Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Fortinet FCSS_NST_SE-7.6 Dumps Questions Answers

Fortinet NSE 6 - Network Security 7.6 Support Engineer Questions and Answers

Question 1

Refer to the exhibit.

The sniffer log on two FortiGate devices are shown. Based on the information in the log, which two factors explain the output on FortiGate FGT-02? (Choose two answers)

Options:

A.

A third-party device is blocking protocol 50.

B.

The administrator has not yet configured the VPN tunnel on FGT-02.

C.

The administrator configured the wrong remote peer IP address on FGT-01.

D.

The administrator set the wrong sniffer filter on FGT-02.

Buy Now
Question 2

Refer to the exhibit, which shows one way communication of the downstream FortiGate with the upstream FortiGate within a Security Fabric.

What three actions must you take to ensure successful communication? (Choose three.)

Options:

A.

You must authorize the downstream FortiGate on the root FortiGate.

B.

FortiGate must not be in NAT mode.

C.

Ensure TCP port 8013 is not blocked along the way.

D.

You must enable Security Fabric/Fortitelemetry on the receiving interface of the upstream FortiGate.

E.

Ensure the port for Neighbor Discovery has been changed.

Question 3

Refer to the exhibits.

An administrator Is expecting to receive advertised route 8.8.8.8/32 from FGT-A. On FGT-B, they confirm that the route is being advertised and received, however, the route is not being injected into the routing table. What is the most likely cause of this issue?

Options:

A.

A batter route to the 8.8.8.8/32 network exists in the routing table.

B.

FGT-B is configured with a prefix list denying the 8.8.8.8/32 network to be injected into the routing table.

C.

The administrator has misconfigured redistribution of routes on FGT-A.

D.

FGT-B is configured with a distribution list denying the 8.8.8.8/32 network to be injected into the routing table.

Question 4

What are two reasons you might see iprope_in check () check failed, drop when using the debug How? (Choose two.)

Options:

A.

The packet was dropped because it is not allowed by any firewall policy.

B.

The packet was dropped because there is no route to the source.

C.

The packet was dropped because the trusted host list is misconfigured

D.

The packet was dropped because the requested service is not enabled on FortiGate

Question 5

The local OSPF router is unable to establish adjacency with a peer.

Which two things should the administrator do to troubleshoot the issue? (Choose two.)

Options:

A.

Check if both peers have an IP address within the same subnet.

B.

Check if IP protocol 89 is blocked.

C.

Check if TCP port 179 is blocked.

D.

Check if there is an active static route to the peer.

Question 6

Refer to the exhibits,

which show the configuration on FortiGate and partial session information for internet traffic from a user on the internal network. If the priority on route ID 2 were changed from 10 to 0, what would happen to traffic matching that user session? (Choose one answer)

Options:

A.

The session would be deleted, and the client would need to start a new session.

B.

The session would remain in the session table, but its traffic would now egress from both port1 and port2.

C.

The session would remain in the session table, and its traffic would egress from port2.

D.

The session would remain in the session table, and its traffic would egress from port1.

Question 7

In IKEv2, which exchange establishes the first CHILD_SA?

Options:

A.

IKE_SA_INIT

B.

INFORMATIONAL

C.

CREATE_CHILD_SA

D.

IKE_AUTH

Question 8

An administrator wants to capture encrypted phase 2 traffic between two FotiGate devices using the built-in sniffer.

If the administrator knows that there Is no NAT device located between both FortiGate devices, which command should the administrator run?

Options:

A.

diagnose sniffer packet any ' udp port 500 '

B.

diagnose sniffer packet any ' lp proto 50 '

C.

diagnose sniffer packet any ' udp port 4500 '

D.

diagnose sniffer packet any ' ah '

Question 9

Refer to the exhibits.

An OSPF peer is advertising route 172.16.52.0/24. The local FortiGate is configured with an inbound distribution list that allows the 172.16.0.0/16 network to be injected into its routing table. However, the 1 ' 2.16.52.0/24 subnet cannot be seen in the FIB.

Which two stops can the administrator of the local FortiGate take to ensure that the advertised 172.16. 52.0/24 subnet will be injected into the routing table? (Choose two.)

Options:

A.

Add another entry to the prefix list to specifically allow the 172.16.52.0/24 network.

B.

Change the ge value to 17.

C.

Change the R- value lo 16.

D.

Modify the default prefix-list behavior from implicit deny to implicit allow.

Question 10

When FortiGate enters conserve mode because of memory pressure, which action can FortiGate perform to preserve memory?

Options:

A.

FortiGate automatically reboots to clear memory and restore full operation.

B.

FortiGate switches to a less memory-intensive inspection mode, such as flow-based inspection.

C.

FortiGate reduces or stops non-essential processes like logging and antivirus scanning.

D.

FortiGate begins dropping all new sessions to protect resources.

Question 11

Exhibit.

Refer to the exhibit, which shows the output of a diagnose command.

What can you conclude about the debug output in this scenario?

Options:

A.

The first server provided to FortiGate when it performed a DNS query looking for a list of rating servers, was 121.111.236.179.

B.

There is a natural correlation between the value in the FortiGuard-requests field and the value in the Weight field.

C.

FortiGate used 64.26.151.37 as the initial server to validate its contract.

D.

Servers with a negative TZ value are less preferred for rating requests.

Question 12

Which two observations can you make from the output? (Choose two.)

Options:

A.

The configuration was backed up

B.

A high availability (HA) failover occurred.

C.

The lest was unsuccessful.

D.

The automation stitch test is not being logged.

Question 13

Refer to the exhibit.

An IPsec VPN tunnel is dropping, as shown by the debug output.

Analyzing the debug output, what could be causing the tunnel to go down?

Options:

A.

Phase 2 drops but Phase 1 is up.

B.

Dead Peer Detection is not receiving its acknowledge packet.

C.

The tunnel drops during rekey negotiation.

D.

The tunnel drops after the timer expires.

Question 14

Which Iwo troubleshooting steps should you perform lf you encounter issues with intermittent web filter behavior? (Choose two.)

Options:

A.

Check that the inspection mode configured for the web filter profile matches that of the firewall policy where it is applied.

B.

Check that FortiGate is not entering conserve mode.

C.

Check that the correct port is mapped to HTTP in the Protocol Options

D.

Check that the communication between FortiGate and FortiGuard is stable

Question 15

Refer to the exhibit, which shows the output of diagnose sys session list.

If the HA ID for the primary device is 0, what happens if the primary fails and the secondary becomes the primary?

Options:

A.

The secondary device has this session synchronized; however, because application control is applied, the session is marked dirty and has to be re-evaluated after failover.

B.

Traffic for this session continues to be permitted on the new primary device after failover, without requiring the client to restart the session with the server.

C.

The session will be removed from the session table of the secondary device because of the presence of allowed error packets, which will force the client to restart the session with the server.

D.

The session state is preserved but the kernel will need to re-evaluate the session because NAT was applied.

Question 16

Refer to the exhibit, which shows the output of a diagnose command.

What two conclusions can you draw from the output shown in the exhibit? (Choose two answers)

Options:

A.

This is an expected session created by the IPS engine.

B.

Traffic in the original direction (coming from the IP address 10.171.121.38) will be routed to the next-hop IP address 10.0.1.10.

C.

Traffic in the original direction (coming from the IP address 10.171.121.38) will be routed to the next-hop IP address 10.200.1.1.

D.

This is a pinhole session created to allow traffic for a protocol that requires additional sessions to operate through FortiGate.

Question 17

Refer to the exhibit, which shows the output of a real-time debug. Which statement about this output is true? (Choose one answer)

Options:

A.

The server hostname was extracted from the SNI in the client request, or from the CN in the server certificate.

B.

FortiGate found the requested URL in its local cache.

C.

This web request was inspected using the ftgd-allow web filter profile.

D.

The requested URL belongs to category ID 255.

Question 18

Refer to the exhibit, which shows the output of a policy route table entry.

Which type of policy route does the output show?

Options:

A.

An ISDB route

B.

A regular policy route

C.

A regular policy route, which is associated with an active static route in the FIB

D.

An SD-WAN rule

Question 19

Refer to the exhibit, which shows the partial output of a real-time OSPF debug.

Why are the two FortiGate devices unable to form an adjacency?

Options:

A.

The Hello packet is being sent from an OSPF router with ID 0.0.0.112.

B.

The two FortiGate devices attempting adjacency are in area 0.0.0.0.

C.

One FortiGate device is configured to require authentication, while the other is not.

D.

The passwords on the FortiGate devices do not match.

Question 20

Refer to the exhibit.

Assuming a default configuration, which three statements are true? (Choose three.)

Options:

A.

Strict RPF is enabled by default.

B.

User B: Fail. There is no route to 95.56.234.24 using wan2 in the routing table.

C.

User A: Pass. The default static route through wan1 passes the RPF check regardless of the source IP address.

D.

User B: Pass. FortiGate will use asymmetric routing using wan1 to reply to traffic for 95.56.234.24.

E.

User C: Fail. There is no route to 10.0.4.63 using port1 in the touting table.

Question 21

Refer to the exhibit, which shows a truncated output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two.)

Options:

A.

The name of the configured LDAP server is Lab.

B.

The user is authenticating using CN=John Smith.

C.

FortiOS is able to locate the user in step 3 (Bind Request) of the LDAP authentication process.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Question 22

Refer to the exhibit showing a debug output.

An administrator deployed FSSO in DC Agent Mode but FSSO is failing on FortiGate. Pinging FortiGate from where the collector agent is deployed is successful.

The administrator then produces the debug output shown in the exhibit.

What could be causing this error message?

Options:

A.

The TCP port 445 is blocked between FortiGate and collector agent.

B.

The collector agent preshared password is mismatched.

C.

The FortiGate cannot resolve the active directory server name.

D.

The FortiGate and the collector agent are using different TCP ports.

Question 23

Consider the scenario where the server name indication (SNI) does not match either the common name (CN) or any of the subject alternative names (SAN) in the server certificate. Which two actions will FortiGate take when using the default settings for SSL certificate inspection? (Choose two answers)

Options:

A.

FortiGate uses the SNI from the user ' s web browser.

B.

FortiGate does not decrypt the traffic if the traffic is blocked by the web filter profile.

C.

FortiGate uses the CN information from the Subject field in the server certificate.

D.

FortiGate does not decrypt the traffic if the traffic is allowed by the web filter profile.

Question 24

Which statement about IKEv2 is true?

Options:

A.

Both IKEv1 and IKEv2 share the feature of asymmetric authentication.

B.

IKEv1 and IKEv2 have enough of the header format in common that both versions can run over the same UDP port.

C.

IKEv1 and IKEv2 use the same TCP port but run on different UDP ports.

D.

IKEv1 and IKEv2 share the concept of phase1 and phase2.

Question 25

Refer to the exhibit.

The output of the command diagnose vpn tunnels liar is shown.

Which two statements accurately describe the status of the tunnel? (Choose two.)

Options:

A.

Phase 2 is down

B.

Phase 1 is down.

C.

There is currently no traffic traversing the tunnel

D.

Both Phase 1 and Phase 2 were negotiated successfully.

Question 26

Refer to the exhibit.

Which Iwo statements about FortiGate behavior relating to this session are correct? (Choose two.)

Options:

A.

FortiGate is performing a security profile inspection using the CPU.

B.

FortiGate redirected the client to trio captive portal to authenticate so that a correct policy match could be made

C.

FortiGate either initiated the session or the session terminates at FortiGate.

D.

FortiGate forwarded this session without any inspection.

Question 27

Which Iwo actions does FortiGate take after an administrator enables the auxiliary session selling? (Choose two.)

Options:

A.

FortiGate only offloads auxiliary sessions.

B.

FortiGate accelerates all ECMP traffic to the NP6 processor

C.

FortiGates creates a now auxiliary session for each packet it receives.

D.

FortiGate creates two sessions in case of a routing change.

Question 28

Exhibit.

Refer to the exhibit, which contains a screenshot of some phase 1 settings.

The VPN is not up. To diagnose the issue, the administrator enters the following CLI commands on an SSH session on FortiGate:

However, the IKE real-time debug does not show any output. Why?

Options:

A.

The administrator must also run the command diagnose debug enable.

B.

The debug shows only error messages. If there is no output, then the phase 1 and phase 2 configurations match.

C.

The log-filter setting is incorrect. The VPN traffic does not match this filter.

D.

Replace diagnose debug application ike -1 with diagnose debug application ipsec -1.

Question 29

Refer to the exhibit, which shows the output of a debug command.

Which two statements about the output are true? (Choose two.)

Options:

A.

The interlace is part of the OSPF backbone area.

B.

There are a total of five OSPF routers attached to the vorz4 network segment

C.

One of the neighbors has a router ID of 0.0.0.4.

D.

In the network connected to port4, two OSPF routers are down.

Question 30

Exhibit.

Refer to the exhibit, which shows a partial web fillet profile configuration.

Which action does FortiGate lake if a user attempts to access dropbox. com, which is categorized as File Sharing and Storage?

Options:

A.

FortiGate allows the connection, based on the URL Filter configuration.

B.

FortiGate blocks the connection as an invalid URL.

C.

FortiGate exempts the connection, based on the Web Content Filter configuration.

D.

FortiGate blocks the connection, based on the FortiGuard category based filter configuration.

Question 31

Refer to the exhibit.

A network topology and a partial routing table are shown.

FortiGate has already been configured with a firewall policy that allows all ICMP traffic to flow from port1 to port3.

Which two changes can the administrator perform to ensure the server at 10.4.0.1/24 receives the ICMP echo reply from the laptop at 10.1.0.1/24? (Choose two.)

Options:

A.

Enable asymmetric routing under config system settings.

B.

Change the FortiGate configuration from strict RPF check mode to feasible RPF check mode.

C.

Modify the default gateway on the laptop from 10.1.0.2 to 10.1.0.254.

D.

Add a default static route on FortiGate to forward all traffic to port3.

Question 32

Refer to the exhibit, which shows a partial output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two.)

Options:

A.

The user was found in the LDAP tree, whose root is TAC.ottawa.fortinet.com.

B.

FortiOS performs a bind to the LDAP server using the user ' s credentials.

C.

FortiOS collects the user group information.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Question 33

Refer to the exhibit.

Partial output of a real-time OSPF debug is shown.

Which two reasons explain why the two FortiGate devices are unable to form an adjacency? (Choose two.)

Options:

A.

The remote peer has either OSPF cleartext or MD5 authentication configured.

B.

There is an OSPF authentication configuration mismatch.

C.

The local FortiGate does not have OSPF authentication configured

D.

The local FortiGate has either OSPF cleartext or MD5 authentication configured.

Question 34

Which two statements about application-layer test commands are true? (Choose two answers)

Options:

A.

Some of them display statistics and configuration information about a feature or process.

B.

Some of them display real-time application debugs.

C.

Some of them display output only after you run the diagnose debug console enable command.

D.

Some of them can be used to restart an application.

Question 35

What can cause an IKEv2 tunnel to go down after it was initially brought up successfully?

Options:

A.

Mismatched traffic selectors (phase 2 / “quick-mode selectors”) were detected during the CREATE_CHILD_SA exchange.

B.

A mismatched proposal was detected during the IKE_AUTH exchange.

C.

A mismatched pre-shared key was detected during the IKE_AUTH exchange.

D.

A mismatched Diffie-Hellman group was detected during the IKE_SA_INIT exchange.

Question 36

Refer to the exhibit.

Which three pieces of information does the diagnose sys top command provide? (Choose three.)

Options:

A.

The miglogd daemon is running on CPU core ID 0.

B.

The diagnose sys top command has been running for 18 minutes.

C.

The miglogd daemon would be on top of the list, if the administrator pressed m on the keyboard.

D.

The cmdbsvr process is occupying 2.4% of the total user memory space.

E.

If the neweli daemon continues to be in the R state, it will need to be manually restarted.

Question 37

During the SAML negotiation process, in which section does the Identity Provider (IdP) provide the SAML attributes used in the authentication process to the Service Provider (SP)?

Options:

A.

Bindings HTTP post

B.

Assertion dump

C.

Authentication request

D.

Authentication response

Question 38

Which statement about parallel path processing is correct (PPP)?

Options:

A.

PPP chooses from a group of parallel options lo identity the optimal path tor processing a packet.

B.

Only FortiGate hardware configurations affect the path that a packet takes.

C.

PPP does not apply to packets that are part of an already established session.

D.

Software configuration has no impact on PPP.

Question 39

What is an accurate description of LDAP authentication using the regular bind type?

Options:

A.

The regular bind requires the client to send the full distinguished name (ON).

B.

The regular bind type is the easiest bind type to configure on ForbOS.

C.

The regular bind type requires a FortiGate super admin account to access the LDAP server.

D.

It is not often used as a bind type