Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Fortinet FCP_FGT_AD-7.6 FortiGate 7.6 Administrator FCP_FGT_AD-7.6 Exam Practice Test

Page: 1 / 5
Total 48 questions

FortiGate 7.6 Administrator FCP_FGT_AD-7.6 Questions and Answers

Question 1

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

Options:

A.

The collector agent uses a Windows API to query DCs for user logins.

B.

NetAPI polling can increase bandwidth usage in large networks.

C.

The NetSessionEnum function is used to track user logouts.

D.

The collector agent must search Windows application event logs.

Question 2

You have configured the below commands on a FortiGate.

Question # 2

What would be the impact of this configuration on FortiGate?

Options:

A.

FortiGate will enable strict RPF on ail its interfaces and port1 will be enable for asymmetric routing.

B.

FortiGate will enable strict RPF on all its interfaces and port1 will be exempted from RPF checks.

C.

Port1 will be enabled with flexible RPF, and all other interfaces will be enabled for strict RPF

D.

The global configuration will take precedence and FortiGate will enable strict RPF on all interfaces.

Question 3

An administrator wanted to configure an IPS sensor to block traffic that triggers a signature set number of times during a specific time period.

How can the administrator achieve the objective?

Options:

A.

Use IPS group signatures, set rate-mode 60.

B.

Use IPS packet logging option with periodical filter option.

C.

Use IPS filter, rate-mode periodical option.

D.

Use IPS filter, rate-mode periodical option.

Question 4

Refer to the exhibit.

Question # 4

What would be the impact of these settings on the Server certificate SNI check configuration on FortiGate?

Options:

A.

FortiGate will accept and use the CN in the server certificate for URL filtering if the SNI does not match the CN or SAN fields.

B.

FortiGate will accept the connection with a warning if the SNI does not match the CN or SAN fields.

C.

FortiGate will close the connection if the SNI does not match the CN or SAN fields.

D.

FortiGate will close the connection if the SNI does not match the CN and SAN fields

Question 5

Refer to the exhibits.

Question # 5

Based on the current HA status, an administrator updates the override and priority parameters on HQ-NGFW-1 and HQ-NGFW-2 as shown in the exhibit.

What would be the expected outcome in the HA cluster?

Options:

A.

HQ-NGFW-1 will synchronize the override disable setting with HQ-NGFW-2.

B.

HQ-NGFW-2 will take over as the primary because it has the override enable setting and higher priority than HQ-NGFW-1.

C.

HQ-NGFW-1 will remain the primary because HQ-NGFW-2 has lower priority.

D.

The HA cluster will become out of sync because the override setting must match on all HA members.

Question 6

What is the primary FortiGate election process when the HA override setting is enabled?

Options:

A.

Connected monitored ports > Priority > HA uptime > FortiGate serial number

B.

Connected monitored ports > Priority > System uptime > FortiGate serial number

C.

Connected monitored ports > HA uptime > Priority > FortiGate serial number

D.

Connected monitored ports > System uptime > Priority > FortiGate serial number

Question 7

Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.

Question # 7

Based on the exhibit, which statement is true?

Options:

A.

The Underlay zone is the zone by default.

B.

The Underlay zone contains no member.

C.

port2 and port3 are not assigned to a zone.

D.

The virtual-wan-link and overlay zones can be deleted.

Question 8

An administrator wants to configure dead peer detection (DPD) on IPsec VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when there is no inbound traffic.

Which DPD mode on FortiGate meets this requirement?

Options:

A.

Enabled

B.

On Idle

C.

Disabled

D.

On Demand

Question 9

FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively.

Which two statements about the requirements of connected physical interfaces on FortiGate are true? (Choose two.)

Options:

A.

Both interfaces must have the interface role assigned.

B.

Both interfaces must have directly connected routes on the routing table.

C.

Both interfaces must have DHCP enabled and interfaces set to LAN and DMZ roles assigned.

D.

Both interfaces must have IP addresses assigned.

Question 10

Which two statements are correct when FortiGate enters conserve mode? (Choose two.)

Options:

A.

FortiGate continues to run critical security actions, such as quarantine.

B.

FortiGate refuses to accept configuration changes.

C.

FortiGate halts complete system operation and requires a reboot to regain available resources.

D.

FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled.

Question 11

Which three statements explain a flow-based antivirus profile? (Choose three.)

Options:

A.

FortiGate buffers the whole file but transmits to the client at the same time.

B.

Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.

C.

If a virus is detected, the last packet is delivered to the client.

D.

Flow-based inspection optimizes performance compared to proxy-based inspection.

E.

The IPS engine handles the process as a standalone.

Question 12

Which two statements are true about an HA cluster? (Choose two.)

Options:

A.

An HA cluster cannot have both in-band and out-of-band management interfaces at the same time.

B.

Link failover triggers a failover if the administrator sets the interface down on the primary device.

C.

When sniffing the heartbeat interface, the administrator must see the IP address 169.254.0.2.

D.

HA incremental synchronization includes FIB entries and IPsec SAs.

Question 13

Refer to the exhibit.

Question # 13

An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow. This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

Options:

A.

The ABC.Com Type is set as Application instead of Filter.

B.

The ABC.Com is configured under application profile, which must be configured as a web filter profile.

C.

The ABC.Com Action is set to Allow.

D.

The ABC.Com is hitting the category Excessive-Bandwidth.

Question 14

Question # 14

Refer to the exhibits.

You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.

Which two factors can you observe from these configurations? (Choose two.)

Options:

A.

YouTube search is allowed based on the Google Application and Filter override settings.

B.

YouTube access is blocked based on Excessive-Bandwidth Application and Filter override settings.

C.

Facebook access is allowed but you cannot play Facebook videos based on Video/Audio category filter settings.

D.

Facebook access is blocked based on the category filter settings.

Page: 1 / 5
Total 48 questions