Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Network Security FCP_FGT_AD-7.6 Dumps PDF

FortiGate 7.6 Administrator FCP_FGT_AD-7.6 Questions and Answers

Question 13

Which two statements describe characteristics of automation stitches? (Choose two.)

Options:

A.

Actions involve only devices included in the Security Fabric.

B.

An automation stitch can have multiple triggers.

C.

Multiple actions can run in parallel.

D.

Triggers can involve external connectors.

Question 14

You are analyzing connectivity problems caused by intermediate devices blocking traffic in SSL VPN environment.

In which two ways can you effectively resolve the problem? (Choose two.)

Options:

A.

You can turn off IKE fragmentation to fix large certificate negotiation problems.

B.

You should use IPsec to solve issues with fragment drops and large certificate exchanges.

C.

You can use SSL VPN tunnel mode to prevent problems with blocked ESP and UDP ports (500 or 4500).

D.

You can configure a hub-and-spoke topology with SSL VPN tunnels to bypass blocked UDP ports.