New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Fortinet FCSS_SDW_AR-7.6 Dumps Questions Answers

FCSS - SD-WAN 7.6 Architect Questions and Answers

Question 1

Refer to the exhibits, which show the configuration of an SD-WAN rule and the corresponding rule status and routing table.

The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule.

Based on the exhibits, what can the administrator expect for traffic matching the SD-WAN rule?

Options:

A.

The traffic will be routed over HUB1-VPN3.

B.

The traffic will be routed over HUB1-VPN2

C.

The traffic will be routed over HUB1-VPN1.

D.

The traffic will be load balanced across all three overlays

Buy Now
Question 2

Refer to the exhibits.

The exhibits show the SD-WAN zone configuration of an SD-WAN template prepared on FortiManager and the policy package configuration.

When the administrator tries to install the configuration changes, FortiManager fails to commit.

What should the administrator do to fix the issue?

Options:

A.

Configure branch1_fgt as the installation target for policy 3.

B.

Configure HUB1 as the destination of policy 3.

C.

Configure a normalized interface for the IPsec tunnel HUB1-VPN1.

D.

Configure both HUB1-VPN1 and HUB1-VPN2 as the destination of policy 3

Question 3

(Refer to the exhibits.

You collected the output shown in the exhibits and want to know which interface HTTP traffic will flow through from the user device 10.0.1.101 to the corporate web server 10.0.0.126. All SD-WAN links are stable.

Which interface will FortiGate use to steer the traffic? Choose one answer.)

Options:

A.

Only HUB1-VPN3

B.

Only HUB1-VPN2

C.

Either HUB1-VPN2 or HUB1-VPN3

D.

Either HUB1-VPN1, HUB1-VPN2, or HUB1-VPN3

Question 4

The administrator uses the FortiManager SD-WAN overlay template to prepare an SD-WAN deployment. Using information provided through the SD-WAN overlay template wizard, FortiManager creates templates ready to install on the spoke and hub devices.

What are the three templates created by the SD-WAN overlay template for a spoke device? (Choose three.)

Options:

A.

Static route template

B.

Rules template

C.

CLI template

D.

BGP template

E.

IPsec tunnel template

Question 5

(You want FortiGate to use SD-WAN rules to steer ping local-out traffic.

Which two constraints should you consider? Choose two answers.)

Options:

A.

You can steer local-out traffic only with SD-WAN rules that use the manual strategy.

B.

By default, FortiGate uses SD-WAN rules only for local-out traffic that corresponds to ping and traceroute.

C.

By default, local-out traffic does not use SD-WAN.

D.

You must configure each local-out feature individually to use SD-WAN.

Question 6

Refer to the exhibit that shows event logs on FortiGate.

Based on the output shown in the exhibit, what can you say about the tunnels on this device?

Options:

A.

The master tunnel HU82-VPN3 cannot accept ADVPN shortcuts.

B.

The device steers voice traffic through the VPN tunnel HUB1-VPN3.

C.

The VPN tunnel HUB1-VPN1_0 is a shortcut tunnel.

D.

There is one shortcut tunnel built from master tunnel VPN4.

Question 7

Refer to the exhibits.

The exhibits show an SD-WAN event log, the member status, and the SD-WAN rule configuration.

Which two conclusions can you draw from the information shown? (Choose two.)

Options:

A.

The administrator configured the service ID 1 with the highest priority member for port2.

B.

Port2 has a lower latency than port1.

C.

FortiGate updated the outgoing interface list on the rule so it prefers port2.

D.

The administrator configured the SD-WAN rule ID 1 with the default strategy mode.

Question 8

(Refer to the exhibit.

You configure SD-WAN on a standalone FortiGate device.

You want to create an SD-WAN rule that steers traffic related to Facebook and LinkedIn through the less costly internet link.

What must you do to set Facebook and LinkedIn applications as destinations from the GUI? Choose one answer.)

Options:

A.

Enable the visibility of the applications field as destinations of the SD-WAN rule.

B.

In the Internet service field, select Facebook and LinkedIn.

C.

You cannot configure applications as destinations of an SD-WAN rule on a standalone FortiGate device.

D.

Install a license to allow applications as destinations of SD-WAN rules.

Question 9

(In which order does FortiGate consider the following elements during the route lookup process? Choose one answer.)

Options:

A.

SD-WAN rules, ISDB routes, policy routes, BGP routes

B.

Policy routes, SD-WAN rules, Internet Service Database (ISDB) routes, BGP routes

C.

SD-WAN rules, policy routes, static routes, ISDB routes

D.

Policy routes, ISDB routes, SD-WAN rules, static routes

Question 10

(Refer to the exhibit.

Based on the output shown in the exhibit, what can you conclude about the device role and how it handles health checks? Choose one answer.)

Options:

A.

The device is a spoke and it provides embedded health-check measures for each tunnel to the hub.

B.

The device is a spoke and it receives health-check measures for the tunnels of another spoke.

C.

The device is a hub and it receives embedded health-check measures for each tunnel from the spoke.

D.

The device is a hub and it receives health-check measures for the tunnels of a spoke.

Question 11

Refer to the exhibits.

The exhibits show the source NAT (SNAT) global setting. port2 interface settings, and the routing table on FortiGate.

The administrator increases the member priority on port2 to 20.

Upon configuration changes and the receipt of new packets, which two actions does FortiGate perform on existing sessions established over port2? (Choose two.)

Options:

A.

FortiGate continues routing all existing sessions over port2.

B.

FortiGate routes only new sessions over port2.

C.

FortiGate flags the SNAT session as dirty only if the administrator has assigned an IP pool to the firewall policies with NAT.

D.

FortiGate flags the sessions as dirty.

E.

FortiGate updates the gateway information of the sessions with SNAT so that they use port1 instead of port2.

Question 12

Refer to the exhibit.

Which two conclusions can you draw from the output shown? (Choose two.)

Options:

A.

One SD-WAN rule is defined with application categories as the destination.

B.

UDP traffic destined to the subnet 10.22.0.0/24 matches a manual SD-WAN rule.

C.

One SD-WAN rule allows traffic load balancing.

D.

UDP traffic destined to the subnet 10.22.0.0/24 matches a policy route.

Question 13

Refer to the exhibits.

You use FortiManager to configure SD-WAN on three branch devices.

When you install the device settings, FortiManager prompts you with the error “Copy Failed” for the device branch1_fgt. When you click the log button, FortiManager displays the message shown in the exhibit.

There are two different ways to resolve this issue. Based on the exhibits, which methods could you use? (Choose two.)

Options:

A.

Update the management IP address of branch1_fgt.

B.

Specify the gateway of the SD-WAN member port1 with an IP address or use the default value.

C.

Do not define installation targets for SD-WAN members.

D.

Review the per-device mapping configuration for metadata variables

Question 14

The FortiGate devices are managed by ForliManager, and are configured for direct internet access (DIA). You confirm that DIA is working as expected for each branch, and check the SD-WAN zone configuration and firewall policies shown in the exhibits.

Then, you use the SD-WAN overlay template to configure the IPsec overlay tunnels. You create the associated SD-WAN rules to connect existing branches to the company hub device and apply the changes on the branches.

After those changes, users complain that they lost internet access. DIA is no longer working.

Based on the exhibit, which statement best describes the possible root cause of this issue?

Options:

A.

The SD-WAN overlay template defines a zone for each underlay interface and moves the interfaces into those zones.

B.

The SD-WAN overlay template didn’t configure a firewall policy to allow traffic through the overlay.

C.

The SD-WAN overlay template redefines the interface gateway addresses if they are defined with metadata variables.

D.

The SD-WAN overlay template updates the SD-WAN template and the rules.

Question 15

You configured an SD-WAN rule with the best quality strategy and selected the predefined health check, Default_FortiGuard, to check the link performances against FortiGuard servers.

For the quality criteria, you selected Custom-profile-1.

Which factors does FortiGate use, and in which order. to determine the link that it should use to steer the traffic?

Options:

A.

Latency – Member configuration order – Link cost threshold

B.

Link quality index – Member configuration order – Link cost threshold

C.

Links that meet the SLA targets – Member configuration order – Member local cost

D.

Latency – Jitter - Packet loss – Bibandwidth – Member configuration order

Question 16

(Refer to the exhibits.

Two SD-WAN event logs, the member status, the SD-WAN rule configuration, and the health-check configuration for a FortiGate device are shown.

Immediately after the log messages are displayed, how will the FortiGate steer the traffic based on the information shown in the exhibits? Choose one answer.)

Options:

A.

FortiGate skips SD-WAN rule ID 1.

B.

FortiGate uses port2 to steer the traffic for SD-WAN rule ID 1.

C.

FortiGate uses port1 to steer the traffic for SD-WAN rule ID 1.

D.

FortiGate uses port1 or port2 to steer the traffic for SD-WAN rule ID 1.

Question 17

Refer to the exhibit.

An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network.

The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over HUB1-VPN1. However, the traffic is routed over HUB1-VPN3.

Based on the output shown in the exhibit, which two reasons, individually or together, could explain the observed behavior? (Choose two.)

Options:

A.

HUB1-VPN3 has a higher member configuration priority than HUB1-VPN1.

B.

The traffic matches a regular policy route configured with HUB1-VPN3 as the outgoing device

C.

HUB1-VPN1 does not have a valid route to the destination

D.

HUB1-VPN3 has a lower route priority value (higher priority) than HUB1-VPN1.

Question 18

Refer to the exhibit.

Which statement best describe the role of the ADVPN device in handling traffic?

Options:

A.

This is a spoke that has received a direct shortcut query from a remote spoke.

B.

This is a hub, and two spokes, 192.2.0.1 and 10.0.3.101, establish a shortcut.

C.

This is a hub that has received a shortcut query from a spoke and has forwarded it to another spoke.

D.

This is a spoke that has received a shortcut query from a remote hub.

Question 19

(Refer to the exhibit.

An SD-WAN zone configuration on the FortiGate GUI is shown.

What can you conclude about the zone and member configuration on this device? Choose one answer.)

Options:

A.

You can delete the virtual-wan-link zone.

B.

The WAN2 zone contains no member.

C.

You can delete the WAN1 zone.

D.

You can add the member B-125 to the WAN3 zone and keep it as a member of the Test zone.

Question 20

(You want to configure two static routes: one that references an SD-WAN zone and a second one that references an SD-WAN member that belongs to that zone.

Which statement about this scenario is true? Choose one answer.)

Options:

A.

You cannot create static routes for individual SD-WAN members.

B.

You cannot create static routes that reference an SD-WAN zone.

C.

The destination subnets must be different.

D.

The source subnets must be different.

Question 21

(In the context of SD-WAN, the terms underlay and overlay are commonly used to categorize links.

Which two statements about underlay and overlay links are correct? Choose two answers.)

Options:

A.

A VLAN is a type of overlay link.

B.

Overlay links provide routing flexibility.

C.

FortiLink interface is considered an underlay link.

D.

Wireless connections can be used to build overlay links.

E.

Only wired connections can be used as underlay links.

Question 22

(Refer to the exhibit.

What can you conclude from the output shown? Choose one answer.)

Options:

A.

It is a spoke device. SD-WAN rule 3 is configured with nine members.

B.

It is a spoke device. The members of SD-WAN rule 3 are grouped into two zones.

C.

It is a hub device. It allowed the establishment of three auto-discovery VPN (ADVPN) shortcuts.

D.

It is a spoke device. SD-WAN rule 4 allows three shortcut tunnels.

Question 23

Refer to the exhibits.

You use FortiManager to configure SD-WAN on three branch devices.

When you install the device settings. FortiManager prompts you with the error "Copy Failed" for the device branch1_fat When you click the log button. FortiManager displays the message shown in the exhibit.

Options:

A.

Based on the exhibits, which statement best describes the issue and how you can resolve it?

B.

Remove the installation target for the SD-WAN member port4. You cannot combine metadata variable and installation targets.

C.

Gateways for all members in a zone must be defined the same way. Specify the gateway of the SD-WAN member port! without metadata variables.

D.

Check the metadata variable definitions, and review the per-device mapping configuration.

E.

Check the connection between branch1_fgt and FortiManager

Question 24

(Refer to the exhibit.

The event log on a FortiGate device is shown.

Based on the output shown in the exhibit, what can you conclude about the tunnels on this device? (Choose one answer))

Options:

A.

There is one shortcut tunnel built from the master tunnel VPN4.

B.

The voice traffic is steered through the VPN tunnel HUB1-VPN3.

C.

The VPN tunnel HUB1-VPN1_0 is a shortcut tunnel.

D.

The master tunnel HUB2-VPN3 cannot accept Auto-Discovery VPN (ADVPN) shortcuts.

Question 25

Which three factors about SLA targets and SD-WAN rules should you consider when configuring SD-WAN rules? (Choose three.)

Options:

A.

Member metrics are measured only if a rule uses the SLA target.

B.

SLA targets are used only by SD-WAN rules that are configured with a Lowest Cost (SLA) strategy.

C.

SD-WAN rules can use SLA targets to check whether the preferred members meet the SLA requirements.

D.

When configuring an SD-WAN rule, you can select multiple SLA targets if they are from the same performance SLA.

E.

When configuring an SD-WAN rule, you can select multiple SLA targets from different performance SLAs.

Question 26

Your FortiGate is in production. To optimize WAN link use and improve redundancy, you enable and configure SD-WAN.

What must you do as part of this configuration update process?

Options:

A.

Replace references to interfaces used as SD-WAN members in the routing configuration.

B.

Purchase and install the SD-WAN license, and reboot the FortiGate device.

C.

Replace references to interfaces used as SD-WAN members in the firewall policies.

D.

Disable the interface that you want to use as an SD-WAN member.

Question 27

Exhibit.

The administrator configured the IPsec tunnel VPN1 on a FortiGate device with the parameters shown in exhibit.

Based on the configuration, which three conclusions can you draw about the characteristics and requirements of the VPN tunnel? (Choose three.)

Options:

A.

The tunnel interface IP address on the spoke side is provided by the hub.

B.

The remote end can be a third-party IPsec device.

C.

The administrator must manually assign the tunnel interface IP address on the hub side

D.

The remote end must support IKEv2.

E.

This configuration allows user-defined overlay IP addresses.

Question 28

Refer to the exhibit.

An administrator checks the status of an SD-WAN topology using the FortiManager SD-WAN monitor menus. All members are configured with one or two SLAs.

Which two conclusions can you draw from the output shown? (Choose two.)

Options:

A.

The template view should be used to see the hub devices.

B.

One member of branch2_fgt is missing the SLAs.

C.

branch2_fgt establishes six tunnels to the hubs and they are all up.

D.

This SD-WAN topology contains only two branch devices.