New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NSE7_CDS_AR-7.6 Questions and Answers

Question # 6

An administrator implements FortiWeb ingress controller to protect containerized web applications in an AWS Elastic Kubernetes Service (EKS) cluster.

What can you conclude about the topology shown in FortiView?

A.

The FortiWeb VM gets the latest cluster information through an SDN connector.

B.

This topology has two services and two ingress controllers deployed.

C.

Both services will be load balanced among the two nodes and the four pods.

D.

Adding a new service will update the FortiWeb configuration automatically.

Full Access
Question # 7

An administrator is relying on an Azure Bicep linter to find possible issues in Bicep files.

Which problem can the administrator expect to find?

A.

The resources to be deployed exceed the quota for a region.

B.

Some resources are missing dependsOn statements.

C.

There are output statements that contain passwords.

D.

One or more modules are not using runtime values as parameters.

Full Access
Question # 8

Refer to the exhibit.

The exhibit shows a customer deployment of two Linux instances and their main routing table in Amazon Web Services (AWS). The customer also created a Transit Gateway (TGW) and two attachments. Which two steps are required to route traffic from Linux instances to the TGW? (Choose two answers)

A.

In the main subnet routing table in VPC A and B, add a new route with destination 0.0.0.0/0, next hop TGW.12

B.

In the TGW route table, associate two attachments.34

C.

In the TGW route table, add route propagation to 192.168.0.0/16.56

D.

In the main subnet routing table in VPC A and B, add a new route with7 destination 0.0.0.0/0, next hop Internet 8gateway (IGW).

Full Access
Question # 9

Exhibit.

In which type of FortiCNP insights can an administrator examine the findings triggered by this policy?

A.

Data

B.

Threat

C.

Risk

D.

User activity

Full Access
Question # 10

What would be the impact of confirming to delete all the resources in Terraform?

A.

It destroys all the resources tied to the AWS Identity and Access Management (IAM) user.

B.

It destroys all the resources in the resource group.

C.

It destroys all the resources in the .tfstate file.

D.

It destroys all the resources in the .tfvars file.

Full Access
Question # 11

You have deployed a FortiGate HA cluster in Azure using a gateway load balancer for traffic inspection. However, traffic is not being routed correctly through the firewalls.

What can be the cause of the issue?

A.

The FortiNet VMs have IP forwarding disabled, which is required for traffic inspection.

B.

The health probes for the gateway load balancer are failing, which causes traffic to bypass the HA cluster.

C.

The gateway load balancer is not associated with the correct network security group (NSG) rules, which allow traffic to pass through.

D.

The protected VMs are in a different Azure subscription, which prevents the gateway load balancer from forwarding traffic.

Full Access
Question # 12

Refer to the exhibit.

Your team notices an unusually high volume of traffic sourced at one of the organizations FortiGate EC2 instances. They create a flow log to obtain and analyze detailed information about this traffic. However, when they checked the log, they found that it included traffic that was not associated with the FortiGate instance in question.

What can they do to obtain the correct logs? (Choose one answer)

A.

Create a new flow log at the interface level.

B.

Change the maximum aggregation time to 1 minute.

C.

Ensure that the flow log data is not mixed with the rest of the traffic.

D.

Send the logs to Amazon Data Firehose instead to get more granular information.

Full Access
Question # 13

Refer to the exhibit.

You have deployed a Linux EC2 instance in Amazon Web Services (AWS) with the settings shown on the exhibit.

What next step must the administrator take to access this instance from the internet?

A.

Allocate an Elastic IP address and assign it to the instance.

B.

Create a VIP on FortiGate to allow access.

C.

Enable SSH and allocate it to the device.

D.

Configure the user name and password.

Full Access
Question # 14

Refer to the exhibit.

A senior administrator in a multinational organization needs to include a comment in the template shown in the exhibit to ensure that administrators from other regions change the Amazon Machine Image (AMI) ID to one that is valid in their location.

How can the administrator add the required comment in that section of the file?

A.

The administrator can include the comment with the aws cloudformation update-stack command.

B.

The administrator must convert the template file to YAML format to add a comment.

C.

The administrator can add the comment starting with the # character next to the "Resources" section.

D.

The administrator must update the AWSTemplateFormatVersion to the latest version.

Full Access
Question # 15

Refer to the exhibit.

After analyzing the native monitoring tools available in Azure, an administrator decides to use the tool displayed in the exhibit.

Why would an administrator choose this tool?

A.

To view details about Azure resources and their relationships across multiple regions.

B.

To obtain, and later examine, traffic flow data with a visualization tool.

C.

To help debug issues affecting virtual network gateways.

D.

To compare the latency of an on-premises site with the latency of an Azure application.

Full Access
Question # 16

A customer would like to use FortiGate fabric integration with FortiCNP. When adding a FortiGate VM to FortiCNP, which three mandatory configuration steps must you follow on FortiGate? (Choose three answers)

A.

Enable pre-shared key on both sides.

B.

Import the FortiGate certificate into FortiCNP.

C.

Configure FortiGate to send logs to FortiCNP.

D.

Create an IPS sensor and a firewall policy.

E.

Create an SSL/SSH inspection profile.

Full Access