Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Fortinet FCSS_SDW_AR-7.4 Actual Questions

FCSS - SD-WAN 7.4 Architect Questions and Answers

Question 5

Exhibit.

For your ZTP deployment, you review the CSV file shown in exhibit and note that it is missing important information. Which two elements must you change before you can import it into FortiManager? (Choose two.)

Options:

A.

You must associate a device blueprint with each device

B.

You must define a name for each device

C.

You must define a value for each device and each metadata variable that defines an IP address.

D.

You must define a value for each device and each user-defined metadata variable.

Question 6

Refer to the exhibit.

An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network.

The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over HUB1-VPN1. However, the traffic is routed over HUB1-VPN3.

Based on the output shown in the exhibit, which two reasons, individually or together, could explain the observed behavior? (Choose two.)

Options:

A.

HUB1-VPN3 has a higher member configuration priority than HUB1-VPN1.

B.

The traffic matches a regular policy route configured with HUB1-VPN3 as the outgoing device

C.

HUB1-VPN1 does not have a valid route to the destination

D.

HUB1-VPN3 has a lower route priority value (higher priority) than HUB1-VPN1.

Question 7

SD-WAN interacts with many other FortiGate features. Some of them are required to allow SD-WAN to steer the traffic.

Which three configuration elements that you must configure before FortiGate can steer traffic according to SD-WAN rules? (Choose three.)

Options:

A.

Firewall policies

B.

Interfaces

C.

Security profiles

D.

Traffic shaping

E.

Routing

Question 8

Which three characteristics apply to provisioning templates available on FortiManager? (Choose three.)

Options:

A.

A template group can include a system template and an SD-WAN template.

B.

Each template group can contain up to three IPsec tunnel templates.

C.

CLI templates are applied in order, from top to bottom

D.

A CLI template group can contain CLI templates of both types.

E.

A CLI template can be of type CLI script or Perl script.