New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

FCP_FGT_AD-7.4 FCP - FortiGate 7.4 Administrator Questions and Answers

Questions 4

Which two pieces of information are synchronized between FortiGate HA members? (Choose two.)

Options:

A.

OSPF adjacencies

B.

IPsec security associations

C.

BGP peerings

D.

DHCP leases

Buy Now
Questions 5

Refer to the exhibits.

The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details.

Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?

Options:

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.

B.

Apple FaceTime will be allowed, based on the Apple filter configuration.

C.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.

D.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.

Buy Now
Questions 6

A network administrator has configured an SSL/SSH inspection profile defined for full SSL inspection and set with a private CA certificate. The firewall policy that allows the traffic uses this profile for SSL inspection and performs web filtering. When visiting any HTTPS websites, the browser reports certificate warning errors.

What is the reason for the certificate warning errors?

Options:

A.

The SSL cipher compliance option is not enabled on the SSL inspection profile. This setting is required when the SSL inspection profile is defined with a private CA certificate.

B.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

C.

The browser does not recognize the certificate in use as signed by a trusted CA.

D.

With full SSL inspection it is not possible to avoid certificate warning errors at the browser level.

Buy Now
Questions 7

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

Options:

A.

Strict RPF checks the best route back to the source using the incoming interface.

B.

Strict RPF allows packets back to sources with all active routes.

C.

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

D.

Strict RPF check is run on the first sent and reply packet of any new session.

Buy Now
Questions 8

Refer to the exhibit to view the firewall policy.

Why would the firewall policy not block a well-known virus, for example eicar?

Options:

A.

The action on the firewall policy is not set to deny.

B.

The firewall policy is not configured in proxy-based inspection mode.

C.

Web filter is not enabled on the firewall policy to complement the antivirus profile.

D.

The firewall policy does not apply deep content inspection.

Buy Now
Questions 9

FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.

Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)

Options:

A.

www.example.com:443

B.

www.example.com

C.

www.example.com/index.hrml

D.

example.com

Buy Now
Questions 10

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)

Options:

A.

The issuer must be a public CA

B.

The CA extension must be set to TRUE

C.

The Authority Key Identifier must be of type SSL

D.

The keyUsage extension must be set to

Buy Now
Questions 11

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.

Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

Options:

A.

On HQ-FortiGate, disable Diffie-Helman group 2.

B.

On Remote-FortiGate, set port2 as Interface.

C.

On both FortiGate devices, set Dead Peer Detection to On Demand.

D.

On HQ-FortiGate, set IKE mode to Main (ID protection).

Buy Now
Questions 12

Which two statements are correct when FortiGate enters conserve mode? (Choose two.)

Options:

A.

FortiGate halts complete system operation and requires a reboot to regain available resources

B.

FortiGate refuses to accept configuration changes

C.

FortiGate continues to run critical security actions, such as quarantine.

D.

FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled

Buy Now
Questions 13

Refer to the exhibit.

Examine the intrusion prevention system (IPS) diagnostic command shown in the exhibit.

If option 5 is used with the IPS diagnostic command and the outcome is a decrease in the CPU usage, what is the correct conclusion?

Options:

A.

The IPS engine is blocking all traffic.

B.

The IPS engine is inspecting a high volume of traffic.

C.

The IPS engine is unable to prevent an intrusion attack.

D.

The IPS engine will continue to run in a normal state.

Buy Now
Questions 14

Refer to the exhibits, which show the firewall policy and an antivirus profile configuration.

Why is the user unable to receive a block replacement message when downloading an infected file for the first time?

Options:

A.

The intrusion prevention security profile must be enabled when using flow-based inspection mode.

B.

The option to send files to FortiSandbox for inspection is enabled.

C.

The firewall policy performs a full content inspection on the file.

D.

Flow-based inspection is used, which resets the last packet to the user.

Buy Now
Questions 15

Refer to the exhibits.

An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).

What must the administrator do to synchronize the address object?

Options:

A.

Change the csf setting on Local-FortiGate (root) to sec fabric-object-unification default.

B.

Change the csf setting on both devices to sec downscream-access enable.

C.

Change the csf setting on ISFW (downstream) to sec auchorizacion-requesc-cype certificace.

D.

Change the csf setting on ISFW (downstream) to sec configuration-sync local.

Buy Now
Questions 16

Refer to the exhibit showing a FortiGuard connection debug output.

Based on the output, which two facts does the administrator know about the FortiGuard connection? (Choose two.)

Options:

A.

One server was contacted to retrieve the contract information.

B.

There is at least one server that lost packets consecutively.

C.

A local FortiManaqer is one of the servers FortiGate communicates with.

D.

FortiGate is using default FortiGuard communication settings.

Buy Now
Questions 17

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name.

FortiGate allows the traffic according to policy ID 1. This is the policy that allows SD-WAN traffic.

Despite these settings the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows.

What can be the reason?

Options:

A.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

B.

There is no application control profile applied to the firewall policy.

C.

Destination in the SD-WAN rules are configured per application but the feature visibility is not enabled.

D.

SD-WAN rule names do not appear immediately. The administrator needs to refresh the page.

Buy Now
Questions 18

An employee needs to connect to the office through a high-latency internet connection.

Which SSL VPN setting should the administrator adjust to prevent SSL VPN negotiation failure?

Options:

A.

SSL VPN idle-timeout

B.

SSL VPN login-timeout

C.

SSL VPN dtls-hello-timeout

D.

SSL VPN session-ttl

Buy Now
Questions 19

How can you disable RPF checking?

Options:

A.

Disable src-check on the interface level settings

B.

Unset fail-alert-interfaces on the interface level settings.

C.

Disable fail-detect on the interface level settings.

D.

Disable strict-src-check under system settings.

Buy Now
Questions 20

FortiGate is integrated with FortiAnalyzer and FortiManager.

When a firewall policy is created, which attribute is added to the policy to improve functionality and to support recording logs to FortiAnalyzer or FortiManager?

Options:

A.

Log ID

B.

Policy ID

C.

Sequence ID

D.

Universally Unique Identifier

Buy Now
Questions 21

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

Options:

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Buy Now
Questions 22

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

Options:

A.

The host field in the HTTP header.

B.

The server name indication (SNI) extension in the client hello message.

C.

The subject alternative name (SAN) field in the server certificate.

D.

The subject field in the server certificate.

E.

The serial number in the server certificate.

Buy Now
Questions 23

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

Options:

A.

The NetSessionEnum function is used to track user logouts.

B.

NetAPI polling can increase bandwidth usage in large networks.

C.

The collector agent must search Windows application event logs.

D.

The collector agent uses a Windows API to query DCs for user logins.

Buy Now
Questions 24

Which three methods are used by the collector agent for AD polling? (Choose three.)

Options:

A.

WinSecLog

B.

WMI

C.

NetAPI

D.

FSSO REST API

E.

FortiGate polling

Buy Now
Questions 25

Which method allows management access to the FortiGate CLI without network connectivity?

Options:

A.

SSH console

B.

CLI console widget

C.

Serial console

D.

Telnet console

Buy Now
Exam Code: FCP_FGT_AD-7.4
Exam Name: FCP - FortiGate 7.4 Administrator
Last Update: Dec 22, 2024
Questions: 86
FCP_FGT_AD-7.4 pdf

FCP_FGT_AD-7.4 PDF

$25.5  $84.99
FCP_FGT_AD-7.4 Engine

FCP_FGT_AD-7.4 Testing Engine

$30  $99.99
FCP_FGT_AD-7.4 PDF + Engine

FCP_FGT_AD-7.4 PDF + Testing Engine

$40.5  $134.99