerated inter-VDOM traffic?

Options:

A.

VDOM link

B.

NPU vlinks

C.

VLAN

D.

Physical link

Question 16

Which two options integrate an additional FortiGate for scaling?

Options:

A.

FGSP

B.

FGCP Active-Active

C.

VRRP

D.

FGCP Active-Passive

Question 17

Refer to the exhibit.

A physical topology along with a traffic log is shown. You are using FortiAnalyzer to monitor traffic from the device with IP address 10.0.2.51, which is located behind the FortiGate internal segmentation firewall (ISFW) device. Unified threat management (UTM) is not enabled in the firewall policy on the HQ-ISFW device, and you are surprised to see a log with the action Malware, as shown in the exhibit. What are two reasons why FortiAnalyzer would display this log? (Choose two answers)

Options:

A.

HQ-ISFW is not connected to FortiAnalyzer and traffic must go through HQ-NGFW-1.

B.

UTM is enabled in the firewall policy in HQ-NGFW-1.

C.

HQ-ISFW is in a Security Fabric environment.

D.

Security rating is enabled in HQ-ISFW.

Question 18

Refer to the exhibit, which contains a partial command output.

The administrator has configured BGP on FortiGate. The status of this new BGP configuration is shown in the exhibit.

What configuration must the administrator consider next?

Options:

A.

Configure a static route to 100.65.4.1.

B.

Configure the local AS to 65300.

C.

Contact the remote peer administrator to enable BGP

D.

Enable ebgp-enforce-multihop.

Question 19

Refer to the exhibit, which shows a command output.

FortiGate_A and FortiGate_B are members of an FGSP cluster in an enterprise network.

While testing the cluster using the ping command, the administrator monitors packet loss and found that the session output on FortiGate_B is as shown in the exhibit.

What could be the cause of this output on FortiGate_B?

Options:

A.

The session synchronization is encrypted.

B.

session-pickup-connectionless is set to disable on FortiGate_B.

C.

FortiGate_B is configured in passive mode.

D.

FortiGate_A and FortiGate_B have the same standalone-group-id value.

Question 20

An organization ' s guest Internet policy, operating in proxy mode, blocks access to artificial intelligence technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.

Which configuration change must you make for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443, when full SSL inspection is active in the guest policy?

Options:

A.

Block traffic on nonstandard ports by enabling server certificate SNI check in the SSL/SSH inspection profile.

B.

Enable network protocol enforcement for port 8443 with the protocol HTTPS in FortiGuard application control.

C.

Enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports in the protocol port mapping section of the SSL/SSH inspection profile.

D.

Block untrusted SSL certificates in the SSL/SSH inspection profile.

Question 21

To secure your enterprise network traffic, which step does FortiGate perform first, when handling the first packets of a session? (Choose one answer)

Options:

A.

Installation of the session key in the network processor (NP)

B.

Decryption

C.

A reverse path forwarding (RPF) check

D.

IP integrity header checking

Question 22

An administrator is extensively using VXLAN on FortiGate.

Which specialized acceleration hardware does FortiGate need to improve its performance?

Options:

A.

NP7

B.

SP5

C.

СР9

D.

NTurbo

Question 23

Refer to the exhibit, which shows an ADVPN network

An administrator must configure an ADVPN using IBGP and EBGP to connect overlay network 1 with 2.

What two options must the administrator configure in BGP? (Choose two.)

Options:

A.

set ebgp-enforce-multrhop enable

B.

set next-hop-self enable

C.

set ibgp-enforce-multihop advpn

D.

set attribute-unchanged next-hop

Question 24

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

The administrator must configure the BGP section of FortiGate A to give internet access to the enterprise network.

Which command must the administrator use to establish a connection with the internet service provider?

Options:

A.

config neighbor

B.

config redistribute bgp

C.

config router route-map

D.

config redistribute ospf

Question 25

Refer to the exhibits.

The Administrators section of a root FortiGate device and the Security Fabric Settings section of a downstream FortiGate device are shown.

When prompted to sign in with Security Fabric in the downstream FortiGate device, a user enters the AdminSSO credentials.

What is the next status for the user?

Options:

A.

The user is prompted to create an SSO administrator account for AdminSSO.

B.

The user receives an authentication failure message.

C.

The user accesses the downstream FortiGate with super_admin_readonly privileges.

D.

The user accesses the downstream FortiGate with super_admin privileges.

Question 26

Refer to the exhibit, which shows a partial enterprise network.

An administrator would like the area 0.0.0.0 to detect the external network.

What must the administrator configure?

Options:

A.

Enable RIP redistribution on FortiGate B.

B.

Configure a distribute-route-map-in on FortiGate B.

C.

Configure a virtual link between FortiGate A and B.

D.

Set the area 0.0.0.l type to stub on FortiGate A and B.

Question 27

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

An administrator must configure a loopback as a BGP source to connect to the ISP.

Which two commands are required to establish the connection? (Choose two.)

Options:

A.

ebgp-enforce-multihop

B.

update-source

C.

ibgp-enforce-multihop

D.

recursive-next-hop

Question 28

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

Options:

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.

C.

Select flow mode in the IPS profile to accurately analyze application patterns.

D.

Set the IPS profile signature action to default to discard all possible false positives.

Question 29

Why does FortiGate_B not show ICMP sessions when running: get system session list | grep icmp in an FGSP cluster?

Options:

A.

session-pickup is disabled

B.

session-pickup-connectionless is disabled

C.

FGSP is misconfigured

D.

ICMP is unsupported

Question 30

Refer to the exhibit.

The routing tables of FortiGate_A and FortiGate_B are shown. FortiGate_A and FortiGate_B are in the same autonomous system.

The administrator wants to dynamically add only route 172.16.1.248/30 on FortiGate_A.

What must the administrator configure?

Options:

A.

The prefix 172.16.1.248/30 in the BGP Networks section on FortiGate_B

B.

A BGP route map out for 172.16.1.248/30 on FortiGate_B

C.

Enable Redistribute Connected in the BGP section on FortiGate_B.

D.

A BGP route map in for 172.16.1.248/30 on FortiGate_A

Question 31

An administrator wants to scale the IBGP sessions and optimize the routing table in an IBGP network.

Which parameter should the administrator configure?

Options:

A.

network-import-check

B.

ibgp-enforce-multihop

C.

neighbor-group

D.

route-reflector-client

Question 32

Why do the firewall policy and reinstall preview show different address names during installation?

Options:

A.

Address mismatch

B.

Per-device mapping

C.

Object corruption

D.

Policy conflict

Question 33

How can FortiGate_B advertise only 172.16.1.248/30 using BGP?

Options:

A.

Redistribute connected

B.

Route map out

C.

Prefix list in

D.

Network