Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which two pieces of information are synchronized between FortiGate HA members? (Choose two.)

A.

OSPF adjacencies

B.

IPsec security associations

C.

BGP peerings

D.

DHCP leases

Full Access
Question # 5

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.

Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)

A.

Allow & Warning

B.

Trust & Allow

C.

Allow

D.

Block & Warning

E.

Block

Full Access
Question # 6

A network administrator has configured an SSL/SSH inspection profile defined for full SSL inspection and set with a private CA certificate. The firewall policy that allows the traffic uses this profile for SSL inspection and performs web filtering. When visiting any HTTPS websites, the browser reports certificate warning errors.

What is the reason for the certificate warning errors?

A.

The SSL cipher compliance option is not enabled on the SSL inspection profile. This setting is required when the SSL inspection profile is defined with a private CA certificate.

B.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

C.

The browser does not recognize the certificate in use as signed by a trusted CA.

D.

With full SSL inspection it is not possible to avoid certificate warning errors at the browser level.

Full Access
Question # 7

FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively.

Which two statements are true about the requirements of connected physical interfaces on FortiGate? (Choose two.)

A.

Both interfaces must have the interface role assigned

B.

Both interfaces must have directly connected routes on the routing table

C.

Both interfaces must have DHCP enabled

D.

Both interfaces must have IP addresses assigned

Full Access
Question # 8

What are two features of collector agent advanced mode? (Choose two.)

A.

In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.

B.

Advanced mode supports nested or inherited groups.

C.

In advanced mode, security profiles can be applied only to user groups, not individual users.

D.

Advanced mode uses the Windows convention —NetBios: Domain\Username.

Full Access
Question # 9

FortiGate is integrated with FortiAnalyzer and FortiManager.

When a firewall policy is created, which attribute is added to the policy to improve functionality and to support recording logs to FortiAnalyzer or FortiManager?

A.

Log ID

B.

Policy ID

C.

Sequence ID

D.

Universally Unique Identifier

Full Access
Question # 10

A FortiGate administrator is required to reduce the attack surface on the SSL VPN portal.

Which SSL timer can you use to mitigate a denial of service (DoS) attack?

A.

SSL VPN dcls-hello-timeout

B.

SSL VPN http-request-header-timeout

C.

SSL VPN login-timeout

D.

SSL VPN idle-timeout

Full Access
Question # 11

Which two statements are true about the FGCP protocol? (Choose two.)

A.

FGCP is not used when FortiGate is in transparent mode

B.

FGCP elects the primary FortiGate device

C.

FGCP is used to discover FortiGate devices in different HA groups

D.

FGCP runs only over the heartbeat links

Full Access
Question # 12

Refer to the exhibits, which show the system performance output and the default configuration of high memory usage thresholds in a FortiGate.

Based on the system performance output, what can be the two possible outcomes? (Choose two.)

A.

FortiGate will start sending all files to FortiSandbox for inspection.

B.

FortiGate has entered conserve mode.

C.

Administrators cannot change the configuration.

D.

Administrators can access FortiGate onlythrough the console port.

Full Access
Question # 13

Which statement is a characteristic of automation stitches?

A.

They can be run only on devices in the Security Fabric.

B.

They can be created only on downstream devices in the fabric.

C.

They can have one or more triggers.

D.

They can run multiple actions at the same time.

Full Access
Question # 14

Refer to the exhibit, which shows the IPS sensor configuration.

If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)

A.

The sensor will gather a packet log for all matched traffic.

B.

The sensor will reset all connections that match these signatures.

C.

The sensor will allow attackers matching the Microsoft.Windows.iSCSl.Target.DoS signature.

D.

The sensor will block all attacks aimed at Windows servers.

Full Access
Question # 15

A FortiGate firewall policy is configured with active authentication however, the user cannot authenticate when accessing a website.

Which protocol must FortiGate allow even though the user cannot authenticate?

A.

ICMP

B.

DNS

C.

DHCP

D.

LDAP

Full Access
Question # 16

Refer to the exhibits.

The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details.

Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.

B.

Apple FaceTime will be allowed, based on the Apple filter configuration.

C.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.

D.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.

Full Access
Question # 17

Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?

A.

Internet Service Database (ISDB) engine

B.

Intrusion prevention system engine

C.

Antivirus engine

D.

Application control engine

Full Access
Question # 18

Which statement is correct regarding the use of application control for inspecting web applications?

A.

Application control can identify child and parent applications, and perform different actions on them

B.

Application control signatures are included in Fortinet Antivirus engine

C.

Application control does not display a replacement message for a blocked web application

D.

Application control does not require SSL Inspection to Identity web applications

Full Access
Question # 19

Which two statements explain antivirus scanning modes? (Choose two.)

A.

In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.

B.

In flow-based inspection mode files bigger than the buffer size are scanned

C.

In proxy-based inspection mode files bigger than the buffer size are scanned

D.

In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client

Full Access
Question # 20

Refer to the exhibit showing a debug flow output.

What two conclusions can you make from the debug flow output? (Choose two.)

A.

The debug flow is for ICMP traffic.

B.

A firewall policy allowed the connection.

C.

A new traffic session was created.

D.

The default route is required to receive a reply.

Full Access
Question # 21

Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

A.

Enable the parameter Never Timeout in the admin profiles

B.

Increase the admintimeout value under config system accprofile super_admin.

C.

Increase the admintimeout value under config system global

D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Full Access
Question # 22

Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.)

A.

The client FortiGate requires the SSL VPN tunnel interface type to connect SSL VPN.

B.

The server FortiGate requires a CA certificate to verify the client FortiGate certificate.

C.

The client FortiGate requires a client certificate signed by the CA on the server FortiGate.

D.

The client FortiGate requires a manually added route to remote subnets.

Full Access
Question # 23

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.

Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

A.

On HQ-FortiGate, disable Diffie-Helman group 2.

B.

On Remote-FortiGate, set port2 as Interface.

C.

On both FortiGate devices, set Dead Peer Detection to On Demand.

D.

On HQ-FortiGate, set IKE mode to Main (ID protection).

Full Access
Question # 24

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Full Access
Question # 25

Which three methods are used by the collector agent for AD polling? (Choose three.)

A.

WinSecLog

B.

WMI

C.

NetAPI

D.

FSSO REST API

E.

FortiGate polling

Full Access
Question # 26

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

B.

The browser does not trust the certificate used by FortiGate for SSL inspection

C.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

D.

The matching firewall policy is set to proxy inspection mode

Full Access