Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCSS_NST_SE-7.6 Questions and Answers

Question # 6

Refer to the exhibits,

which show the configuration on FortiGate and partial session information for internet traffic from a user on the internal network. If the priority on route ID 2 were changed from 10 to 0, what would happen to traffic matching that user session? (Choose one answer)

A.

The session would be deleted, and the client would need to start a new session.

B.

The session would remain in the session table, but its traffic would now egress from both port1 and port2.

C.

The session would remain in the session table, and its traffic would egress from port2.

D.

The session would remain in the session table, and its traffic would egress from port1.

Full Access
Question # 7

Exhibit.

Refer to the exhibit, which shows a FortiGate configuration.

An administrator is troubleshooting a web filter issue on FortiGate. The administrator has configured a web filter profile and applied it to a policy; however the web filter is not inspecting any traffic that is passing through the policy.

What must the administrator do to fix the issue?

A.

Disable webfilter-force-off.

B.

Increase webfilter-timeout.

C.

Enable fortiguard-anycast.

D.

Change protocol to TCP.

Full Access
Question # 8

Exhibit.

Refer to the exhibit, which shows a partial output of diagnose hardware aysinfo memory.

Which two statements about the output are true? (Choose two.)

A.

There are 98908 kB of memory that will never be used.

B.

The user space has 708880 kB of physical memory that is not used by the system.

C.

The I/O cache, which has 641364 kB of memory allocated to it.

D.

The value indicated next to the inactive heading represents the currently unused cache page.

Full Access
Question # 9

Refer to the exhibit, which shows the output of a debug command.

Which two statements about the output are true? (Choose two.)

A.

The interlace is part of the OSPF backbone area.

B.

There are a total of five OSPF routers attached to the vorz4 network segment

C.

One of the neighbors has a router ID of 0.0.0.4.

D.

In the network connected to port4, two OSPF routers are down.

Full Access
Question # 10

Which three common FortiGate-to-collector-agent connectivity issues can you identify using the FSSO real-time debug? (Choose three.)

A.

The SSL certificate used for FSSO over SSL has expired.

B.

The connection was refused. There may be a mismatch of the TCP port.

C.

FortiGate cannot reach the IP address of the collector agent.

D.

The pro-shared key does not match

E.

The group filters do not match.

Full Access
Question # 11

Refer to the exhibit.

A partial output of diagnose npu up6 port-list on FortiGate 2000E is shown.

An administrator is unable to analyze traffic flowing between port1 and port17 using the diagnose sniffer command.

Which two commands allow the administrator to view the traffic? (Choose two.)

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 12

Refer to the exhibit, which shows the partial output of FortiOS kernel slabs.

Which statement is true?

A.

The total slab size of the sctp_session slab is 0 kB and is associated with the user space.

B.

The total slab size of the ip_session slab is 3600 kB and is associated with the user space.

C.

The total slab size of the ip6_session slab is 1300 kB and is associated with the kernel.

D.

The total slab size of the tcp_session slab is 7500 kB and is associated with the kernel.

Full Access
Question # 13

The output of a policy route table entry is shown.

Which type of policy route does the output show?

A.

A regular policy route, which is not associated with an active static route in the FIB

B.

An ISDB route

C.

An SD-WAN rule

D.

A regular policy route, which is associated with an active static route in the FIB

Full Access
Question # 14

Refer to the exhibit.

Assuming a default configuration, which three statements are true? (Choose three.)

A.

Strict RPF is enabled by default.

B.

User B: Fail. There is no route to 95.56.234.24 using wan2 in the routing table.

C.

User A: Pass. The default static route through wan1 passes the RPF check regardless of the source IP address.

D.

User B: Pass. FortiGate will use asymmetric routing using wan1 to reply to traffic for 95.56.234.24.

E.

User C: Fail. There is no route to 10.0.4.63 using port1 in the touting table.

Full Access
Question # 15

Refer to the exhibit.

Which three pieces of information does the diagnose sys top command provide? (Choose three.)

A.

The miglogd daemon is running on CPU core ID 0.

B.

The diagnose sys top command has been running for 18 minutes.

C.

The miglogd daemon would be on top of the list, if the administrator pressed m on the keyboard.

D.

The cmdbsvr process is occupying 2.4% of the total user memory space.

E.

If the neweli daemon continues to be in the R state, it will need to be manually restarted.

Full Access
Question # 16

Refer to the exhibit, which shows a partial output of the fssod daemon real-time debug command.

What two conclusions can you draw from the output? (Choose two.)

A.

The workstation with IP 10.124.2.90 will be polled frequently using TCP port 445 to see if the user is still logged on.

B.

The logon event can be seen on the collector agent installed on Windows.

C.

FSSO is using DC agent mode to detect logon events.

D.

FSSO is using agentless polling mode to detect logon events.

Full Access
Question # 17

Consider the scenario where the server name indication (SNI) does not match either the common name (CN) or any of the subject alternative names (SAN) in the server certificate.

Which action will FortiGate take when using the default settings for SSL certificate inspection?

A.

FortiGate uses the SNI from the user's web browser.

B.

FortiGate closes the connection because this represents an invalid SSL/TLS configuration.

C.

FortiGate uses the first entry listed in the SAN field in the server certificate.

D.

FortiGate uses the CN information from the Subject field in the server certificate.

Full Access
Question # 18

Refer to the exhibit, which shows a truncated output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two.)

A.

The name of the configured LDAP server is Lab.

B.

The user is authenticating using CN=John Smith.

C.

FortiOS is able to locate the user in step 3 (Bind Request) of the LDAP authentication process.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Full Access
Question # 19

Which three common FortiGate-to-collector-agent connectivity issues can you identify using the FSSO real-time debug? (Choose three.)

A.

Log is full on the collector agent.

B.

Inability to reach IP address of the collector agent.

C.

Refused connection. Potential mismatch of TCP port.

D.

Mismatched pre-shared password.

E.

Incompatible collector agent software version.

Full Access
Question # 20

While troubleshooting a FortiGate web filter issue, users report that they cannot access any websites, even though those sites are not explicitly blocked by any web filter profiles that are applied to firewall policies.

What are the three most likely reasons for this behavior? (Choose three answers)

A.

The web filter cache has been cleared causing all websites to take longer to be rated.

B.

The SSL/TLS deep inspection was configured but the browsers do not have the FortiGate certificate installed.

C.

The webfilter-force-off setting has been enabled under config system fortiguard.

D.

The DNS server is unreachable, preventing URL resolution.

E.

The FortiGuard Web Filtering license has expired, causing FortiGate to apply the default block action.

Full Access
Question # 21

Refer to the exhibit.

Partial output of diagnose sys session stat command is shown.

An administrator has noticed unusual behavior from FortiGate. It appears that sessions are randomly removed. Which two reasons could explain this? (Choose two.)

A.

FortiGate is deleting sessions because the kernel cannot allocate more memory pages

B.

FortiGate is dropping all TCP sessions with incomplete three-way handshakes.

C.

FortiGate is not accepting sessions because the device has been down 10 out of 120 seconds.

D.

FortiGate is flushing sessions because of high memory usage.

Full Access
Question # 22

Refer to the exhibit.

Which Iwo statements about FortiGate behavior relating to this session are correct? (Choose two.)

A.

FortiGate is performing a security profile inspection using the CPU.

B.

FortiGate redirected the client to trio captive portal to authenticate so that a correct policy match could be

C.

FortiGate either initiated the session or the session terminates at FortiGate.

D.

FortiGate forwarded this session without any inspection.

Full Access
Question # 23

Which Iwo actions does FortiGate take after an administrator enables the auxiliary session selling? (Choose two.)

A.

FortiGate only offloads auxiliary sessions.

B.

FortiGate accelerates all ECMP traffic to the NP6 processor

C.

FortiGates creates a now auxiliary session for each packet it receives.

D.

FortiGate creates two sessions in case of a routing change.

Full Access
Question # 24

When FortiGate enters conserve mode because of memory pressure, which action can FortiGate perform to preserve memory?

A.

FortiGate automatically reboots to clear memory and restore full operation.

B.

FortiGate switches to a less memory-intensive inspection mode, such as flow-based inspection.

C.

FortiGate reduces or stops non-essential processes tike logging and antivirus scanning

D.

Fortigate begins dropping all new sessions to protect resources.

Full Access
Question # 25

Refer to the exhibit, which shows a partial output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two.)

A.

The user was found in the LDAP tree, whose root is TAC.ottawa.fortinet.com.

B.

FortiOS performs a bind to the LDAP server using the user's credentials.

C.

FortiOS collects the user group information.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Full Access
Question # 26

Refer to the exhibit, which a network topology and a partial routing table.

FortiGate has already been configured with a firewall policy that allows all ICMP traffic to flow from port1 to port3.

Which changes must the administrator perform to ensure the server at 10.4.0.1/24 receives the echo reply from the laptop at 10.1.0.1/24?

A.

Enable asymmetric routing under config system settings.

B.

Change the configuration from strict RPF check mode to feasible RPF check mode.

C.

A firewall policy that allows all ICMP traffic from port3 to port1.

D.

Modify the default gateway on the laptop from 10.1.0.2 to 10.2.0.2.

Full Access
Question # 27

Exhibit.

Refer to the exhibit, which contains a screenshot of some phase 1 settings.

The VPN is not up. To diagnose the issue, the administrator enters the following CLI commands on an SSH session on FortiGate:

However, the IKE real-time debug does not show any output. Why?

A.

The administrator must also run the command diagnose debug enable.

B.

The debug shows only error messages. If there is no output, then the phase 1 and phase 2 configurations match.

C.

The log-filter setting is incorrect. The VPN traffic does not match this filter.

D.

Replace diagnose debug application ike -1 with diagnose debug application ipsec -1.

Full Access
Question # 28

Which two statements are true regarding heartbeat messages sent from an FSSO collector agent to FortiGate? (Choose two.)

A.

The heartbeat messages can be seen using the command diagnose debug authd fsso list.

B.

The heartbeat messages can be seen in the collector agent logs.

C.

The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.

D.

The heartbeat messages must be manually enabled on FortiGate.

Full Access
Question # 29

Refer to the exhibit, which shows the output of a policy route table entry.

Which type of policy route does the output show?

A.

An ISDB route

B.

A regular policy route

C.

A regular policy route, which is associated with an active static route in the FIB

D.

An SD-WAN rule

Full Access
Question # 30

Refer to the exhibit, which shows the partial output of command diagnose debug rating.

In this exhibit, which FDS server will the FortiGate algorithm choose?

A.

66.117.56.37

B.

208.91.112.194

C.

209.22.147.36

D.

64.26.151.37

Full Access