Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet FCP_FGT_AD-7.4 FCP - FortiGate 7.4 Administrator Exam Practice Test

FCP - FortiGate 7.4 Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Refer to the exhibit.

Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?

Options:

A.

All traffic from a source IP to a destination IP is sent to the same interface.

B.

Traffic is sent to the link with the lowest latency.

C.

Traffic is distributed based on the number of sessions through each interface.

D.

All traffic from a source IP is sent to the same interface

Question 2

Which three statements about SD-WAN zones are true? (Choose three.)

Options:

A.

An SD-WAN zone can contain physical and logical interfaces

B.

You can use an SD-WAN zone in static route definitions

C.

You can define up to three SD-WAN zones per FortiGate device

D.

An SD-WAN zone must contains at least two members

E.

An SD-WAN zone is a logical grouping of members

Question 3

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

Options:

A.

Strict RPF checks the best route back to the source using the incoming interface.

B.

Strict RPF allows packets back to sources with all active routes.

C.

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

D.

Strict RPF check is run on the first sent and reply packet of any new session.

Question 4

Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)

Options:

A.

Pre-shared key and certificate signature as authentication methods

B.

Extended authentication (XAuth)to request the remote peer to provide a username and password

C.

Extended authentication (XAuth) for faster authentication because fewer packets are exchanged

D.

No certificate is required on the remote peer when you set the certificate signature as the authentication method

Question 5

A FortiGate administrator is required to reduce the attack surface on the SSL VPN portal.

Which SSL timer can you use to mitigate a denial of service (DoS) attack?

Options:

A.

SSL VPN dcls-hello-timeout

B.

SSL VPN http-request-header-timeout

C.

SSL VPN login-timeout

D.

SSL VPN idle-timeout

Question 6

Refer to the exhibits, which show the system performance output and the default configuration of high memory usage thresholds in a FortiGate.

Based on the system performance output, what can be the two possible outcomes? (Choose two.)

Options:

A.

FortiGate will start sending all files to FortiSandbox for inspection.

B.

FortiGate has entered conserve mode.

C.

Administrators cannot change the configuration.

D.

Administrators can access FortiGate onlythrough the console port.

Question 7

Refer to the exhibits.

The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details.

Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?

Options:

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.

B.

Apple FaceTime will be allowed, based on the Apple filter configuration.

C.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.

D.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.

Question 8

Refer to the exhibit.

Which two statements are true about the routing entries in this database table? (Choose two.)

Options:

A.

All of the entries in the routing database table are installed in the FortiGate routing table.

B.

The port2 interface is marked as inactive.

C.

Both default routes have different administrative distances.

D.

The default route on porc2 is marked as the standby route.

Question 9

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)

Options:

A.

Manual with load balancing

B.

Lowest Cost (SLA) with load balancing

C.

Best Quality with load balancing

D.

Lowest Quality (SLA) with load balancing

E.

Lowest Cost (SLA) without load balancing

Question 10

Which three methods are used by the collector agent for AD polling? (Choose three.)

Options:

A.

WinSecLog

B.

WMI

C.

NetAPI

D.

FSSO REST API

E.

FortiGate polling

Question 11

Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.)

Options:

A.

The client FortiGate requires the SSL VPN tunnel interface type to connect SSL VPN.

B.

The server FortiGate requires a CA certificate to verify the client FortiGate certificate.

C.

The client FortiGate requires a client certificate signed by the CA on the server FortiGate.

D.

The client FortiGate requires a manually added route to remote subnets.

Question 12

A FortiGate firewall policy is configured with active authentication however, the user cannot authenticate when accessing a website.

Which protocol must FortiGate allow even though the user cannot authenticate?

Options:

A.

ICMP

B.

DNS

C.

DHCP

D.

LDAP

Question 13

Refer to the exhibits, which show a diagram of a FortiGate device connected to the network. VIP object configuration, and the firewall policy configuration.

The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IP address 10.0.1.254/24.

If the host 10.200.3.1 sends a TCP SYN packet on port 8080 to 10.200.1.10, what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?

Options:

A.

10.0.1.254, 10.200.1.10, and 8080, respectively

B.

10.0.1.254, 10.0.1.10, and 80, respectively

C.

10.200.3.1, 10.0.1.10, and 80, respectively

D.

10.200.3.1, 10.0.1.10, and 8080, respectively

Question 14

Refer to the exhibit.

Review the intrusion prevention system (IPS) profile signature settings shown in the exhibit.

What do you conclude when adding the FTP.Login.Failed signature to the IPS sensor profile?

Options:

A.

Traffic matching the signature will be allowed and logged.

B.

The signature setting uses a custom rating threshold.

C.

The signature setting includes a group of other signatures.

D.

Traffic matching the signature will be silently dropped and logged.

Question 15

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration.

An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2.

The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver.

Which two configuration changes can the administrator make to the policy to deny Webserver access for Remote-User2? (Choose two.)

Options:

A.

Enable match-vip in the Deny policy.

B.

Set the Destination address as Webserver in the Deny policy.

C.

Disable match-vip in the Deny policy.

D.

Set the Destination address as Deny_IP in the Allow_access policy.

Question 16

An employee needs to connect to the office through a high-latency internet connection.

Which SSL VPN setting should the administrator adjust to prevent SSL VPN negotiation failure?

Options:

A.

SSL VPN idle-timeout

B.

SSL VPN login-timeout

C.

SSL VPN dtls-hello-timeout

D.

SSL VPN session-ttl

Question 17

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)

Options:

A.

The issuer must be a public CA

B.

The CA extension must be set to TRUE

C.

The Authority Key Identifier must be of type SSL

D.

The keyUsage extension must be set to

Question 18

What are two features of the NGFW profile-based mode? (Choose two.)

Options:

A.

NGFW profile-based mode can only be applied globally and not on individual VDOMs.

B.

NGFW profile-based mode must require the use of central source NAT policy

C.

NGFW profile-based mode policies support both flow inspection and proxy inspection.

D.

NGFW profile-based mode supports applying applications and web filtering profiles in a firewall policy.

Question 19

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy.

When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the

and does not block the file allowing it to be downloaded.

The administrator confirms that the traffic matches the configured firewall policy.

What are two reasons for the failed virus detection by FortiGate? (Choose two.)

Options:

A.

The selected SSL inspection profile has certificate inspection enabled

B.

The browser does not trust the FortiGate self-siqned CA certificate

C.

The EICAR test file exceeds the protocol options oversize limit

D.

The website is exempted from SSL inspection

Question 20

Refer to the exhibit.

Which statement about this firewall policy list is true?

Options:

A.

The Implicit group can include more than one deny firewall policy.

B.

The firewall policies are listed by ID sequence view.

C.

The firewall policies are listed by ingress and egress interfaces pairing view.

D.

LAN to WAN. WAN to LAN. and Implicit are sequence grouping view lists.

Question 21

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.

Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

Options:

A.

On HQ-FortiGate, disable Diffie-Helman group 2.

B.

On Remote-FortiGate, set port2 as Interface.

C.

On both FortiGate devices, set Dead Peer Detection to On Demand.

D.

On HQ-FortiGate, set IKE mode to Main (ID protection).

Question 22

Refer to the exhibit showing a FortiGuard connection debug output.

Based on the output, which two facts does the administrator know about the FortiGuard connection? (Choose two.)

Options:

A.

One server was contacted to retrieve the contract information.

B.

There is at least one server that lost packets consecutively.

C.

A local FortiManaqer is one of the servers FortiGate communicates with.

D.

FortiGate is using default FortiGuard communication settings.

Question 23

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

Options:

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Question 24

Which two statements are correct when FortiGate enters conserve mode? (Choose two.)

Options:

A.

FortiGate halts complete system operation and requires a reboot to regain available resources

B.

FortiGate refuses to accept configuration changes

C.

FortiGate continues to run critical security actions, such as quarantine.

D.

FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled

Question 25

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

Options:

A.

The host field in the HTTP header.

B.

The server name indication (SNI) extension in the client hello message.

C.

The subject alternative name (SAN) field in the server certificate.

D.

The subject field in the server certificate.

E.

The serial number in the server certificate.