Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCSS_NST_SE-7.6 Questions and Answers

Question # 6

Refer to the exhibit.

A network topology and a partial routing table are shown.

FortiGate has already been configured with a firewall policy that allows all ICMP traffic to flow from port1 to port3.

Which two changes can the administrator perform to ensure the server at 10.4.0.1/24 receives the ICMP echo reply from the laptop at 10.1.0.1/24? (Choose two.)

A.

Enable asymmetric routing under config system settings.

B.

Change the FortiGate configuration from strict RPF check mode to feasible RPF check mode.

C.

Modify the default gateway on the laptop from 10.1.0.2 to 10.1.0.254.

D.

Add a default static route on FortiGate to forward all traffic to port3.

Full Access
Question # 7

In IKEv2, which exchange establishes the first CHILD_SA?

A.

IKE_SA_INIT

B.

INFORMATIONAL

C.

CREATE_CHILD_SA

D.

IKE_AUTH

Full Access
Question # 8

In a Security Fabric environment which three actions must you take to ensure successful communication among the nodes? (Choose three.)

A.

You must ensure that TCP port 8013 is not blocked along the way.

B.

You must ensure that the port for Neighbor Discovery has been changed.

C.

You must configure FortiGate in transparent mode.

D.

You must authorize the downstream FortiGate on the root FortiGate.

E.

You must enable FortiTelemetry on the receiving interlace of the upstream FortiGate.

Full Access
Question # 9

Which three common FortiGate-to-collector-agent connectivity issues can you identify using the FSSO real-time debug? (Choose three.)

A.

Log is full on the collector agent.

B.

Inability to reach IP address of the collector agent.

C.

Refused connection. Potential mismatch of TCP port.

D.

Mismatched pre-shared password.

E.

Incompatible collector agent software version.

Full Access
Question # 10

A FortiGate administrator is troubleshooting a VPN that is failing to establish.

As a first step, the administrator is attempting to sniff the traffic using the command:

# diagnose sniffer packet any ‘’udp port 500 or udp port 4500 or esp’’ 4

After several minutes there is still no output. What is the most Likely reason for this?

A.

The VPN is configured to use IKE over TCP

B.

esp is not a valid sniffer argument.

C.

The ISP is blocking all VPN traffic.

D.

Mismatched IKE versions are detected on the VPN peers

Full Access
Question # 11

Refer to the exhibit.

The output of the get router info bgp summary command is shown.

Which statement regarding adjacencies between the local router and its neighbors is correct?

A.

The local router and neighbor 100.64.2.254 are unable to establish adjacency until the adjacency with neighbor 100.64.1.254 ceases.

B.

The local router and neighbor 100.64.2.254 are unable to establish adjacency because the TCP session could not be established.

C.

The local router and neighbor 100.64.1.254 established adjacency because the priority of 100.64.1.254 is higher than that of 100.64.2.254.

D.

The local router and neighbor 100.64.2.254 are unable to establish adjacency because AS 100 is already used by neighbor 100.64.1.254.

Full Access
Question # 12

Refer to the exhibit.

The exhibit shows a session entry. Which statement about this TCP session is true?

A.

The session will expire in one second.

B.

It is a TCP session from 10.9.31.117 to 10.1.0.3.

C.

The session is offloaded using NPU.

D.

Return traffic to the initiator is sent to 10.9.31.117.

Full Access
Question # 13

Refer to the exhibit, which shows a partial output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two.)

A.

The user was found in the LDAP tree, whose root is TAC.ottawa.fortinet.com.

B.

FortiOS performs a bind to the LDAP server using the user ' s credentials.

C.

FortiOS collects the user group information.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Full Access
Question # 14

Which two statements are true regarding heartbeat messages sent from an FSSO collector agent to FortiGate? (Choose two.)

A.

The heartbeat messages can be seen using the command diagnose debug authd fsso list.

B.

The heartbeat messages can be seen in the collector agent logs.

C.

The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.

D.

The heartbeat messages must be manually enabled on FortiGate.

Full Access
Question # 15

Refer to the exhibit, which shows one way communication of the downstream FortiGate with the upstream FortiGate within a Security Fabric.

What three actions must you take to ensure successful communication? (Choose three.)

A.

You must authorize the downstream FortiGate on the root FortiGate.

B.

FortiGate must not be in NAT mode.

C.

Ensure TCP port 8013 is not blocked along the way.

D.

You must enable Security Fabric/Fortitelemetry on the receiving interface of the upstream FortiGate.

E.

Ensure the port for Neighbor Discovery has been changed.

Full Access
Question # 16

Refer to the exhibit, which shows partial outputs from two routing debug commands.

Why is the port2 default route not in the second command output?

A.

The port2 interface is disabled in the FortiGate configuration.

B.

The port1 default route has a higher priority value than the default route using port2.

C.

The port1 default route has a lower priority value than the default route using port2.

D.

The port1 default route has a lower distance than the default route using port2.

Full Access
Question # 17

Refer to the exhibit.

Which two observations can you make about the web filter traffic captured using the flow tool? (Choose two.)

A.

The session is offloaded to the NPU.

B.

The firewall policy is configured with proxy-based inspection mode.

C.

The web filter profile is configured with proxy-based inspection mode.

D.

The HTTPS port is mapped to 443 in the SSL/SSH Inspection Profile

Full Access
Question # 18

Refer to the exhibit, which shows the partial output of FortiOS kernel slabs.

Which statement is true?

A.

The total slab size of the sctp_session slab is 0 kB and is associated with the user space.

B.

The total slab size of the ip_session slab is 3600 kB and is associated with the user space.

C.

The total slab size of the ip6_session slab is 1300 kB and is associated with the kernel.

D.

The total slab size of the tcp_session slab is 7500 kB and is associated with the kernel.

Full Access
Question # 19

Refer to the exhibits.

An administrator is attempting to advertise the network configured on port3. However, FGT-A is not receiving the prefix.

Which two actions can the administrator take to fix this problem? (Choose two.)

A.

Modify the prefix using the network command from 172.16.0.0/16 to 172.16.54.0/24.

B.

Manually add the BGP route on FGT-A.

C.

Restart BGP using a soft reset to force both peers to exchange their complete BGP routing tables.

D.

Use the set network-import-check disable command.

Full Access
Question # 20

Refer to the exhibit, which shows the output of a debug command.

Which two statements about the output are true? (Choose two.)

A.

The interlace is part of the OSPF backbone area.

B.

There are a total of five OSPF routers attached to the vorz4 network segment

C.

One of the neighbors has a router ID of 0.0.0.4.

D.

In the network connected to port4, two OSPF routers are down.

Full Access
Question # 21

Refer to the exhibit.

If the default settings are m place, what can you conclude about the conserve mode shown in the exhibit?

A.

FortiGate is currently allowing new sessions that require flow-based content inspection and blocking sessions that require proxy-based content inspection

B.

FortiGate is currently allowing new sessions and will continue to allow sessions if memory increases another 6%.

C.

FortiGate is currently allowing now sessions that require flow-based or proxy-based content inspection, but is not performing inspection on those sessions.

D.

FortiGate is currently blocking all new sessions regardless of the content inspection requirements or configuration settings because of high memory use.

Full Access
Question # 22

Refer to the exhibit.

The exhibit shows the output from using the command diagnose debug application samld -1 to diagnose a SAML connection.

Based on this output, what can you conclude?

A.

Active Directory is used for authentication.

B.

The authentication request is for an SSL VPN connection.

C.

The IdP IP address is 10.1.10.254.

D.

The IdP IP address is 10.1.10.2.

Full Access
Question # 23

Refer to the exhibit, which shows the output o! the BGP database.

Which two statements are correct? (Choose two.)

A.

The advertised prefix of 10.20.30.0/24 was configured using the network command.

B.

The first four prefixes are being advertised using a legacy route advertisement.

C.

The advertised prefix of 10.20.30.0/24 is being advertised through the redistribution of another routing protocol.

D.

The output shows all prefixes advertised by all neighbors as well as the local router.

Full Access
Question # 24

Refer to the exhibit, which shows the output of get router info bgp summary.

Which two statements are true? (Choose two.)

A.

The local ForliGate has received one prefix from BGP neighbor 100.64.1.254.

B.

The TCP connection with BGP neighbor 100.64.2.254 was successful.

C.

The local FortiGate has received 18 packets from a BGP neighbor.

D.

The local FortiGate is still calculating the prefixes received from BGP neighbor 100.64.2.264

Full Access
Question # 25

Consider the scenario where the server name indication (SNI) does not match either the common name (CN) or any of the subject alternative names (SAN) in the server certificate.

Which action will FortiGate take when using the default settings for SSL certificate inspection?

A.

FortiGate uses the SNI from the user ' s web browser.

B.

FortiGate closes the connection because this represents an invalid SSL/TLS configuration.

C.

FortiGate uses the first entry listed in the SAN field in the server certificate.

D.

FortiGate uses the CN information from the Subject field in the server certificate.

Full Access
Question # 26

Refer to the exhibit showing a debug output.

An administrator deployed FSSO in DC Agent Mode but FSSO is failing on FortiGate. Pinging FortiGate from where the collector agent is deployed is successful.

The administrator then produces the debug output shown in the exhibit.

What could be causing this error message?

A.

The TCP port 445 is blocked between FortiGate and collector agent.

B.

The collector agent preshared password is mismatched.

C.

The FortiGate cannot resolve the active directory server name.

D.

The FortiGate and the collector agent are using different TCP ports.

Full Access
Question # 27

While troubleshooting a FortiGate web filter issue, users report that they cannot access any websites, even though those sites are not explicitly blocked by any web filter profiles that are applied to firewall policies.

What are the three most likely reasons for this behavior? (Choose three answers)

A.

The web filter cache has been cleared causing all websites to take longer to be rated.

B.

The SSL/TLS deep inspection was configured but the browsers do not have the FortiGate certificate installed.

C.

The webfilter-force-off setting has been enabled under config system fortiguard.

D.

The DNS server is unreachable, preventing URL resolution.

E.

The FortiGuard Web Filtering license has expired, causing FortiGate to apply the default block action.

Full Access
Question # 28

A VPN tunnel is up. To monitor traffic flow, the administrator enters the following CLI commands on an SSH session on FortiGate:

# diagnose debug enable

# diagnose sniffer packet any ' udp and port 500 ' 4

However, the sniffer does not show any output. Assuming default configuration values, what are two possible reasons there is no output? (Choose two answers)

A.

The filter should be modified to also capture packets for TCP port 443 or UDP port 4500 .

B.

NAT Traversal is enabled.

C.

The sniffer must be restricted to the remote peer IP address.

D.

The sniffer output will be ignored because running diagnose debug enable shows only application real-time debugs.

Full Access
Question # 29

What are two reasons that an OSPF router does not have any type 5 tank-state advertisements (LSAs) In its link-stale database (LSD6)? (Choose two.)

A.

There is no autonomous system border router (ASBR) in the network,

B.

The peer of the local router is using a prefix-list-out. configuration to prevent all type 5 LSAs to be advertised.

C.

The local router is located in a stub area

D.

IP protocol 89 is blocked between the local router and its peer.

Full Access
Question # 30

Exhibit.

Refer to the exhibit, which contains partial output from an IKE real-time debug.

Which two statements about this debug output are correct? (Choose two.)

A.

Perfect Forward Secrecy (PFS) is enabled in the configuration.

B.

The local gateway IP address is 10.0.0.1.

C.

It shows a phase 2 negotiation.

D.

The initiator provided remote as its IPsec peer ID.

Full Access
Question # 31

Refer to the exhibit.

The output from a collector agent log is shown. The collector agent is showing the status of a workstation as Not Verified . What are two common causes for this message? (Choose two.)

A.

The workstation has come out of hibernate mode.

B.

The workstation remote registry service is not running.

C.

Traffic to ports 139 and 445 is blocked.

D.

DNS cannot resolve the workstation name.

Full Access
Question # 32

Refer to the exhibits.

An administrator Is expecting to receive advertised route 8.8.8.8/32 from FGT-A. On FGT-B, they confirm that the route is being advertised and received, however, the route is not being injected into the routing table. What is the most likely cause of this issue?

A.

A batter route to the 8.8.8.8/32 network exists in the routing table.

B.

FGT-B is configured with a prefix list denying the 8.8.8.8/32 network to be injected into the routing table.

C.

The administrator has misconfigured redistribution of routes on FGT-A.

D.

FGT-B is configured with a distribution list denying the 8.8.8.8/32 network to be injected into the routing table.

Full Access
Question # 33

During which phase of IKEv2 does the Diffie-Helman key exchange take place?

A.

IKE_Req_INIT

B.

Create_CHILD_SA

C.

IKE_Auth

D.

IKE_SA_INIT

Full Access
Question # 34

Refer to the exhibit, which shows the output of a real-time debug. Which statement about this output is true? (Choose one answer)

A.

The server hostname was extracted from the SNI in the client request, or from the CN in the server certificate.

B.

FortiGate found the requested URL in its local cache.

C.

This web request was inspected using the ftgd-allow web filter profile.

D.

The requested URL belongs to category ID 255.

Full Access
Question # 35

Exhibit.

Refer to the exhibit, which shows the output of a diagnose command.

What can you conclude about the debug output in this scenario?

A.

The first server provided to FortiGate when it performed a DNS query looking for a list of rating servers, was 121.111.236.179.

B.

There is a natural correlation between the value in the FortiGuard-requests field and the value in the Weight field.

C.

FortiGate used 64.26.151.37 as the initial server to validate its contract.

D.

Servers with a negative TZ value are less preferred for rating requests.

Full Access
Question # 36

Which three conditions are required for two FortiGate devices to form an OSPF adjacency? (Choose three answers)

A.

OSPF link costs match.

B.

OSPF interface priority settings are unique.

C.

OSPF interface network types match.

D.

Authentication settings match.

E.

OSPF router IDs are unique.

Full Access
Question # 37

Exhibit 1.

Exhibit 2.

Refer to the exhibits, which show the configuration on FortiGate and partial internet session information from a user on the internal network.

An administrator would like to lest session failover between the two service provider connections.

Which two changes must the administrator make to force this existing session to immediately start using the other interface? (Choose two.)

A.

Change the priority of the port1 static route to 11.

B.

Change the priority of the port2 static route to 5.

C.

Configure unset snat-route-change to return it to the default setting.

D.

Configure set snat-route-change enable.

Full Access
Question # 38

Refer to the exhibit.

The output of a BGP debug command is shown.

Why has the local router at 172.16.23.58 been unable to establish adjacency with its only neighbor?

A.

The neighbor router has become unreachable, which is evident by the low ratio of messages received to messages sent.

B.

The local router has not received an OPEN message from the neighbor.

C.

The local router has not received a SYN/ACK packet from the neighbor.

D.

There is no active route to the BGP neighbor.

Full Access
Question # 39

When FortiGate enters conserve mode because of memory pressure, which action can FortiGate perform to preserve memory?

A.

FortiGate automatically reboots to clear memory and restore full operation.

B.

FortiGate switches to a less memory-intensive inspection mode, such as flow-based inspection.

C.

FortiGate reduces or stops non-essential processes like logging and antivirus scanning.

D.

FortiGate begins dropping all new sessions to protect resources.

Full Access