New Year Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet FCSS_EFW_AD-7.6 Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Exam Practice Test

Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Questions and Answers

Question 1

A company's users on an IPsec VPN between FortiGate A and B have experienced intermittent issues since implementing VXLAN. The administrator suspects that packets exceeding the 1500-byte default MTU are causing the problems.

In which situation would adjusting the interface’s maximum MTU value help resolve issues caused by protocols that add extra headers to IP packets?

Options:

A.

Adjust the MTU on interfaces only if FortiGate has the FortiGuard enterprise bundle, which allows MTU modification.

B.

Adjust the MTU on interfaces in all FortiGate devices that support the latest family of Fortinet SPUs: NP7, CP9 and SP5.

C.

Adjust the MTU on interfaces in controlled environments where all devices along the path allow MTU interface changes.

D.

Adjust the MTU on interfaces only in wired connections like PPPoE, optic fiber, and ethernet cable.

Question 2

Which two statements about IKEv2 are true if an administrator decides to implement IKEv2 in the VPN topology? (Choose two.)

Options:

A.

It includes stronger Diffie-Hellman (DH) groups, such as Elliptic Curve (ECP) groups.

B.

It supports interoperability with devices using IKEv1.

C.

It exchanges a minimum of two messages to establish a secure tunnel.

D.

It supports the extensible authentication protocol (EAP).

Question 3

Refer to the exhibit, which shows the VDOM section of a FortiGate device.

Question # 3

An administrator discovers that webfilter stopped working in Core1 and Core2 after a maintenance window.

Which two reasons could explain why webfilter stopped working? (Choose two.)

Options:

A.

The root VDOM does not have access to FortiManager in a closed network.

B.

The root VDOM does not have a VDOM link to connect with the Corel and Core2 VDOMs.

C.

The Core1 and Core2 VDOMs must also be enabled as Management VDOMs to receive FortiGuard updates

D.

The root VDOM does not have access to any valid public FDN.

Question 4

A company that acquired multiple branches across different countries needs to install new FortiGate devices on each of those branches. However, the IT staff lacks sufficient knowledge to implement the initial configuration on the FortiGate devices.

Which three approaches can the company take to successfully deploy advanced initial configurations on remote branches? (Choose three.)

Options:

A.

Use metadata variables to dynamically assign values according to each FortiGate device.

B.

Use provisioning templates and install configuration settings at the device layer.

C.

Use the Global ADOM to deploy global object configurations to each FortiGate device.

D.

Apply Jinja in the FortiManager scripts for large-scale and advanced deployments.

E.

Add FortiGate devices on FortiManager as model devices, and use ZTP or LTP to connect to FortiGate devices.

Question 5

Refer to the exhibit.

Question # 5

The partial output of an OSPF command is shown. You are checking the OSPF status of a FortiGate device when you receive the output shown in the exhibit. Based on the output, which two statements about FortiGate are correct? (Choose two answers)

Options:

A.

FortiGate is a backup designated router.

B.

FortiGate supports OSPF ECMP.

C.

FortiGate is in the area 0.0.0.5.

D.

FortiGate can inject external routing information.

Question 6

Refer to the exhibit.

Question # 6

A FortiGate segmented into VDOMs is shown. You must ensure effective and accelerated internet access for all of the VDOMs in this enterprise network. How can you achieve this? (Choose one answer)

Options:

A.

Connect a physical interface from each VDOM to the root VDOM.

B.

Create VDOM links.

C.

Configure network processing unit (NPU) vlinks.

D.

Create VLANs over network processing unit (NPU) vlinks.

Question 7

Refer to the exhibit, which shows a physical topology and a traffic log.

Question # 7

The administrator is checking on FortiAnalyzer traffic from the device with IP address 10.1.10.1, located behind the FortiGate ISFW device.

The firewall policy in on the ISFW device does not have UTM enabled and the administrator is surprised to see a log with the action Malware, as shown in the exhibit.

What are the two reasons FortiAnalyzer would display this log? (Choose two.)

Options:

A.

Security rating is enabled in ISFW.

B.

ISFW is in a Security Fabric environment.

C.

ISFW is not connected to FortiAnalyzer and must go through NGFW-1.

D.

The firewall policy in NGFW-1 has UTM enabled.

Question 8

A FortiGate device with UTM profiles is reaching the resource limits, and the administrator expects the traffic in the enterprise network to increase.

The administrator has received an additional FortiGate of the same model.

Which two protocols should the administrator use to integrate the additional FortiGate device into this enterprise network? (Choose two.)

Options:

A.

FGSP with external load balancers

B.

FGCP in active-active mode and with switches

C.

FGCP in active-passive mode and with VDOM disabled

D.

VRRP with switches

Question 9

Refer to the exhibit, which shows an OSPF network.

Question # 9

Which configuration must the administrator apply to optimize the OSPF database?

Options:

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

Question 10

Refer to the exhibits.

Question # 10

Question # 10

The Administrators section of a root FortiGate device and the Security Fabric Settings section of a downstream FortiGate device are shown.

When prompted to sign in with Security Fabric in the downstream FortiGate device, a user enters the AdminSSO credentials.

What is the next status for the user?

Options:

A.

The user is prompted to create an SSO administrator account for AdminSSO.

B.

The user receives an authentication failure message.

C.

The user accesses the downstream FortiGate with super_admin_readonly privileges.

D.

The user accesses the downstream FortiGate with super_admin privileges.

Question 11

Refer to the exhibit, which shows a revision history window in the FortiManager device layer.

Question # 11

The IT team is trying to identify the administrator responsible for the most recent update in the FortiGate device database.

Which conclusion can you draw about this scenario?

Options:

A.

This retrieved process was automatically triggered by a Remote FortiGate Directly (via CLI) script.

B.

The user script_manager is an API user from the Fortinet Developer Network (FDN) retrieving a configuration.

C.

To identify the user who created the event, check it on the Configuration and Installation widget on FortiGate within the FortiManager device layer.

D.

Find the user in the FortiManager system logs and use the type=script command to find the administrator user in the user field.

Question 12

An administrator must minimize CPU and RAM use on a FortiGate firewall while also enabling essential security features, such as web filtering and application control for HTTPS traffic.

Which SSL inspection setting helps reduce system load while also enabling security features, such as web filtering and application control for encrypted HTTPS traffic?

Options:

A.

Use full SSL inspection to thoroughly inspect encrypted payloads.

B.

Disable SSL inspection entirely to conserve resources.

C.

Configure SSL inspection to handle HTTPS traffic efficiently.

D.

Enable SSL certificate inspection mode to perform basic checks without decrypting traffic.

Question 13

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

Options:

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.

The ISDB limits access by URL and domain.

Question 14

An administrator is extensively using VXLAN on FortiGate.

Which specialized acceleration hardware does FortiGate need to improve its performance?

Options:

A.

NP7

B.

SP5

C.

СР9

D.

NTurbo

Question 15

The IT department discovered during the last network migration that all zero phase selectors in phase 2 IPsec configurations impacted network operations.

What are two valid approaches to prevent this during future migrations? (Choose two.)

Options:

A.

Use routing protocols to specify allowed subnets over the tunnel.

B.

Configure an IPsec-aggregate to create redundancy between each firewall peer.

C.

Clearly indicate to the VPN which segments will be encrypted in the phase two selectors.

D.

Configure an IP address on the IPsec interface of each firewall to establish unique peer connections and avoid impacting network operations.

Question 16

An administrator must standardize the deployment of FortiGate devices across branches with consistent interface roles and policy packages using FortiManager.

What is the recommended best practice for interface assignment in this scenario?

Options:

A.

Enable metadata variables to use dynamic configurations in the standard interfaces of FortiManager.

B.

Use the Install On feature in the policy package to automatically assign different interfaces based on the branch.

C.

Create interfaces using device database scripts to use them on the same policy package of FortiGate devices.

D.

Create normalized interface types per-platform to automatically recognize device layer interfaces based on the FortiGate model and interface name.

Question 17

Refer to the exhibit.

Question # 17

The partial output of an OSPF command is shown. While checking the OSPF status of FortiGate, you receive the output shown in the exhibit. Based on the output, which two statements about FortiGate are correct? (Choose two answers)

Options:

A.

FortiGate has OSPF ECMP enabled.

B.

FortiGate is a backup designated router.

C.

FortiGate injects external routing information.

D.

FortiGate is connected to multiple areas.

Question 18

Refer to the exhibit.

Question # 18

A physical topology along with a traffic log is shown. You are using FortiAnalyzer to monitor traffic from the device with IP address 10.0.2.51, which is located behind the FortiGate internal segmentation firewall (ISFW) device. Unified threat management (UTM) is not enabled in the firewall policy on the HQ-ISFW device, and you are surprised to see a log with the action Malware, as shown in the exhibit. What are two reasons why FortiAnalyzer would display this log? (Choose two answers)

Options:

A.

HQ-ISFW is not connected to FortiAnalyzer and traffic must go through HQ-NGFW-1.

B.

UTM is enabled in the firewall policy in HQ-NGFW-1.

C.

HQ-ISFW is in a Security Fabric environment.

D.

Security rating is enabled in HQ-ISFW.

Question 19

Refer to the exhibit, which shows a command output.

Question # 19

FortiGate_A and FortiGate_B are members of an FGSP cluster in an enterprise network.

While testing the cluster using the ping command, the administrator monitors packet loss and found that the session output on FortiGate_B is as shown in the exhibit.

What could be the cause of this output on FortiGate_B?

Options:

A.

The session synchronization is encrypted.

B.

session-pickup-connectionless is set to disable on FortiGate_B.

C.

FortiGate_B is configured in passive mode.

D.

FortiGate_A and FortiGate_B have the same standalone-group-id value.