Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which inspection mode does FortiGate use for application profiles if it is configured as a profile-based next-generation firewall (NGFW)?

A.

Full content inspection

B.

Proxy-based inspection

C.

Certificate inspection

D.

Flow-based inspection

Full Access
Question # 5

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, as well as the IP pool configuration and firewall policy objects.

The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IPaddress 10.0.1.254/24.

Which IP address will be used to source NAT (SNAT) the traffic, if the user on Local-Client (10.0.1.10) pings the IP address of Remote-FortiGate (10.200.3.1)?

A.

10.200.1.1

B.

10.200.1.149

C.

10.200.1.99

D.

10.200.1.49

Full Access
Question # 6

An administrator manages a FortiGate model that supports NTurbo.

How does NTurbo enhance performance for flow-based inspection?

A.

NTurbo offloads traffic to the content processor.

B.

NTurbo creates two inspection sessions on the FortiGate device.

C.

NTurbo buffers the whole file and then sends it to the antivirus engine.

D.

NTurbo creates a special data path to redirect traffic between the IPS engine its ingress and egress interfaces.

Full Access
Question # 7

Refer to the exhibit to view the firewall policy.

Why would the firewall policy not block a well-known virus, for example eicar?

A.

The action on the firewall policy is not set to deny.

B.

The firewall policy is not configured in proxy-based inspection mode.

C.

Web filter is not enabled on the firewall policy to complement the antivirus profile.

D.

The firewall policy does not apply deep content inspection.

Full Access
Question # 8

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration.

An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2.

The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver.

Which two configuration changes can the administrator make to the policy to deny Webserver access for Remote-User2? (Choose two.)

A.

Enable match-vip in the Deny policy.

B.

Set the Destination address as Webserver in the Deny policy.

C.

Disable match-vip in the Deny policy.

D.

Set the Destination address as Deny_IP in the Allow_access policy.

Full Access
Question # 9

Which method allows management access to the FortiGate CLI without network connectivity?

A.

SSH console

B.

CLI console widget

C.

Serial console

D.

Telnet console

Full Access
Question # 10

What is the primary FortiGate election process when the HA override setting is disabled?

A.

Connected monitored ports > Priority > System uptime > FortiGate serial number

B.

Connected monitored ports > System uptime > Priority > FortiGate serial number

C.

Connected monitored ports > Priority > HA uptime > FortiGate serial number

D.

Connected monitored ports > HA uptime > Priority > FortiGate serial number

Full Access
Question # 11

Which two statements describe how the RPF check is used? (Choose two.)

A.

The RPF check is run on the first sent packet of any new session.

B.

The RPF check is run on the first reply packet of any new session.

C.

The RPF check is run on the first sent and reply packet of any new session.

D.

The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.

Full Access
Question # 12

An administrator configured a FortiGate to act as a collector for agentless polling mode.

What must the administrator add to the FortiGate device to retrieve AD user group information?

A.

LDAP server

B.

RADIUS server

C.

DHCP server

D.

Windows server

Full Access
Question # 13

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Full Access
Question # 14

A network administrator has configured an SSL/SSH inspection profile defined for full SSL inspection and set with a private CA certificate. The firewall policy that allows the traffic uses this profile for SSL inspection and performs web filtering. When visiting any HTTPS websites, the browser reports certificate warning errors.

What is the reason for the certificate warning errors?

A.

The SSL cipher compliance option is not enabled on the SSL inspection profile. This setting is required when the SSL inspection profile is defined with a private CA certificate.

B.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

C.

The browser does not recognize the certificate in use as signed by a trusted CA.

D.

With full SSL inspection it is not possible to avoid certificate warning errors at the browser level.

Full Access