Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NSE4_FGT_AD-7.6 Questions and Answers

Question # 6

Refer to the exhibit.

An SD-WAN zone configuration on the FortiGate GUI is shown. Based on the exhibit, which statement is true?

A.

The Underlay zone contains no member.

B.

The virtual-wan-link and overlay zones can be deleted

C.

The Underlay zone is the zone by default.

D.

port2 and port3 are not assigned to a zone.

Full Access
Question # 7

Refer to the exhibits.

An administrator configured both members of an HA cluster at the same time. After one week of monitoring, the administrator wants to verify the HA failover performance. How can the administrator force a failover? (Choose one answer)

A.

The administrator must reset the HA uptime on HQ-NGFW-1.

B.

The administrator must set the parameter override to enable on HQ-NGFW-2.

C.

The administrator must increase the HA priority on HQ-NGFW-2.

D.

The administrator must set the monitored port1 to down on HQ-NGFW-1.

Full Access
Question # 8

Refer to the exhibit

A firewall policy to enable active authentication is shown.

When attempting to access an external website using an active authentication method, the user is not presented with a login prompt. What is the most likely reason for this situation?

A.

No matching user account exists for this user.

B.

The Remote-users group must be set up correctly in the FSSO configuration.

C.

The Remote-users group is not added to the Destination

D.

The Service DNS is required in the firewall policy.

Full Access
Question # 9

You are onboarding an agentless, secure web gateway (SWG) endpoint for secure internet access (SIA). What will happen to the user ' s nonweb traffic? (Choose one answer)

A.

All the nonweb traffic will bypass FortiSASE.

B.

The endpoint will use split tunneling to redirect nonweb traffic to FortiSASE.

C.

FortiSASE will use Firewall-as-a-Service (FWaaS) to redirect nonweb traffic.

D.

FortiSASE will use SWG to redirect nonweb traffic to FortiExtender.

Full Access
Question # 10

Refer to the exhibit.

An administrator has created a new firewall address to use as the destination for a static route. Why is the administrator not able to select the new address in the Destination field of the new static route? (Choose one answer)

A.

In the new static route, the administrator must select Named Address.

B.

In the new firewall address, the FQDN address must first be resolved.

C.

In the new static route, the administrator must first set the interface to port2.

D.

In the new firewall address, Routing configuration must be enabled.

Full Access
Question # 11

When configuring firewall policies which of the following is true regarding the policy ID? (Choose two.)

A.

A firewall policy ID identifies the order of policy execution in firewall policies.

B.

A policy ID cannot be modified once a policy is created.

C.

You can create a policy in CLI with policy ID 0

D.

It is mandatory to provide a policy ID while creating a firewall policy regardless of GUI or CLI.

Full Access
Question # 12

Refer to the exhibit.

Why is the Antivirus scan switch grayed out when you are creating a new antivirus profile for FTP?

A.

Antivirus scan is disabled under System - > Feature visibility

B.

None of the inspected protocols are active in this profile.

C.

The Feature Set for the profile is Flow-based but it must be Proxy-based

D.

FortiGate. with less than 2 GB RAM. does not support the Antivirus scan feature.

Full Access
Question # 13

You have configured the below commands on a FortiGate.

What would be the impact of this configuration on FortiGate?

A.

FortiGate will enable strict RPF on all its interfaces and porti will be exempted from RPF checks.

B.

FortiGate will enable strict RPF on all its interfaces and porti will be enable for asymmetric routing.

C.

The global configuration will take precedence and FortiGate will enable strict RPF on all interfaces.

D.

Port1 will be enabled with flexible RPF. and all other interfaces will be enabled for strict RPF

Full Access
Question # 14

Refer to the exhibit to view the firewall policy.

Why would the firewall policy not block a well-known virus, for example EICAR? (Choose one answer)

A.

The action on the firewall policy is not set to DENY.

B.

Web filter is not enabled, so the firewall policy does not complement the antivirus profile.

C.

The firewall policy is not configured in proxy-based inspection mode.

D.

The firewall policy does not apply deep content inspection.

Full Access
Question # 15

Which two statements are correct when the FortiGate device enters conserve mode? (Choose two.)

A.

FortiGate refuses to accept configuration changes.

B.

FortiGate halts complete system operation and requires a reboot to regain available resources.

C.

FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled.

D.

FortiGate continues to run critical security actions, such as quarantine.

Full Access
Question # 16

Refer to the exhibit.

An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

A.

The ABC Com is hitting the category Excessive-Bandwidth.

B.

The ABC.Com Type is set as Application instead of Filter.

C.

The ABC.Com is configured under application profile, which must be configured as a web filter profile.

D.

The ABC Com Action is set to Allow

Full Access
Question # 17

What are three key routing principles in SD-WAN? (Choose three answers)

A.

By default, SD-WAN rules are skipped if the included SD-WAN members do not have a valid route to the destination.

B.

SD-WAN rules have precedence over any other type of routes.

C.

Regular policy routes have precedence over SD-WAN rules.

D.

By default, SD-WAN rules are skipped if only one route to the destination is available.

E.

By default, SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member.

Full Access
Question # 18

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.

Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

A.

On HQ-NGFW, disable Diffie-Hellman group 2.

B.

On HQ-NGFW, set IKE mode to Main (ID protection).

C.

On BR1-FGT, set port2 to Interface.

D.

On both FortiGate devices, set Dead Peer Detection to On Demand.

Full Access
Question # 19

Refer to the exhibits.

Based on the current HA status, an administrator updates the override and priority parameters on HQ-NGFW-1 and HQ-NGFW-2 as shown in the exhibits.

What would be the expected outcome in the HA cluster?

A.

HQ-NGFW-2 will take over as the primary because it has the override enable setting and higher priority than HQ-NGFW-1.

B.

HQ-NGFW-1 will remain the primary because HQ-NGFW-2 has lower priority

C.

The HA cluster will become out of sync because the override setting must match on all HA members.

D.

HQ-NGFW-1 will synchronize the override disable setting with HQ-NGFW-2.

Full Access
Question # 20

There are multiple dialup IPsec VPNs configured in aggressive mode on the HQ FortiGate. The requirement is to connect dial-up users to their respective department VPN tunnels.

Which phase 1 setting you can configure to match the user to the tunnel?

A.

Local Gateway

B.

Dead Peer Detection

C.

Peer ID

D.

IKE Mode Config

Full Access
Question # 21

Refer to the exhibit.

A partial cloud topology is shown.

You deployed a FortiGate Cloud-Native Firewall (CNF) in AWS.

During the deployment, which components must the FortiGate CNF create to handle traffic from the EC2 instance?

A.

The customer VPC and GWLBe

B.

The gateway load balancer endpoint (GWLBe) in the customer virtual private cloud (VPC)

C.

The CNF VPC. customer VPC. and GWLB

D.

The GWLB. GWLBe, and the internet gateway (IGW) in the customer VPC

Full Access
Question # 22

A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.

Which VPN Wizard template must the administrator apply?

A.

Remote Access

B.

Hub-and-Spoke

C.

Site-to-Site

D.

Dial-up User

Full Access
Question # 23

What are two characteristics of HA cluster heartbeat IP addresses in a FortiGate device? (Choose two.)

A.

Heartbeat IP addresses are used to distinguish between cluster members.

B.

The heartbeat interface of the primary device in the cluster is always assigned IP address 169.254.0.1.

C.

A change in the heartbeat IP address happens when a FortiGate device joins or leaves the cluster.

D.

Heartbeat interfaces have virtual IP addresses that are manually assigned.

Full Access
Question # 24

Which three methods are used by the collector agent for AD polling? (Choose three answers)

A.

NetAPI

B.

WMI

C.

WinSecLog

D.

DNS reverse lookup

E.

FSSO REST API

Full Access
Question # 25

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two answers)

A.

If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.

B.

If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.

C.

If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP.

D.

If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.

Full Access
Question # 26

FortiGate is integrated with FortiAnalyzer and FortiManager.

When creating a firewall policy, which attribute must an administrator include to enhance functionality and enable log recording on FortiAnalyzer and FortiManager?

A.

Universally Unique Identifier

B.

Policy ID

C.

Sequence ID

D.

Log ID

Full Access
Question # 27

Which two statements about the Security Fabric rating are true? (Choose two answers)

A.

A license is required to obtain an executive summary in the Security Rating section.

B.

The root FortiGate provides executive summaries of all the FortiGate devices in the Security Fabric.

C.

The Security Posture category provides PCI compliance results.

D.

Security Rating Insights are available only in the Security Rating page.

Full Access