Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCSS_EFW_AD-7.6 Questions and Answers

Question # 6

How can FortiGate analyze HTTPS traffic on non-standard port 8443?

A.

Proxy mode

B.

TLS 1.2

C.

Add 443 and 8443 mapping

D.

Enable IPS

Full Access
Question # 7

A vulnerability scan report has revealed that a user has generated traffic to the website example.com (10.10.10.10) using a weak SSL/TLS version supported by the HTTPS web server.

What can the firewall administrator do to block all outdated SSL/TLS versions on any HTTPS web server to prevent possible attacks on user traffic?

A.

Configure the unsupported SSL version and set the minimum allowed SSL version in the HTTPS settings of the SSL/SSH inspection profile.

B.

Enable auto-detection of outdated SSL/TLS versions in the SSL/SSH inspection profile to block vulnerable websites.

C.

Install the required certificate in the client ' s browser or use Active Directory policies to block specific websites as defined in the SSL/SSH inspection profile.

D.

Use the latest certificate, Fortinet_SSL_ECDSA256, and replace the CA certificate in the SSL/SSH inspection profile.

Full Access
Question # 8

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.

C.

Select flow mode in the IPS profile to accurately analyze application patterns.

D.

Set the IPS profile signature action to default to discard all possible false positives.

Full Access
Question # 9

Refer to the exhibit, which shows a partial troubleshooting command output.

An administrator is extensively using IPsec on FortiGate. Many tunnels show information similar to the output shown in the exhibit.

What can the administrator conclude?

A.

IPsec SAs cannot be offloaded.

B.

The two IPsec SAs, inbound and outbound, are copied to the NPU.

C.

Only the outbound IPsec SA is copied to the NPU.

D.

Only the inbound IPsec SA is copied to the NPU.

Full Access
Question # 10

A user reports that their computer was infected with malware after accessing a secured HTTPS website. However, when you check the FortiGate logs, you see that FortiGate did not detect the website as insecure, despite having an SSL certificate and the correct profiles applied on the policy.

How can you ensure that FortiGate can analyze encrypted HTTPS traffic on a website?

A.

Enable full SSL inspection in the SSL/SSH inspection profile to decrypt packets

B.

Set min-allowed-ssl-version to tls-1.2.

C.

Enable server certificate SNI check to protect against unsecured HTTPS websites.

D.

Set inspection-mode to proxy.

Full Access
Question # 11

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

Full Access
Question # 12

An administrator wants to scale the IBGP sessions and optimize the routing table in an IBGP network.

Which parameter should the administrator configure?

A.

network-import-check

B.

ibgp-enforce-multihop

C.

neighbor-group

D.

route-reflector-client

Full Access
Question # 13

Refer to the exhibit, which shows the ADVPN network topology and partial BGP configuration.

Which two parameters must an administrator configure in the config neighbor range for spokes shown in the exhibit? (Choose two.)

A.

set max-neighbor-num 2

B.

set neighbor-group advpn

C.

set route-reflector-client enable

D.

set prefix 172.16.1.0 255.255.255.0

Full Access
Question # 14

How should you adjust MTU values to resolve encapsulation issues?

A.

All interfaces

B.

Wired only

C.

FortiGate only

D.

Controlled environment

Full Access
Question # 15

The IT department discovered during the last network migration that all zero phase selectors in phase 2 IPsec configurations impacted network operations.

What are two valid approaches to prevent this during future migrations? (Choose two.)

A.

Use routing protocols to specify allowed subnets over the tunnel.

B.

Configure an IPsec-aggregate to create redundancy between each firewall peer.

C.

Clearly indicate to the VPN which segments will be encrypted in the phase two selectors.

D.

Configure an IP address on the IPsec interface of each firewall to establish unique peer connections and avoid impacting network operations.

Full Access
Question # 16

Which two options should you consider to scale performance using an additional FortiGate?

A.

FGSP

B.

FGCP Active-Active

C.

VRRP

D.

FGCP Active-Passive

Full Access
Question # 17

Which two recommendations prevent invalid paths when using zero phase 2 selectors?

A.

Routing protocols

B.

Exact selectors

C.

Aggregate IPsec

D.

Assign tunnel IP

Full Access
Question # 18

How can you automate updates to firewall policies using a daily updated IP block list?

A.

Automation stitch

B.

External Feeds

C.

CLI scripts

D.

ZTNA

Full Access
Question # 19

An administrator is designing an ADVPN network for a large enterprise with spokes that have varying numbers of internet links. They want to avoid a high number of routes and peer connections at the hub.

Which method should be used to simplify routing and peer management?

A.

Deploy a full-mesh VPN topology to eliminate hub dependency.

B.

Implement static routing over IPsec interfaces for each spoke.

C.

Use a dynamic routing protocol using loopback interfaces to streamline peers and routes.

D.

Establish a traditional hub-and-spoke VPN topology with policy routes.

Full Access
Question # 20

You are using Virtual eXtensible LAN (VXLAN) extensively on FortiGate. Which specialized acceleration hardware must you use to improve FortiGate performance? (Choose one answer)

A.

NP7

B.

SP5

C.

СР9

D.

NTurbo

Full Access
Question # 21

How do you resolve object conflicts when importing a policy package?

A.

Rename

B.

FortiManager accept

C.

Non-default

D.

Retrieve config

Full Access
Question # 22

Refer to the exhibit.

The partial output of an OSPF command is shown. While checking the OSPF status of FortiGate, you receive the output shown in the exhibit. Based on the output, which two statements about FortiGate are correct? (Choose two answers)

A.

FortiGate has OSPF ECMP enabled.

B.

FortiGate is a backup designated router.

C.

FortiGate injects external routing information.

D.

FortiGate is connected to multiple areas.

Full Access
Question # 23

Which two options integrate an additional FortiGate for scaling?

A.

FGSP

B.

FGCP Active-Active

C.

VRRP

D.

FGCP Active-Passive

Full Access
Question # 24

What is the effect of configuring tcp-mss-sender and tcp-mss-receiver?

A.

Header change

B.

Largest payload

C.

Allow/Deny

D.

Fragment only

Full Access
Question # 25

Refer to the exhibits.

The configuration of a user ' s Windows PC, which has a default MTU of 1500 bytes, along with FortiGate interfaces set to an MTU of 1000 bytes, and the results of PC1 pinging server 172.16.0.254 are shown.

Why is the user in Windows PC1 unable to ping server 172.16.0.254 and is seeing the message: Packet needs to be fragmented but DF set?

A.

Option ip.flags.mf must be set to enable on FortiGate. The user has to adjust the ping MTU to 1000 to succeed.

B.

Fragmented packets must be encrypted. To connect any application successfully, the user must install the Fortinet_CA certificate in the Microsoft Management Console.

C.

FortiGate honors the do not fragment bit and the packets are dropped. The user has to adjust the ping MTU to 972 to succeed.

D.

The user must trigger different traffic because path MTU discovery techniques do not recognize ICMP payloads.

Full Access
Question # 26

Refer to the exhibit.

A LAN interface connected from FortiGate to two FortiSwitch devices is shown.

Which two statements about the LAN interface connection shown in the exhibit are correct? (Choose two.)

A.

The LAN interface must use an 802.3ad type interface.

B.

FortiGate is using an SD-WAN-type interface to connect to one FortiSwitch device with MCLAG.

C.

The connection is using a FortiLink interface.

D.

You must enable Spanning Tree Protocol (STP) or Rapid STP (RSTP) on FortiGate and FortiSwitch to avoid layer 2 loopbacks.

Full Access
Question # 27

Refer to the exhibit, which shows the packet capture output of a three-way handshake between FortiGate and FortiManager Cloud.

What two conclusions can you draw from the exhibit? (Choose two.)

A.

FortiGate will receive a certificate that supports multiple domains because FortiManager operates in a cloud computing environment.

B.

FortiGate is connecting to the same IP server and will receive an independent certificate for its connection between FortiGate and FortiManager Cloud.

C.

If the TLS handshake contains 17 cipher suites it means the TLS version must be 1.0 on this three-way handshake.

D.

The wildcard for the domain *.fortinet-ca2.support.fortinet.com must be supported by FortiManager Cloud.

Full Access
Question # 28

Refer to the exhibit, which contains a partial VPN configuration.

What can you conclude from this VPN IPsec phase 1 configuration?

A.

This configuration is the best for networks with regular traffic intervals, providing a balance between connectivity assurance and resource utilization.

B.

Peer IDs are unencrypted and exposed, creating a security risk.

C.

FortiGate will not add a route to its routing or forwarding information base when the dynamic tunnel is negotiated.

D.

A separate interface is created for each dial-up tunnel, which can be slower and more resource intensive, especially in large networks.

Full Access
Question # 29

Refer to the exhibit, which contains the partial output of an OSPF command.

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

What two conclusions can the administrator draw? (Choose two.)

A.

The FortiGate device is a backup designated router

B.

The FortiGate device is connected to multiple areas

C.

The FortiGate device injects external routing information

D.

The FortiGate device has OSPF ECMP enabled

Full Access
Question # 30

Which specialized acceleration hardware must you use for VXLAN?

A.

CPU

B.

NTurbo

C.

CP10

D.

NPU7

Full Access
Question # 31

Which action should you take after applying a block-all IPS profile that caused applications to stop working?

A.

Disable IPS

B.

Use monitor mode

C.

Enable flow mode

D.

Remove server targets

Full Access
Question # 32

During the maintenance window, an administrator must sniff all the traffic going through a specific firewall policy, which is handled by NP6 interfaces. The output of the sniffer trace provides just a few packets.

Why is the output of sniffer trace limited?

A.

The traffic corresponding to the firewall policy is encrypted.

B.

auto-asic-off load is set to enable in the firewall policy,

C.

inspection-mode is set to proxy in the firewall policy.

D.

The option npudbg is not added in the diagnose sniff packet command.

Full Access
Question # 33

Which three approaches can successfully deploy advanced initial configurations?

A.

Metadata variables

B.

Model device ZTP/LTP

C.

Jinja scripting

D.

Global ADOM

Full Access