Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Refer to the exhibits, which show the system performance output and the default configuration of high memory usage thresholds in a FortiGate.

Based on the system performance output, what can be the two possible outcomes? (Choose two.)

A.

FortiGate will start sending all files to FortiSandbox for inspection.

B.

FortiGate has entered conserve mode.

C.

Administrators cannot change the configuration.

D.

Administrators can access FortiGate onlythrough the console port.

Full Access
Question # 5

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

B.

The browser does not trust the certificate used by FortiGate for SSL inspection

C.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

D.

The matching firewall policy is set to proxy inspection mode

Full Access
Question # 6

Refer to the exhibit showing a FortiGuard connection debug output.

Based on the output, which two facts does the administrator know about the FortiGuard connection? (Choose two.)

A.

One server was contacted to retrieve the contract information.

B.

There is at least one server that lost packets consecutively.

C.

A local FortiManaqer is one of the servers FortiGate communicates with.

D.

FortiGate is using default FortiGuard communication settings.

Full Access
Question # 7

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)

A.

The issuer must be a public CA

B.

The CA extension must be set to TRUE

C.

The Authority Key Identifier must be of type SSL

D.

The keyUsage extension must be set to

Full Access
Question # 8

Refer to the exhibits, which show the firewall policy and an antivirus profile configuration.

Why is the user unable to receive a block replacement message when downloading an infected file for the first time?

A.

The intrusion prevention security profile must be enabled when using flow-based inspection mode.

B.

The option to send files to FortiSandbox for inspection is enabled.

C.

The firewall policy performs a full content inspection on the file.

D.

Flow-based inspection is used, which resets the last packet to the user.

Full Access
Question # 9

FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.

Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)

Full Access
Question # 10

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

A.

FortiGate directs the collector agent to use a remote LDAP server.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.

FortiGate does not support workstation check.

D.

FortiGate uses the AD server as the collector agent.

Full Access
Question # 11

Refer to the exhibit showing a debug flow output.

What two conclusions can you make from the debug flow output? (Choose two.)

A.

The debug flow is for ICMP traffic.

B.

A firewall policy allowed the connection.

C.

A new traffic session was created.

D.

The default route is required to receive a reply.

Full Access
Question # 12

Refer to the exhibit.

In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output shown in the exhibit.

What should the administrator do next, to troubleshoot the problem?

A.

Execute a debug flow.

B.

Capture the traffic using an external sniffer connected to part1.

C.

Execute another sniffer on FortiGate, this time with the filter "hose 10.o.1.10".

D.

Run a sniffer on the web server.

Full Access
Question # 13

Refer to the exhibits, which show a diagram of a FortiGate device connected to the network. VIP object configuration, and the firewall policy configuration.

The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IP address 10.0.1.254/24.

If the host 10.200.3.1 sends a TCP SYN packet on port 8080 to 10.200.1.10, what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?

A.

10.0.1.254, 10.200.1.10, and 8080, respectively

B.

10.0.1.254, 10.0.1.10, and 80, respectively

C.

10.200.3.1, 10.0.1.10, and 80, respectively

D.

10.200.3.1, 10.0.1.10, and 8080, respectively

Full Access
Question # 14

Refer to the exhibit to view the firewall policy.

Why would the firewall policy not block a well-known virus, for example eicar?

A.

The action on the firewall policy is not set to deny.

B.

The firewall policy is not configured in proxy-based inspection mode.

C.

Web filter is not enabled on the firewall policy to complement the antivirus profile.

D.

The firewall policy does not apply deep content inspection.

Full Access
Question # 15

Refer to the exhibits.

An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).

What must the administrator do to synchronize the address object?

A.

Change the csf setting on Local-FortiGate (root) to sec fabric-object-unification default.

B.

Change the csf setting on both devices to sec downscream-access enable.

C.

Change the csf setting on ISFW (downstream) to sec auchorizacion-requesc-cype certificace.

D.

Change the csf setting on ISFW (downstream) to sec configuration-sync local.

Full Access
Question # 16

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

A.

Strict RPF checks the best route back to the source using the incoming interface.

B.

Strict RPF allows packets back to sources with all active routes.

C.

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

D.

Strict RPF check is run on the first sent and reply packet of any new session.

Full Access
Question # 17

Which method allows management access to the FortiGate CLI without network connectivity?

A.

SSH console

B.

CLI console widget

C.

Serial console

D.

Telnet console

Full Access
Question # 18

Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?

A.

Internet Service Database (ISDB) engine

B.

Intrusion prevention system engine

C.

Antivirus engine

D.

Application control engine

Full Access
Question # 19

A network administrator has configured an SSL/SSH inspection profile defined for full SSL inspection and set with a private CA certificate. The firewall policy that allows the traffic uses this profile for SSL inspection and performs web filtering. When visiting any HTTPS websites, the browser reports certificate warning errors.

What is the reason for the certificate warning errors?

A.

The SSL cipher compliance option is not enabled on the SSL inspection profile. This setting is required when the SSL inspection profile is defined with a private CA certificate.

B.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

C.

The browser does not recognize the certificate in use as signed by a trusted CA.

D.

With full SSL inspection it is not possible to avoid certificate warning errors at the browser level.

Full Access
Question # 20

Which inspection mode does FortiGate use for application profiles if it is configured as a profile-based next-generation firewall (NGFW)?

A.

Full content inspection

B.

Proxy-based inspection

C.

Certificate inspection

D.

Flow-based inspection

Full Access
Question # 21

Refer to the exhibit, which shows the IPS sensor configuration.

If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)

A.

The sensor will gather a packet log for all matched traffic.

B.

The sensor will reset all connections that match these signatures.

C.

The sensor will allow attackers matching the Microsoft.Windows.iSCSl.Target.DoS signature.

D.

The sensor will block all attacks aimed at Windows servers.

Full Access
Question # 22

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.

Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)

A.

Allow & Warning

B.

Trust & Allow

C.

Allow

D.

Block & Warning

E.

Block

Full Access
Question # 23

Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

A.

Enable the parameter Never Timeout in the admin profiles

B.

Increase the admintimeout value under config system accprofile super_admin.

C.

Increase the admintimeout value under config system global

D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Full Access
Question # 24

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)

A.

Manual with load balancing

B.

Lowest Cost (SLA) with load balancing

C.

Best Quality with load balancing

D.

Lowest Quality (SLA) with load balancing

E.

Lowest Cost (SLA) without load balancing

Full Access
Question # 25

Refer to the exhibits.

The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details.

Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.

B.

Apple FaceTime will be allowed, based on the Apple filter configuration.

C.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.

D.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.

Full Access