Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Fortinet FCSS_EFW_AD-7.4 FCSS - Enterprise Firewall 7.4 Administrator Exam Practice Test

Demo: 17 questions
Total 57 questions

FCSS - Enterprise Firewall 7.4 Administrator Questions and Answers

Question 1

An administrator is designing an ADVPN network for a large enterprise with spokes that have varying numbers of internet links. They want to avoid a high number of routes and peer connections at the hub.

Which method should be used to simplify routing and peer management?

Options:

A.

Deploy a full-mesh VPN topology to eliminate hub dependency.

B.

Implement static routing over IPsec interfaces for each spoke.

C.

Use a dynamic routing protocol using loopback interfaces to streamline peers and routes.

D.

Establish a traditional hub-and-spoke VPN topology with policy routes.

Question 2

Refer to the exhibit, which shows theADVPNIPsec interface representing the VPN IPsec phase 1 from Hub A to Spoke 1 and Spoke 2, and from Hub В to Spoke 3 and Spoke 4.

An administrator must configure an ADVPN using IBGP and EBGP to connect overlay network 1 with 2.

What must the administrator configure in the phase 1 VPN IPsec configuration of theADVPNtunnels?

Options:

A.

set auto-discovery-sender enable and set network-id x

B.

set auto-discovery-forwarder enable and set remote-as x

C.

set auto-discovery-crossover enable and set enforce-multihop enable

D.

set auto-discovery-receiver enable and set npu-offload enable

Question 3

What is the initial step performed by FortiGate when handling the first packets of a session?

Options:

A.

Installation of the session key in the network processor (NP)

B.

Data encryption and decryption

C.

Security inspections such as ACL, HPE, and IP integrity header checking

D.

Offloading the packets directly to the content processor (CP)

Question 4

A vulnerability scan report has revealed that a user has generated traffic to the website example.com (10.10.10.10) using a weak SSL/TLS version supported by the HTTPS web server.

What can the firewall administrator do to block all outdated SSL/TLS versions on any HTTPS web server to prevent possible attacks on user traffic?

Options:

A.

Configure the unsupported SSL version and set the minimum allowed SSL version in the HTTPS settings of the SSL/SSH inspection profile.

B.

Enable auto-detection of outdated SSL/TLS versions in the SSL/SSH inspection profile to block vulnerable websites.

C.

Install the required certificate in the client's browser or use Active Directory policies to block specific websites as defined in the SSL/SSH inspection profile.

D.

Use the latest certificate, Fortinet_SSL_ECDSA256, and replace the CA certificate in the SSL/SSH inspection profile.

Question 5

Refer to the exhibit, which shows a partial troubleshooting command output.

An administrator is extensively using IPsec on FortiGate. Many tunnels show information similar to the output shown in the exhibit.

What can the administrator conclude?

Options:

A.

IPsec SAs cannot be offloaded.

B.

The two IPsec SAs, inbound and outbound, are copied to the NPU.

C.

Only the outbound IPsec SA is copied to the NPU.

D.

Only the inbound IPsec SA is copied to the NPU.

Question 6

The IT department discovered during the last network migration that all zero phase selectors in phase 2 IPsec configurations impacted network operations.

What are two valid approaches to prevent this during future migrations? (Choose two.)

Options:

A.

Use routing protocols to specify allowed subnets over the tunnel.

B.

Configure an IPsec-aggregate to create redundancy between each firewall peer.

C.

Clearly indicate to the VPN which segments will be encrypted in the phase two selectors.

D.

Configure an IP address on the IPsec interface of each firewall to establish unique peer connections and avoid impacting network operations.

Question 7

Refer to the exhibit, which contains a partial VPN configuration.

What can you conclude from this VPN IPsec phase 1 configuration?

Options:

A.

This configuration is the best for networks with regular traffic intervals, providing a balance between connectivity assurance and resource utilization.

B.

Peer IDs are unencrypted and exposed, creating a security risk.

C.

FortiGate will not add a route to its routing or forwarding information base when the dynamic tunnel is negotiated.

D.

A separate interface is created for each dial-up tunnel, which can be slower and more resource intensive, especially in large networks.

Question 8

Refer to the exhibit, which contains a partial command output.

The administrator has configured BGP on FortiGate. The status of this new BGP configuration is shown in the exhibit.

What configuration must the administrator consider next?

Options:

A.

Configure a static route to 100.65.4.1.

B.

Configure the local AS to 65300.

C.

Contact the remote peer administrator to enable BGP

D.

Enable ebgp-enforce-multihop.

Question 9

Refer to the exhibit, which shows a network diagram showing the addition of site 2 with an overlapping network segment to the existing VPN IPsec connection between the hub and site 1.

Which IPsec phase 2 configuration must an administrator make on the FortiGate hub to enable equal-cost multi-path (ECMP) routing when multiple remote sites connect with overlapping subnets?

Options:

A.

Set route-overlap to either use-new or use-old

B.

Set net-device to ecmp

C.

Set single-source to enable

D.

Set route-overlap to allow

Question 10

A company's users on an IPsec VPN between FortiGate A and B have experienced intermittent issues since implementing VXLAN. The administrator suspects that packets exceeding the 1500-byte default MTU are causing the problems.

In which situation would adjusting the interface’s maximum MTU value help resolve issues caused by protocols that add extra headers to IP packets?

Options:

A.

Adjust the MTU on interfaces only if FortiGate has the FortiGuard enterprise bundle, which allows MTU modification.

B.

Adjust the MTU on interfaces in all FortiGate devices that support the latest family of Fortinet SPUs: NP7, CP9 and SP5.

C.

Adjust the MTU on interfaces in controlled environments where all devices along the path allow MTU interface changes.

D.

Adjust the MTU on interfaces only in wired connections like PPPoE, optic fiber, and ethernet cable.

Question 11

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

The administrator must configure the BGP section of FortiGate A to give internet access to the enterprise network.

Which command must the administrator use to establish a connection with the internet service provider?

Options:

A.

config neighbor

B.

config redistribute bgp

C.

config router route-map

D.

config redistribute ospf

Question 12

A FortiGate device with UTM profiles is reaching the resource limits, and the administrator expects the traffic in the enterprise network to increase.

The administrator has received an additional FortiGate of the same model.

Which two protocols should the administrator use to integrate the additional FortiGate device into this enterprise network? (Choose two.)

Options:

A.

FGSP with external load balancers

B.

FGCP in active-active mode and with switches

C.

FGCP in active-passive mode and with VDOM disabled

D.

VRRP with switches

Question 13

An administrator wants to scale the IBGP sessions and optimize the routing table in an IBGP network.

Which parameter should the administrator configure?

Options:

A.

network-import-check

B.

ibgp-enforce-multihop

C.

neighbor-group

D.

route-reflector-client

Question 14

Refer to the exhibit, which shows a revision history window in the FortiManager device layer.

The IT team is trying to identify the administrator responsible for the most recent update in the FortiGate device database.

Which conclusion can you draw about this scenario?

Options:

A.

This retrieved process was automatically triggered by a Remote FortiGate Directly (via CLI) script.

B.

The user script_manager is an API user from the Fortinet Developer Network (FDN) retrieving a configuration.

C.

To identify the user who created the event, check it on the Configuration and Installation widget on FortiGate within the FortiManager device layer.

D.

Find the user in the FortiManager system logs and use the type=script command to find the administrator user in the user field.

Question 15

Refer to the exhibit.

A pre-run CLI template that is used in zero-touch provisioning (ZTP) and low-touch provisioning (LTP) with FortiManager is shown.

The template is not assigned even though the configuration has already been installed on FortiGate.

What is true about this scenario?

Options:

A.

The administrator did not assign the template correctly when adding the model device because pre-CLI templates remain permanently assigned to the firewall

B.

Pre-run CLI templates are automatically unassigned after their initial installation

C.

Pre-run CLI templates for ZTP and LTP must be unassigned manually after the first installation to avoid conflicting error objects when importing a policy package

D.

The administrator must use post-run CLI templates that are designed for ZTP and LTP

Question 16

Refer to the exhibit, which shows a physical topology and a traffic log.

The administrator is checking on FortiAnalyzer traffic from the device with IP address10.1.10.1, located behind the FortiGate ISFW device.

The firewall policy in on the ISFW device does not have UTM enabled and the administrator is surprised to see a log with the actionMalware, as shown in the exhibit.

What are the two reasons FortiAnalyzer would display this log? (Choose two.)

Options:

A.

Security rating is enabled in ISFW.

B.

ISFW is in a Security Fabric environment.

C.

ISFW is not connected to FortiAnalyzer and must go through NGFW-1.

D.

The firewall policy in NGFW-1 has UTM enabled.

Question 17

What does the command set forward-domain in a transparent VDOM interface do?

Options:

A.

It configures the interface to prioritize traffic based on the domain ID, enhancing quality of service for specified VLANs.

B.

It isolates traffic within a specific VLAN by assigning a broadcast domain to an interface based on the VLAN ID.

C.

It restricts the interface to managing traffic only from the specified VLAN, effectively segregating network traffic.

D.

It assigns a unique domain ID to the interface, allowing it to operate across multiple VLANs within the same VDOM.

Demo: 17 questions
Total 57 questions