Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet FCSS_EFW_AD-7.6 Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Exam Practice Test

Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Questions and Answers

Question 1

Refer to the exhibit, which contains the partial output of an OSPF command.

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

Which statement on this FortiGate device is correct?

Options:

A.

The FortiGate device can inject external routing information.

B.

The FortiGate device is in the area 0.0.0.5.

C.

The FortiGate device does not support OSPF ECMP.

D.

The FortiGate device is a backup designated router.

Question 2

Which two parameters must you configure in neighbor-range for ADVPN iBGP deployment?

Options:

A.

route-reflector-client

B.

neighbor-group

C.

remote-as

D.

update-source

Question 3

Refer to the exhibit.

Question # 3

The packet capture output of a client hello message is shown.

You are updating a firewall policy that includes SSL certificate inspection. You are capturing packets from the traffic passing through this firewall policy.

Which two statements about the packet capture are correct? (Choose two.)

Options:

A.

You can effectively apply an antivirus security profile to this traffic.

B.

You can effectively apply a web filtering profile to this traffic.

C.

The subject alternative name (SAN) is necessary to apply security profiles.

D.

The client supports only TLS versions 1.2 and 1.3.

Question 4

Refer to the exhibit, which shows the packet capture output of a three-way handshake between FortiGate and FortiManager Cloud.

What two conclusions can you draw from the exhibit? (Choose two.)

Options:

A.

FortiGate will receive a certificate that supports multiple domains because FortiManager operates in a cloud computing environment.

B.

FortiGate is connecting to the same IP server and will receive an independent certificate for its connection between FortiGate and FortiManager Cloud.

C.

If the TLS handshake contains 17 cipher suites it means the TLS version must be 1.0 on this three-way handshake.

D.

The wildcard for the domain *.fortinet-ca2.support.fortinet.com must be supported by FortiManager Cloud.

Question 5

Refer to the exhibit, which shows a hub and spokes deployment.

Question # 5

An administrator is deploying several spokes, including the BGP configuration for the spokes to connect to the hub.

Which two commands allow the administrator to minimize the configuration? (Choose two.)

Options:

A.

neighbor-group

B.

route-reflector-client

C.

neighbor-range

D.

ibgp-enforce-multihop

Question 6

Refer to the exhibit, which shows a partial enterprise network.

Question # 6

An administrator would like the area 0.0.0.0 to detect the external network.

What must the administrator configure?

Options:

A.

Enable RIP redistribution on FortiGate B.

B.

Configure a distribute-route-map-in on FortiGate B.

C.

Configure a virtual link between FortiGate A and B.

D.

Set the area 0.0.0.l type to stub on FortiGate A and B.

Question 7

Which two recommendations prevent invalid paths when using zero phase 2 selectors?

Options:

A.

Routing protocols

B.

Exact selectors

C.

Aggregate IPsec

D.

Assign tunnel IP

Question 8

The IT department discovered during the last network migration that all zero phase selectors in phase 2 IPsec configurations impacted network operations.

What are two valid approaches to prevent this during future migrations? (Choose two.)

Options:

A.

Use routing protocols to specify allowed subnets over the tunnel.

B.

Configure an IPsec-aggregate to create redundancy between each firewall peer.

C.

Clearly indicate to the VPN which segments will be encrypted in the phase two selectors.

D.

Configure an IP address on the IPsec interface of each firewall to establish unique peer connections and avoid impacting network operations.

Question 9

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

Question # 9

An administrator must configure a loopback as a BGP source to connect to the ISP.

Which two commands are required to establish the connection? (Choose two.)

Options:

A.

ebgp-enforce-multihop

B.

update-source

C.

ibgp-enforce-multihop

D.

recursive-next-hop

Question 10

Which action should you take after applying a block-all IPS profile that caused applications to stop working?

Options:

A.

Disable IPS

B.

Use monitor mode

C.

Enable flow mode

D.

Remove server targets

Question 11

Which two statements about the LAN interface connection are correct?

Options:

A.

802.3ad

B.

SD-WAN

C.

FortiLink

D.

Enable STP

Question 12

How do you allow IPS inspection of inbound HTTPS traffic?

Options:

A.

Enable HTTP

B.

Enable HTTPS mapping

C.

Enable SMTPS

D.

Disable inspection

Question 13

You are trying to efficiently deploy ADVPN within the enterprise network. Which two approaches can facilitate this deployment? (Choose two.)

Options:

A.

On FortiManager, enable ADVPN on VPN Manager.

B.

On FortiGate, connect only the links with the best status.

C.

On FortiGate, utilize loopback interfaces to reduce the number of routes and peers.

D.

On FortiManager, activate the recommended IPsec tunnel provisioning templates and enable ADVPN.

Question 14

What is the initial step performed by FortiGate when handling the first packets of a session?

Options:

A.

Installation of the session key in the network processor (NP)

B.

Data encryption and decryption

C.

Security inspections such as ACL, HPE, and IP integrity header checking

D.

Offloading the packets directly to the content processor (CP)

Question 15

Based on the TLS handshake shown, what can be inferred about the client?

Options:

A.

Supports TLS 1.0 only

B.

Supports TLS 1.2 and TLS 1.3

C.

Supports SSLv3

D.

Supports DTLS

Question 16

Why do the firewall policy and reinstall preview show different address names during installation?

Options:

A.

Address mismatch

B.

Per-device mapping

C.

Object corruption

D.

Policy conflict

Question 17

Which two features can you use to segment an enterprise network?

Options:

A.

IPsec

B.

ZTNA

C.

VDOM

D.

VLAN

Question 18

Refer to the exhibit, which contains a partial VPN configuration.

Question # 18

What can you conclude from this VPN IPsec phase 1 configuration?

Options:

A.

This configuration is the best for networks with regular traffic intervals, providing a balance between connectivity assurance and resource utilization.

B.

Peer IDs are unencrypted and exposed, creating a security risk.

C.

FortiGate will not add a route to its routing or forwarding information base when the dynamic tunnel is negotiated.

D.

A separate interface is created for each dial-up tunnel, which can be slower and more resource intensive, especially in large networks.

Question 19

Which parameter must be configured to modify the MED value?

Options:

A.

route-overlap

B.

distribute-list-out

C.

prefix-list-out

D.

route-map-out

Question 20

A FortiGate device using unified threat management (UTM) profiles is reaching resource limits, and you expect traffic in your enterprise network to increase. You received an additional FortiGate of the same model.

Which two options should you consider using to integrate the additional FortiGate into your enterprise network? (Choose two.)

Options:

A.

FortiGate Session Life Support Protocol (FGSP) with external load balancers

B.

FortiGate Clustering Protocol (FGCP) in active-active (A-A) mode with switches

C.

Virtual Router Redundancy Protocol (VRRP) with switches

D.

FortiGate Clustering Protocol (FGCP) in active-passive (A-P) mode with VDOM disabled

Question 21

Refer to the exhibit.

The routing tables of FortiGate_A and FortiGate_B are shown. FortiGate_A and FortiGate_B are in the same autonomous system.

The administrator wants to dynamically add only route 172.16.1.248/30 on FortiGate_A.

What must the administrator configure?

Options:

A.

The prefix 172.16.1.248/30 in the BGP Networks section on FortiGate_B

B.

A BGP route map out for 172.16.1.248/30 on FortiGate_B

C.

Enable Redistribute Connected in the BGP section on FortiGate_B.

D.

A BGP route map in for 172.16.1.248/30 on FortiGate_A

Question 22

Refer to the exhibit.

A physical topology along with a traffic log is shown. You are using FortiAnalyzer to monitor traffic from the device with IP address 10.0.2.51, which is located behind the FortiGate internal segmentation firewall (ISFW) device. Unified threat management (UTM) is not enabled in the firewall policy on the HQ-ISFW device, and you are surprised to see a log with the action Malware, as shown in the exhibit. What are two reasons why FortiAnalyzer would display this log? (Choose two answers)

Options:

A.

HQ-ISFW is not connected to FortiAnalyzer and traffic must go through HQ-NGFW-1.

B.

UTM is enabled in the firewall policy in HQ-NGFW-1.

C.

HQ-ISFW is in a Security Fabric environment.

D.

Security rating is enabled in HQ-ISFW.

Question 23

Refer to the exhibit, which shows a network diagram showing the addition of site 2 with an overlapping network segment to the existing VPN IPsec connection between the hub and site 1.

Question # 23

Which IPsec phase 2 configuration must an administrator make on the FortiGate hub to enable equal-cost multi-path (ECMP) routing when multiple remote sites connect with overlapping subnets?

Options:

A.

Set route-overlap to either use-new or use-old

B.

Set net-device to ecmp

C.

Set single-source to enable

D.

Set route-overlap to allow

Question 24

How do you resolve object conflicts when importing a policy package?

Options:

A.

Rename

B.

FortiManager accept

C.

Non-default

D.

Retrieve config

Question 25

An administrator is designing an ADVPN network for a large enterprise with spokes that have varying numbers of internet links. They want to avoid a high number of routes and peer connections at the hub.

Which method should be used to simplify routing and peer management?

Options:

A.

Deploy a full-mesh VPN topology to eliminate hub dependency.

B.

Implement static routing over IPsec interfaces for each spoke.

C.

Use a dynamic routing protocol using loopback interfaces to streamline peers and routes.

D.

Establish a traditional hub-and-spoke VPN topology with policy routes.

Question 26

Refer to the exhibit, which shows an ADVPN network

An administrator must configure an ADVPN using IBGP and EBGP to connect overlay network 1 with 2.

What two options must the administrator configure in BGP? (Choose two.)

Options:

A.

set ebgp-enforce-multrhop enable

B.

set next-hop-self enable

C.

set ibgp-enforce-multihop advpn

D.

set attribute-unchanged next-hop

Question 27

Which hardware improves VXLAN performance?

Options:

A.

CPU

B.

NTurbo

C.

CP10

D.

NPU7

Question 28

Refer to the exhibits.

Question # 28

The configuration of a user ' s Windows PC, which has a default MTU of 1500 bytes, along with FortiGate interfaces set to an MTU of 1000 bytes, and the results of PC1 pinging server 172.16.0.254 are shown.

Why is the user in Windows PC1 unable to ping server 172.16.0.254 and is seeing the message: Packet needs to be fragmented but DF set?

Options:

A.

Option ip.flags.mf must be set to enable on FortiGate. The user has to adjust the ping MTU to 1000 to succeed.

B.

Fragmented packets must be encrypted. To connect any application successfully, the user must install the Fortinet_CA certificate in the Microsoft Management Console.

C.

FortiGate honors the do not fragment bit and the packets are dropped. The user has to adjust the ping MTU to 972 to succeed.

D.

The user must trigger different traffic because path MTU discovery techniques do not recognize ICMP payloads.

Question 29

Refer to the exhibit, which shows a revision history window in the FortiManager device layer.

Question # 29

The IT team is trying to identify the administrator responsible for the most recent update in the FortiGate device database.

Which conclusion can you draw about this scenario?

Options:

A.

This retrieved process was automatically triggered by a Remote FortiGate Directly (via CLI) script.

B.

The user script_manager is an API user from the Fortinet Developer Network (FDN) retrieving a configuration.

C.

To identify the user who created the event, check it on the Configuration and Installation widget on FortiGate within the FortiManager device layer.

D.

Find the user in the FortiManager system logs and use the type=script command to find the administrator user in the user field.

Question 30

What should be configured to provide hardware-accelerated inter-VDOM traffic?

Options:

A.

VDOM link

B.

NPU vlinks

C.

VLAN

D.

Physical link

Question 31

Refer to the exhibit.

An HA configuration of an active-active (A-A) cluster with the same HA uptime is shown. You want HQ-NGFW-2 to handle the Core2 VDOM traffic. Which modification must you make to achieve this outcome? (Choose one answer)

Options:

A.

Reboot HQ-NGFW-2.

B.

Change the priority from 100 to 160 for HQ-NGFW-2.

C.

Change the priority from 120 to 200 for HQ-NGFW-2.

D.

Enable override in virtual cluster 2 for HQ-NGFW-2.

Question 32

Which two statements about IKEv2 are true if an administrator decides to implement IKEv2 in the VPN topology? (Choose two.)

Options:

A.

It includes stronger Diffie-Hellman (DH) groups, such as Elliptic Curve (ECP) groups.

B.

It supports interoperability with devices using IKEv1.

C.

It exchanges a minimum of two messages to establish a secure tunnel.

D.

It supports the extensible authentication protocol (EAP).

Question 33

Refer to the exhibit, which shows the ADVPN network topology and partial BGP configuration.

Question # 33

Question # 33

Which two parameters must an administrator configure in the config neighbor range for spokes shown in the exhibit? (Choose two.)

Options:

A.

set max-neighbor-num 2

B.

set neighbor-group advpn

C.

set route-reflector-client enable

D.

set prefix 172.16.1.0 255.255.255.0