Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet NSE6_SDW_AD-7.6 Fortinet NSE 6 - SD-WAN 7.6 Enterprise Administrator Exam Practice Test

Fortinet NSE 6 - SD-WAN 7.6 Enterprise Administrator Questions and Answers

Question 1

Refer to the exhibits.

Question # 1

Question # 1

The exhibits show the SD-WAN zone configuration of an SD-WAN template prepared on FortiManager and the policy package configuration.

When the administrator tries to install the configuration changes, FortiManager fails to commit.

What should the administrator do to fix the issue?

Options:

A.

Configure branch1_fgt as the installation target for policy 3.

B.

Configure HUB1 as the destination of policy 3.

C.

Configure a normalized interface for the IPsec tunnel HUB1-VPN1.

D.

Configure both HUB1-VPN1 and HUB1-VPN2 as the destination of policy 3

Question 2

Refer to the exhibit.

Question # 2

The administrator analyzed the traffic between a branch FortiGate and the server located in the data center, and noticed the behavior shown in the diagram.

When the LAN clients located behind FGT1 establish a session to a server behind DC-1, the administrator observes that, on DC-1, the reply traffic is routed overT2. even though T1 is the preferred member in

the matching SD-WAN rule.

What can the administrator do to instruct DC-1 to route the reply traffic through the member with the best performance?

Options:

A.

Enable snat-route-change under config system global.

B.

Enable reply-session under config system sdwan.

C.

Enable auxiliary-session under config system settings.

D.

FortiGate route lookup for reply traffic only considers routes over the original ingress interface.

Question 3

Refer to the exhibit.

Question # 3

Which two conclusions can you draw from the output shown? (Choose two.)

Options:

A.

One SD-WAN rule is defined with application categories as the destination.

B.

UDP traffic destined to the subnet 10.22.0.0/24 matches a manual SD-WAN rule.

C.

One SD-WAN rule allows traffic load balancing.

D.

UDP traffic destined to the subnet 10.22.0.0/24 matches a policy route.

Question 4

(When you deploy SD-WAN, you can choose from several common designs. Each design best applies to specific contexts.

Which two statements correctly associate a common SD-WAN design with its main indication or constraint? Choose two answers.)

Options:

A.

Use a cloud on-ramp topology to improve the performance of cloud applications.

B.

Use a standalone design for sites with only one WAN link to the cloud.

C.

Use remote breakout to centralize traffic inspection and limit local management requirements.

D.

Use a direct internet access (DIA) design to increase the traffic security and allow local devices with limited capabilities.

Question 5

Refer to the exhibit.

Question # 5

An administrator configures SD-WAN rules for a DIA setup using the FortiGate GUI. The page to configure the source and destination part of the rule looks as shown in the exhibit. The GUI page shows no option to configure an application as the destination of the SD-WAN rule Why?

Options:

A.

You cannot use applications as the destination when FortiGate is used for a DIA setup.

B.

FortiGate allows the configuration of applications as the destination of SD-WAN rules only on the CLI.

C.

You must enable the feature on the CLI.

D.

You must enable the feature first using the GUI menu System > Feature Visibility.

Question 6

You have configured the performance SLA with the probe mode as Prefer Passive.

What are two observable impacts of this configuration? (Choose two.)

Options:

A.

FortiGate passively monitors the member if TCP traffic is passing through the member.

B.

After FortiGate switches to active mode, the SLA performance rule falls back to passive monitoring after 3 minutes.

C.

FortiGate passively monitors the member if ICMP traffic is passing through the member.

D.

During passive monitoring, the SLA performance rule cannot detect dead members.

E.

FortiGate can offload the traffic that is subject to passive monitoring to hardware.

Question 7

Refer to the exhibit.

Question # 7

The exhibit shows the details of a session and the index numbers of some relevant interfaces on a FortiGate device that supports hardware offloading.

Based on the information shown in the exhibits, which two conclusions can you draw? (Choose two.)

Options:

A.

By default, FortiGate offloads symmetric and asymmetric flows.

B.

The original direction of the symmetric traffic flows from port3 to port2.

C.

The reply direction of the asymmetric traffic flows from port2 to port3.

D.

The auxiliary session can be offloaded to hardware.

Question 8

As an MSSP administrator, you are asked to configure ADVPN on an existing SD-WAN topology. FortiManager manages the customer devices in a dedicated ADOM. The previous administrator used the SD-WAN overlay topology.

Which two statements apply to this scenario? (Choose two.)

Options:

A.

You can activate auto-discovery VPN in the SD-WAN overlay template only if it is a single hub topology.

B.

When auto-discovery VPN is enabled, FortiManager updates the IPsec and BGP templates in the hub.

C.

After you enable auto-discovery VPN in the overlay template, you must select between ADVPN 2.0 and ADVPN 1.0.

D.

You can activate auto-discovery VPN in the SD-WAN overlay template for any type of topology, including a primary-primary dual-hub topology.

Question 9

Within the context of SD-WAN, what does SIA correspond to?

Options:

A.

Remote Breakout

B.

Local Breakout

C.

Software Internet Access

D.

Secure Internet Authorization

Question 10

Refer to the exhibits.

Question # 10

You use FortiManager to manage the branch devices and configure the SD-WAN template. You have configured direct internet access (DIA) for the IT department users. Now. you must configure secure internet access (SIA) for all local LAN users and have set the firewall policies as shown in the second exhibit.

Then, when you use the install wizard to install the configuration and the policy package on the branch devices, FortiManager reports an error as shown in the third exhibit.

Which statement describes why FortiManager could not install the configuration on the branches?

Options:

A.

You must direct SIA traffic to a VPN tunnel.

B.

You cannot install firewall policies that reference an SD-WAN zone.

C.

You cannot install firewall policies that reference an SD-WAN member.

D.

You cannot install SIA and DIA rules on the same device.

Question 11

Which statement describes FortiGate behavior when you reference a zone in a static route?

Options:

A.

FoftiGate installs ECMP static routes for the first two members of the zone.

B.

FortiGate ignores the static routes defined through members referenced in the zone.

C.

FortiGate routes the traffic through the best performing member of the zone.

D.

FortiGate installs a static route for each member in the zone.

Question 12

Your FortiGate is in production. To optimize WAN link use and improve redundancy, you enable and configure SD-WAN.

What must you do as part of this configuration update process?

Options:

A.

Replace references to interfaces used as SD-WAN members in the routing configuration.

B.

Purchase and install the SD-WAN license, and reboot the FortiGate device.

C.

Replace references to interfaces used as SD-WAN members in the firewall policies.

D.

Disable the interface that you want to use as an SD-WAN member.

Question 13

Refer to the exhibit that shows an SD-WAN zone configuration on the FortiManager GUI.

Question # 13

Based on the exhibit, how will the FortiGate device behave after it receives this configuration?

Options:

A.

The configuration instructs FortiGate to choose an ADVPN shortcut based on SD-WAN information.

B.

The configuration instructs FortiGate to allow ADVPN shortcuts for the tunnels of this SD-WAN zone.

C.

The configuration instructs FortiGate to establish shortcuts only when at least two members meet the SLA target.

D.

The configuration instructs FortiGate to establish shortcuts only for overlay interfaces that meet the SLA target HUB1_HC.

Question 14

Refer to the exhibit.

Question # 14

The exhibit shows the health-check configuration on a FortiGate device used as a spoke. You notice that the hub FortiGate doesn’t prioritize the traffic as expected.

Which two configuration elements should you check on the hub? (Choose two.)

Options:

A.

The performance SLA has the parameter priority-out-sla configured.

B.

This performance SLA uses the same members.

C.

The performance SLA uses the same criteria.

D.

The performance SLA is configured with set embedded-measure accept.

Question 15

Refer to the exhibits, which show the configuration of an SD-WAN rule and the corresponding rule status and routing table.

Question # 15

Question # 15

The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule.

Based on the exhibits, what can the administrator expect for traffic matching the SD-WAN rule?

Options:

A.

The traffic will be routed over HUB1-VPN3.

B.

The traffic will be routed over HUB1-VPN2

C.

The traffic will be routed over HUB1-VPN1.

D.

The traffic will be load balanced across all three overlays

Question 16

(Refer to the exhibits.

Question # 16

Two SD-WAN event logs, the member status, the SD-WAN rule configuration, and the health-check configuration for a FortiGate device are shown.

Immediately after the log messages are displayed, how will the FortiGate steer the traffic based on the information shown in the exhibits? Choose one answer.)

Options:

A.

FortiGate skips SD-WAN rule ID 1.

B.

FortiGate uses port2 to steer the traffic for SD-WAN rule ID 1.

C.

FortiGate uses port1 to steer the traffic for SD-WAN rule ID 1.

D.

FortiGate uses port1 or port2 to steer the traffic for SD-WAN rule ID 1.

Question 17

Exhibit.

Question # 17

Two hub-and-spoke groups are connected through redundant site-to-site IPsec VPNs between Hub 1 and Hub 2

Which two configuration settings are required for the spoke A1 to establish an ADVPN shortcut with the spoke B2? (Choose two.)

Options:

A.

On hubs, auto-discovery-forwarder must be enabled on the IPsec VPNs to hubs.

B.

On hubs, auto-discovery-receiver must be enabled on the IPsec VPNs to spokes.

C.

On hubs, auto-discovery-forwarder must be enabled on the IPsec VPNs to spokes.

D.

On hubs, auto-diacovery-sender must be enabled on the IPsec VPNs to spokes

Question 18

(Refer to the exhibit.

Question # 18

Based on the output shown in the exhibit, what can you conclude about the device role and how it handles health checks? Choose one answer.)

Options:

A.

The device is a spoke and it provides embedded health-check measures for each tunnel to the hub.

B.

The device is a spoke and it receives health-check measures for the tunnels of another spoke.

C.

The device is a hub and it receives embedded health-check measures for each tunnel from the spoke.

D.

The device is a hub and it receives health-check measures for the tunnels of a spoke.

Question 19

Refer to the exhibit.

Question # 19

The exhibit shows the BGP configuration on the hub in a hub-and-spoke topology. The administrator wants BGP to advertise prefixes from spokes to other spokes over the IPsec overlays, including additional paths. However, when looking at the spoke routing table, the administrator does not see the prefixes from other spokes and the additional paths

Which three settings must the administrator configure inside each BGP neighbor group so spokes can learn the prefixes of other spokes and their additional paths? (Choose three.)

Options:

A.

Set additional-path to send

B.

Set additional-path to forward

C.

Enable route-reflector-server

D.

Enable route-reflector-client.

E.

Set adv-additional-path to the number of additional paths to advertise.

Question 20

The FortiGate devices are managed by ForliManager, and are configured for direct internet access (DIA). You confirm that DIA is working as expected for each branch, and check the SD-WAN zone configuration and firewall policies shown in the exhibits.

Question # 20

Question # 20

Question # 20

Then, you use the SD-WAN overlay template to configure the IPsec overlay tunnels. You create the associated SD-WAN rules to connect existing branches to the company hub device and apply the changes on the branches.

After those changes, users complain that they lost internet access. DIA is no longer working.

Based on the exhibit, which statement best describes the possible root cause of this issue?

Options:

A.

The SD-WAN overlay template defines a zone for each underlay interface and moves the interfaces into those zones.

B.

The SD-WAN overlay template didn’t configure a firewall policy to allow traffic through the overlay.

C.

The SD-WAN overlay template redefines the interface gateway addresses if they are defined with metadata variables.

D.

The SD-WAN overlay template updates the SD-WAN template and the rules.

Question 21

You used the HUB IPsec_Recommended and the BRANCH IPsec_Recommended templates to define the overlay topology. Then, you used the SD-WAN template to define the SD- WAN members, rules, and performance SLAs.

You applied the changes to the devices and want to use the FortiManager monitors menu to get a graphical view that shows the status of each SD-WAN member.

Which statement best explains how to obtain this graphical view?

Options:

A.

Use the SD-WAN monitor template view to get a map view of the branches, hub, and tunnel status, including the SLA pass or missed status.

B.

Use the SD-WAN monitor table view to get a donut view and a table view that shows the status of each SD-WAN member, including the SLA pass or missed status.

C.

Use the VPN monitor map view to get a map view of the branches, hub, and tunnel status, including the SLA pass or missed status.

D.

Use the SD-WAN monitor asset view to get a donut view and a table view that shows the status of each device and the SLA status of each SD-WAN member.

Question 22

Refer to the exhibits.

Question # 22

Question # 22

The interface details, static route configuration, and firewall policies on the managed FortiGate device are shown.

You want to configure a new SD-WAN zone, named Underlay, that contains the interfaces port1 and port2.

What must be your first action?

Options:

A.

Define port1 as an SD-WAN member.

B.

Delete the static routes.

C.

Delete the SD-WAN Zone Test.

D.

Delete the firewall policies.

Question 23

Exhibit.

Question # 23

Which action will FortiGate take if it detects SD-WAN members as dead?

Options:

A.

FoftiGate bounces port5 after it detects all SD-WAN members as dead.

B.

FortiGate fails over to the secondary device after it detects port5 as dead.

C.

FortiGate sends alert messages through poft5 when it detects all SD-WAN members as dead

D.

FortiGate brings down port5 after it detects all SD-WAN members as dead.

Question 24

(Refer to the exhibits.

Question # 24

The SD-WAN overlay template advanced settings and the underlay and network advertisement settings are shown. These are the configurations for the secondary hub of a dual-hub SD-WAN topology created with the FortiManager SD-WAN overlay orchestrator.

Which two conclusions can you draw from the information shown in the exhibits? Choose two answers.)

Options:

A.

FortiManager will define port2 as a BGP neighbor.

B.

FortiManager will create an overlay tunnel on the port2 interface.

C.

FortiManager will create an overlay tunnel on the port1 interface.

D.

FortiManager will define port5 as a BGP neighbor.

Question 25

Which three characteristics apply to provisioning templates available on FortiManager? (Choose three.)

Options:

A.

A template group can include a system template and an SD-WAN template.

B.

Each template group can contain up to three IPsec tunnel templates.

C.

CLI templates are applied in order, from top to bottom

D.

A CLI template group can contain CLI templates of both types.

E.

A CLI template can be of type CLI script or Perl script.

Question 26

When you use the command diagnose sys session list, how do you identify the sessions that correspond to traffic steered according to SD-WAN rules?

Options:

A.

You identify sessions steered according to SD-WAN rules with the flag vwl.

B.

You cannot identify SD-WAN sessions. You must use the sdwan session filter.

C.

You identify sessions steered according to SD-WAN rules with the data vwl_mbr_seq.

D.

You identify sessions steered according to SD-WAN rules with the data sdwan_service_id.

Question 27

Refer to the exhibit.

Question # 27

The administrator configured the SD-WAN rule ID 4 with two members (port1 and port2) and strategy lowest cost (SLA).

What are the two characteristics of the session shown in the exhibit? (Choose two.)

Options:

A.

FortiGate steered this flow according to an SD-WAN rule 4.

B.

FortiGate will never re-evaluate this session.

C.

FortiGate steered this flow according to the application detected and the outgoing interface is port3.

D.

FortiGate will re-evaluate this session if the outgoing interface goes down.

Question 28

(Refer to the exhibit.

Question # 28

The administrator configured two SD-WAN rules to load balance traffic.

Which interfaces does FortiGate use to steer the traffic from 10.0.1.124 to 10.0.0.254 ? Choose one answer.)

Options:

A.

port1 or port2

B.

FortiGate routes the traffic according to the FIB.

C.

HUB1-VPN2

D.

Any interface in the HUB1 or HUB2 zones