New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Fortinet Network Security Expert NSE7_CDS_AR-7.6 Fortinet Study Notes

Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect Questions and Answers

Question 9

Refer to the exhibit.

Your team notices an unusually high volume of traffic sourced at one of the organizations FortiGate EC2 instances. They create a flow log to obtain and analyze detailed information about this traffic. However, when they checked the log, they found that it included traffic that was not associated with the FortiGate instance in question.

What can they do to obtain the correct logs? (Choose one answer)

Options:

A.

Create a new flow log at the interface level.

B.

Change the maximum aggregation time to 1 minute.

C.

Ensure that the flow log data is not mixed with the rest of the traffic.

D.

Send the logs to Amazon Data Firehose instead to get more granular information.

Question 10

An administrator implements FortiWeb ingress controller to protect containerized web applications in an AWS Elastic Kubernetes Service (EKS) cluster.

What can you conclude about the topology shown in FortiView?

Options:

A.

The FortiWeb VM gets the latest cluster information through an SDN connector.

B.

This topology has two services and two ingress controllers deployed.

C.

Both services will be load balanced among the two nodes and the four pods.

D.

Adding a new service will update the FortiWeb configuration automatically.

Question 11

Refer to the exhibit.

A FortiCNAPP administrator used the FortiCNAPP Explorer to reveal all hosts exposed to the internet that are running active packages with vulnerabilities of all severity levels. Why do only the first two results have an attack path? (Choose one answer)

Options:

A.

Attack paths are available only for AWS resources with public IP addresses.

B.

Attack paths are available only for AWS resources with high impact scores.

C.

Attack paths are available only for resources with potential multi-hop exposure.

D.

Attack paths are available only for resources that have critical vulnerabilities.

Question 12

Refer to the exhibit.

After the initial Terraform configuration in Microsoft Azure, the terraform plan command is run.

Which two statements about running the terraform plan command are true? (Choose two.)

Options:

A.

The terraform plan command will deploy the rest of the resources except the service principle details.

B.

You cannot run the terraform apply command before the terraform plan command.

C.

The terraform plan command makes terraform do a dry run.

D.

You must run the terraform init command once, before the terraform plan command.