Refer to the FortiGuard connection debug output.
Based on the output shown in the exhibit, which two statements are correct? (Choose two.)
46
Which two types of traffic are managed only by the management VDOM? (Choose two.)
Which statement about the deployment of the Security Fabric in a multi-VDOM environment is true?
Refer to the exhibit.
Which contains a session diagnostic output. Which statement is true about the session diagnostic output?
Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)
45
Which three CLI commands can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.)
FortiGate is operating in NAT mode and is configured with two virtual LAN (VLAN) subinterfaces added to the same physical interface.
In this scenario, which statement about VLAN IDs is true?
Refer to the exhibit to view the application control profile.
Based on the configuration, what will happen to Apple FaceTime?
Examine this FortiGate configuration:
How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires authorization?
99
An administrator needs to configure VPN user access for multiple sites using the same soft FortiToken. Each site has a FortiGate VPN gateway. What must an administrator do to achieve this objective?
Which of the following SD-WAN load balancing method use interface weight value to distribute traffic? (Choose two.)
Which two statements ate true about the Security Fabric rating? (Choose two.)
A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.
What is the reason for the certificate warning errors?
View the exhibit.
Which of the following statements are correct? (Choose two.)
Which two types of traffic are managed only by the management VDOM? (Choose two.)
2
Which two statements are true when FortiGate is in transparent mode? (Choose two.)
An administrator needs to increase network bandwidth and provide redundancy.
What interface type must the administrator select to bind multiple FortiGate interfaces?
106
Which two actions can you perform only from the root FortiGate in a Security Fabric? (Choose two.)
Which three criteria can a FortiGate use to look for a matching firewall policy to process traffic? (Choose three.)
Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?
Refer to the exhibit, which contains a static route configuration.
An administrator created a static route for Amazon Web Services.
Which CLI command must the administrator use to view the route?
Refer to the exhibit showing a debug flow output.
What two conclusions can you make from the debug flow output? (Choose two.)
87
Which of the following are valid actions for FortiGuard category based filter in a web filter profile ui proxy-based inspection mode? (Choose two.)
In an explicit proxy setup, where is the authentication method and database configured?
Refer to the exhibit.
The exhibit contains the configuration for an SD-WAN Performance SLA, as well as the output of diagnose sys virtual-wan-link health-check . Which interface will be selected as an outgoing interface?
An administrator is configuring an Ipsec between site A and siteB. The Remotes Gateway setting in both sites has been configured as Static IP Address. For site A, the local quick mode selector is 192. 16. 1.0/24 and the remote quick mode selector is 192. 16.2.0/24. How must the administrator configure the local quick mode selector for site B?
An administrator has configured outgoing Interface any in a firewall policy. Which statement is true about the policy list view?
13
Which two inspection modes can you use to configure a firewall policy on a profile-based next-generation firewall (NGFW)? (Choose two.)
An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel.
Which DPD mode on FortiGate will meet the above requirement?
18
If the Issuer and Subject values are the same in a digital certificate, which type of entity was the certificate issued to?
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
You have enabled logging on a FortiGate device for event logs and all security logs, and you have set up logging to use the FortiGate local disk.
What is the default behavior when the local disk is full?
When a firewall policy is created, which attribute is added to the policy to support recording logs to a FortiAnalyzer or a FortiManager and improves functionality when a FortiGate is integrated with these devices?
An administrator must disable RPF check to investigate an issue.
Which method is best suited to disable RPF without affecting features like antivirus and intrusion prevention system?
27
Which feature in the Security Fabric takes one or more actions based on event triggers?
An employee needs to connect to the office through a high-latency internet connection.
Which SSL VPN setting should the administrator adjust to prevent SSL VPN negotiation failure?
Which three security features require the intrusion prevention system (IPS) engine to function? (Choose three.)
Examine the exhibit, which contains a virtual IP and firewall policy configuration.
The WAN (port1) interface has the IP address 10.200. 1. 1/24. The LAN (port2) interface has the IP address 10.0. 1.254/24.
The first firewall policy has NAT enabled on the outgoing interface address. The second firewall policy is configured with a VIP as the destination address. Which IP address will be used to source NAT the Internet traffic coming from a workstation with the IP address 10.0. 1. 10/24?
68
If the Services field is configured in a Virtual IP (VIP), which statement is true when central NAT is used?
An administrator wants to configure timeouts for users. Regardless of the userTMs behavior, the timer should start as soon as the user authenticates and expire after the configured value.
Which timeout option should be configured on FortiGate?
Refer to the exhibits to view the firewall policy (Exhibit A) and the antivirus profile (Exhibit B).
Which statement is correct if a user is unable to receive a block replacement message when downloading an infected file for the first time?
Refer to the exhibit showing a debug flow output.
Which two statements about the debug flow output are correct? (Choose two.)