New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet FCP_FGT_AD-7.4 FCP - FortiGate 7.4 Administrator Exam Practice Test

FCP - FortiGate 7.4 Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which statement is correct regarding the use of application control for inspecting web applications?

Options:

A.

Application control can identify child and parent applications, and perform different actions on them

B.

Application control signatures are included in Fortinet Antivirus engine

C.

Application control does not display a replacement message for a blocked web application

D.

Application control does not require SSL Inspection to Identity web applications

Question 2

A network administrator has configured an SSL/SSH inspection profile defined for full SSL inspection and set with a private CA certificate. The firewall policy that allows the traffic uses this profile for SSL inspection and performs web filtering. When visiting any HTTPS websites, the browser reports certificate warning errors.

What is the reason for the certificate warning errors?

Options:

A.

The SSL cipher compliance option is not enabled on the SSL inspection profile. This setting is required when the SSL inspection profile is defined with a private CA certificate.

B.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

C.

The browser does not recognize the certificate in use as signed by a trusted CA.

D.

With full SSL inspection it is not possible to avoid certificate warning errors at the browser level.

Question 3

An administrator is configuring an IPsec VPN between site A and site В. The Remote Gateway setting in both sites has been configured as Static IP Address.

For site A, the local quick mode selector is 192.168.1.0/24 and the remote quick mode selector is 192.168.2.0/24.

Which subnet must the administrator configure for the local quick mode selector for site B?

Options:

A.

192.168.3.0/24

B.

192.168.0.0/8

C.

192.168.2.0/24

D.

192.168.1.0/24

Question 4

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.

Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)

Options:

A.

Allow & Warning

B.

Trust & Allow

C.

Allow

D.

Block & Warning

E.

Block

Question 5

A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.

Which IPsec Wizard template must the administrator apply?

Options:

A.

Remote Access

B.

Site to Site

C.

Dial up User

D.

iHub-and-Spoke

Question 6

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy.

When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the

and does not block the file allowing it to be downloaded.

The administrator confirms that the traffic matches the configured firewall policy.

What are two reasons for the failed virus detection by FortiGate? (Choose two.)

Options:

A.

The selected SSL inspection profile has certificate inspection enabled

B.

The browser does not trust the FortiGate self-siqned CA certificate

C.

The EICAR test file exceeds the protocol options oversize limit

D.

The website is exempted from SSL inspection

Question 7

Refer to the exhibit.

Why did FortiGate drop the packet?

Options:

A.

11 matched an explicitly configured firewall policy with the action DENY

B.

It failed the RPF check.

C.

The next-hop IP address is unreachable.

D.

It matched the default implicit firewall policy

Question 8

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall policies configuration VIP configuration and IP pool configuration on the FortiGate device

The WAN (port1) interface has the IP address 10.200. l. 1/24 The LAN (port3) interface has the IP address 10.0.1.254/24

The first firewall policy has NAT enabled using the IP pool The second firewall policy is configured with a VIP as the destination address.

Which IP address will be used to source NAT (SNAT) the internet traffic coming from a workstation with the IP address 10.0.1.10?

Options:

A.

10.200.1.1

B.

10.200.1.10

C.

10.0.1.254

D.

10.200.1.100

Question 9

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name.

FortiGate allows the traffic according to policy ID 1. This is the policy that allows SD-WAN traffic.

Despite these settings the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows.

What can be the reason?

Options:

A.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

B.

There is no application control profile applied to the firewall policy.

C.

Destination in the SD-WAN rules are configured per application but the feature visibility is not enabled.

D.

SD-WAN rule names do not appear immediately. The administrator needs to refresh the page.

Question 10

What are two features of collector agent advanced mode? (Choose two.)

Options:

A.

In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.

B.

Advanced mode supports nested or inherited groups.

C.

In advanced mode, security profiles can be applied only to user groups, not individual users.

D.

Advanced mode uses the Windows convention —NetBios: Domain\Username.

Question 11

How can you disable RPF checking?

Options:

A.

Disable src-check on the interface level settings

B.

Unset fail-alert-interfaces on the interface level settings.

C.

Disable fail-detect on the interface level settings.

D.

Disable strict-src-check under system settings.

Question 12

Refer to the exhibits, which show the firewall policy and an antivirus profile configuration.

Why is the user unable to receive a block replacement message when downloading an infected file for the first time?

Options:

A.

The intrusion prevention security profile must be enabled when using flow-based inspection mode.

B.

The option to send files to FortiSandbox for inspection is enabled.

C.

The firewall policy performs a full content inspection on the file.

D.

Flow-based inspection is used, which resets the last packet to the user.

Question 13

Refer to the exhibit.

Review the intrusion prevention system (IPS) profile signature settings shown in the exhibit.

What do you conclude when adding the FTP.Login.Failed signature to the IPS sensor profile?

Options:

A.

Traffic matching the signature will be allowed and logged.

B.

The signature setting uses a custom rating threshold.

C.

The signature setting includes a group of other signatures.

D.

Traffic matching the signature will be silently dropped and logged.

Question 14

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.)

Options:

A.

If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.

B.

If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.

C.

If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP

D.

If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.

Question 15

Refer to the exhibits.

The SSL VPN connection fails when a user attempts to connect to it.

What should the user do to successfully connect to the SSL VPN?

Options:

A.

Change the SSL VPN portal to the tunnel.

B.

Change the idle timeout.

C.

Change the server IP address.

D.

Change the SSL VPN port on the client.

Question 16

Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

Options:

A.

Enable the parameter Never Timeout in the admin profiles

B.

Increase the admintimeout value under config system accprofile super_admin.

C.

Increase the admintimeout value under config system global

D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Question 17

Which inspection mode does FortiGate use for application profiles if it is configured as a profile-based next-generation firewall (NGFW)?

Options:

A.

Full content inspection

B.

Proxy-based inspection

C.

Certificate inspection

D.

Flow-based inspection

Question 18

What are three key routing principles in SD-WAN? (Choose three.)

Options:

A.

By default. SD-WAN members are skipped if they do not have a valid route to the destination

B.

By default. SD-WAN rules are skipped if only one route to the destination is available

C.

By default. SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member

D.

SD-WAN rules have precedence over any other type of routes

E.

Regular policy routes have precedence over SD-WAN rules

Question 19

Refer to the exhibit showing a debug flow output.

What two conclusions can you make from the debug flow output? (Choose two.)

Options:

A.

The debug flow is for ICMP traffic.

B.

A firewall policy allowed the connection.

C.

A new traffic session was created.

D.

The default route is required to receive a reply.

Question 20

Refer to the exhibit which contains a RADIUS server configuration.

An administrator added a configuration for a new RADIUS server. While configuring, the administrator selected the Include in every user group option.

What is the impact of using the Include in every user group option in a RADIUS configuration?

Options:

A.

This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group

B.

This option places all users into even/ RADIUS user group, including groups that are used for the LDAP server on FortiGate

C.

This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case is FortiAuthenticator

D.

This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group

Question 21

There are multiple dial-up IPsec VPNs configured in aggressive mode on the HQ FortiGate. The requirement is to connect dial-up users to their respective department VPN tunnels.

Which phase 1 setting you can configure to match the user to the tunnel?

Options:

A.

Peer ID

B.

Local Gateway

C.

Dead Peer Detection

D.

IKE Mode Config

Question 22

Which three statements explain a flow-based antivirus profile? (Choose three.)

Options:

A.

Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection

B.

Flow-based inspection optimizes performance compared to proxy-based inspection

C.

FortiGate buffers the whole file but transmits to the client at the same time.

D.

If a virus is detected, the last packet is delivered to the client.

E.

The IPS engine handles the process as a standalone.

Question 23

Which three methods are used by the collector agent for AD polling? (Choose three.)

Options:

A.

WinSecLog

B.

WMI

C.

NetAPI

D.

FSSO REST API

E.

FortiGate polling

Question 24

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

Options:

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Question 25

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

Options:

A.

FortiGate directs the collector agent to use a remote LDAP server.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.

FortiGate does not support workstation check.

D.

FortiGate uses the AD server as the collector agent.

Question 26

Which two statements explain antivirus scanning modes? (Choose two.)

Options:

A.

In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.

B.

In flow-based inspection mode files bigger than the buffer size are scanned

C.

In proxy-based inspection mode files bigger than the buffer size are scanned

D.

In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client