Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

FCSS_SDW_AR-7.4 Questions and Answers

Question # 6

Refer to the exhibit that shows an SD-WAN zone configuration on the FortiManager GUI.

Based on the exhibit, how will the FortiGate device behave after it receives this configuration?

A.

The configuration instructs FortiGate to choose an ADVPN shortcut based on SD-WAN information.

B.

The configuration instructs FortiGate to allow ADVPN shortcuts for the tunnels of this SD-WAN zone.

C.

The configuration instructs FortiGate to establish shortcuts only when at least two members meet the SLA target.

D.

The configuration instructs FortiGate to establish shortcuts only for overlay interfaces that meet the SLA target HUB1_HC.

Full Access
Question # 7

Refer to the exhibit.

Which statement best describe the role of the ADVPN device in handling traffic?

A.

This is a hub that has received a query from a spoke and has forwarded it to another spoke.

B.

This is a hub in a dual-region topology. The remote hub tunnel ID is 10.0.2.101.

C.

This is a spoke that has received a shortcut query from another spoke and has forwarded the response to its hub.

D.

This is a spoke. The kernel received a shortcut request and forwards the query to another spoke.

Full Access
Question # 8

Refer to the exhibit.

An administrator checks the status of an SD-WAN topology using the FortiManager SD-WAN monitor menus. All members are configured with one or two SLAs.

Which two conclusions can you draw from the output shown? (Choose two.)

A.

The template view should be used to see the hub devices.

B.

One member of branch2_fgt is missing the SLAs.

C.

branch2_fgt establishes six tunnels to the hubs and they are all up.

D.

This SD-WAN topology contains only two branch devices.

Full Access
Question # 9

The FortiGate devices are managed by ForliManager, and are configured for direct internet access (DIA). You confirm that DIA is working as expected for each branch, and check the SD-WAN zone configuration and firewall policies shown in the exhibits.

Then, you use the SD-WAN overlay template to configure the IPsec overlay tunnels. You create the associated SD-WAN rules to connect existing branches to the company hub device and apply the changes on the branches.

After those changes, users complain that they lost internet access. DIA is no longer working.

Based on the exhibit, which statement best describes the possible root cause of this issue?

A.

The SD-WAN overlay template defines a zone for each underlay interface and moves the interfaces into those zones.

B.

The SD-WAN overlay template didn’t configure a firewall policy to allow traffic through the overlay.

C.

The SD-WAN overlay template redefines the interface gateway addresses if they are defined with metadata variables.

D.

The SD-WAN overlay template updates the SD-WAN template and the rules.

Full Access
Question # 10

Refer to the exhibits.

The exhibits show the configuration for SD-WAN performance. SD-WAN rule, the application IDs of Facebook and YouTube along with the firewall policy configuration and the underlay zone status.

Which two statements are true about the health and performance of SD-WAN members 3 and 4? (Choose two.)

A.

Only related TCP traffic is used for performance measurement.

B.

The performance is an average of the metrics measured for Facebook and YouTube traffic passing through the member.

C.

Encrypted traffic is not used for the performance measurement.

D.

FortiGate identifies the member as dead when there is no Facebook and YouTube traffic passing through the member.

Full Access
Question # 11

Refer to the exhibits.

The exhibits show two IPsec templates to define Branch IPsec 1 and Branch_IPsec_2. Each template defines a VPN tunnel. The error message that FortiManager displayed when the administrator tried to assign the second template to the FortiGate device is also shown.

Which statement best describes the cause of the issue?

A.

You can assign only one template with a tunnel type of static to each FortiGate device.

B.

You can assign only one IPsec template to each FortiGate device.

C.

You should review the branch1_fgt configuration for configured tunnels in the rootVDOM.

D.

You should use the same outgoing interface of both templates.

Full Access
Question # 12

When a customer delegate the installation and management of its SD-WAN infrastructure to an MSSP, the MSSP usually keeps the hub within its infrastructure for ease of management and to share costly resources.

In which two situations will the MSSP install the hub in customer premises? (Choose two.)

A.

The customer requires SIA with centralized breakout.

B.

The administrator expects a large volume of traffic between the branches.

C.

The customer expects a large amount of VoIP traffic.

D.

The majority of the branch traffic is directed to a corporate data center.

Full Access
Question # 13

You manage an SD-WAN topology. You will soon deploy 50 new branches.

Which three tasks can you do in advance to simplify this deployment? (Choose three.)

A.

Update the DHCP server configuration.

B.

Create model devices.

C.

Create a ZTP template.

D.

Define metadata variables value for each device.

E.

Create policy blueprint.

Full Access
Question # 14

What are three key routing principles of SD-WAN? (Choose three.)

A.

Directly connected routes have precedence over SD-WAN rules.

B.

Policy routes have precedence over SD-WAN rules.

C.

SD-WAN rules are skipped if the best route to the destination is a static route

D.

SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member.

E.

SD-WAN members are skipped if they do not have a valid route to the destination.

Full Access
Question # 15

Your FortiGate is in production. To optimize WAN link use and improve redundancy, you enable and configure SD-WAN.

What must you do as part of this configuration update process?

A.

Replace references to interfaces used as SD-WAN members in the routing configuration.

B.

Purchase and install the SD-WAN license, and reboot the FortiGate device.

C.

Replace references to interfaces used as SD-WAN members in the firewall policies.

D.

Disable the interface that you want to use as an SD-WAN member.

Full Access
Question # 16

The administrator uses the FortiManager SD-WAN overlay template to prepare an SD-WAN deployment. Using information provided through the SD-WAN overlay template wizard, FortiManager creates templates ready to install on the spoke and hub devices.

What are the three templates created by the SD-WAN overlay template for a spoke device? (Choose three.)

A.

Static route template

B.

Rules template

C.

CLI template

D.

BGP template

E.

IPsec tunnel template

Full Access
Question # 17

Refer to the exhibit.

Which SD-WAN rule and interface uses FortiGate to steer the traffic from the LAN subnet 10.0.1.0/24 to the corporate server 10.2.5.254?

A.

SD-WAN service rule 3 and interface HUB1-VPN2.

B.

SD-WAN service rule 3 and interface HUB1-VPN3.

C.

SD-WAN service rule 4 and port1 or port2.

D.

SD-WAN service rule 4 and interface port2.

Full Access
Question # 18

Which three characteristics apply to provisioning templates available on FortiManager? (Choose three.)

A.

A template group can include a system template and an SD-WAN template.

B.

Each template group can contain up to three IPsec tunnel templates.

C.

CLI templates are applied in order, from top to bottom

D.

A CLI template group can contain CLI templates of both types.

E.

A CLI template can be of type CLI script or Perl script.

Full Access
Question # 19

Refer to the exhibits.

The exhibits show an SD-WAN event log, the member status, and the SD-WAN rule configuration.

Which two conclusions can you draw from the information shown? (Choose two.)

A.

The administrator configured the service ID 1 with the highest priority member for port2.

B.

Port2 has a lower latency than port1.

C.

FortiGate updated the outgoing interface list on the rule so it prefers port2.

D.

The administrator configured the SD-WAN rule ID 1 with the default strategy mode.

Full Access
Question # 20

Refer to the exhibit.

The exhibit shows the details of a session and the index numbers of some relevant interfaces on a FortiGate device that supports hardware offloading.

Based on the information shown in the exhibits, which two conclusions can you draw? (Choose two.)

A.

By default, FortiGate offloads symmetric and asymmetric flows.

B.

The original direction of the symmetric traffic flows from port3 to port2.

C.

The reply direction of the asymmetric traffic flows from port2 to port3.

D.

The auxiliary session can be offloaded to hardware.

Full Access