FCP_FGT_AD-7.4 Practice Test Questions

89 Questions


An administrator configures FortiGuard servers as DNS servers on FortiGate using default settings. What is true about the DNS connection to a FortiGuard server?


A. It uses UDP 8888.


B. It uses DNS over HTTPS.


C. It uses DNS over TLS.


D. It uses UDP 53.





D.
  It uses UDP 53.

Explanation:
By default, DNS queries to FortiGuard servers use UDP port 53.

What are two features of collector agent advanced mode? (Choose two.)


A. In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.


B. Advanced mode supports nested or inherited groups.


C. In advanced mode, security profiles can be applied only to user groups, not individual users.


D. Advanced mode uses the Windows convention —NetBios: Domain\Username.





A.
  In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.

D.
  Advanced mode uses the Windows convention —NetBios: Domain\Username.

Explanation:
Advanced mode allows for configuration as an LDAP client and supports group filtering directly on the FortiGate, as well as nested or inherited groups.

Which two statements describe how the RPF check is used? (Choose two.)


A. The RPF check is run on the first sent packet of any new session.


B. The RPF check is run on the first reply packet of any new session.


C. The RPF check is run on the first sent and reply packet of any new session.


D. The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.





A.
  The RPF check is run on the first sent packet of any new session.

D.
  The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.

Explanation:

The Reverse Path Forwarding (RPF) check is run on the first sent packet of any new session to ensure that the packet arrives on a legitimate interface. This check protects the network from IP spoofing attacks by verifying that a return route exists from the receiving interface back to the source IP address. If the route is invalid or not found, the packet is discarded. Options B and C are incorrect because RPF checks are performed on the first sent packet, not the reply packet.

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate. Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)


A. Allow & Warning


B. Trust & Allow


C. Allow


D. Block & Warning


E. Block





A.
  Allow & Warning

D.
  Block & Warning

E.
  Block

Explanation

When FortiGate performs SSL/SSH full inspection and detects an invalid certificate, there are three valid actions it can take:
Allow & Warning: This action allows the session but generates a warning.
Block & Warning: This action blocks the session and generates a warning.
Block: This action blocks the session without generating a warning.

Actions such as "Trust & Allow" or just "Allow" without additional configurations are not applicable in the context of handling invalid certificates.

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)


A. Manual with load balancing


B. Lowest Cost (SLA) with load balancing


C. Best Quality with load balancing


D. Lowest Quality (SLA) with load balancing


E. Lowest Cost (SLA) without load balancing





A.
  Manual with load balancing

B.
  Lowest Cost (SLA) with load balancing

C.
  Best Quality with load balancing

Explanation:

FortiGate's SD-WAN rule strategies for member selection include the following:

Manual with load balancing: This strategy allows an administrator to manually configure which SDWAN member interfaces to use for specific traffic.
Lowest Cost (SLA) with load balancing: This strategy prioritizes the link with the lowest cost that meets the SLA requirements.
Best Quality with load balancing: This strategy selects the link with the best performance metrics, such as latency, jitter, or packet loss.
Options D and E are incorrect because "Lowest Quality" is not a valid strategy, and "Lowest Cost without load balancing" contradicts the requirement for load balancing in the strategy name.

Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.)


A. The client FortiGate requires the SSL VPN tunnel interface type to connect SSL VPN


B. The server FortiGate requires a CA certificate to verify the client FortiGate certificate.


C. The client FortiGate requires a client certificate signed by the CA on the server FortiGate.


D. The client FortiGate requires a manually added route to remote subnets.





B.
  The server FortiGate requires a CA certificate to verify the client FortiGate certificate.

C.
  The client FortiGate requires a client certificate signed by the CA on the server FortiGate.

Explanation:

For SSL VPN to function correctly between two FortiGate devices, the following settings are required:

B. The server FortiGate requires a CA certificate to verify the client FortiGate certificate: The server FortiGate must have a Certificate Authority (CA) certificate installed to authenticate and verify the certificate presented by the client FortiGate device.

C. The client FortiGate requires a client certificate signed by the CA on the server FortiGate: The client FortiGate must have a client certificate that is signed by the same CA that the server FortiGate uses for verification. This ensures a secure SSL VPN connection between the two devices.

The other options are not directly necessary for establishing SSL VPN:

A. The client FortiGate requires the SSL VPN tunnel interface type to connect SSL VPN: This is incorrect as SSL VPN does not require a specific tunnel interface type; it typically uses an SSL VPN client profile.

D. The client FortiGate requires a manually added route to remote subnets: While routing may be necessary, it is not specifically required for the SSL VPN functionality between two FortiGates.

An employee needs to connect to the office through a high-latency internet connection. Which SSL VPN setting should the administrator adjust to prevent SSL VPN negotiation failure?


A. SSL VPN idle-timeout


B. SSL VPN login-timeout


C. SSL VPN dtls-hello-timeout


D. SSL VPN session-ttl





C.
  SSL VPN dtls-hello-timeout

Explanation:

For a high-latency internet connection, the SSL VPN setting that should be adjusted is:
C. SSL VPN dtls-hello-timeout: This setting determines how long the FortiGate will wait for a DTLS hello message from the client. For high-latency connections, increasing this timeout will prevent SSL VPN negotiation failures caused by delays in receiving the DTLS hello message.

The other options are not suitable:

A. SSL VPN idle-timeout: This setting controls the idle time allowed before a session is terminated, which is not relevant to the initial connection establishment.

B. SSL VPN login-timeout: This setting controls the maximum time allowed for a user to log in, but does not affect connection negotiation.

D. SSL VPN session-ttl: This setting controls the total time-to-live for an SSL VPN session but does not directly address issues caused by high latency.

Which three methods are used by the collector agent for AD polling? (Choose three.)


A. WinSecLog


B. WMI


C. NetAPI


D. FSSO REST API


E. FortiGate polling





A.
  WinSecLog

B.
  WMI

C.
  NetAPI

Explanation:

The Fortinet Single Sign-On (FSSO) Collector Agent supports three primary methods for Active Directory (AD) polling to collect user information:

WinSecLog: Monitors Windows Security Event Logs for login events.
WMI: Uses Windows Management Instrumentation to poll user login sessions.
NetAPI: Utilizes the Netlogon API to query domain controllers for user session data.

These methods allow the FortiGate to gather user logon information and enforce user-based policies effectively.

An administrator configured a FortiGate to act as a collector for agentless polling mode. What must the administrator add to the FortiGate device to retrieve AD user group information?


A. LDAP server


B. RADIUS server


C. DHCP server


D. Windows server





A.
  LDAP server

Explanation:

To retrieve AD user group information in agentless polling mode, the administrator must add an LDAP server to the FortiGate device.

An administrator must enable a DHCP server on one of the directly connected networks on FortiGate. However, the administrator is unable to complete the process on the GUI to enable the service on the interface. In this scenario, what prevents the administrator from enabling DHCP service?


A. The role of the interface prevents setting a DHCP server.


B. The DHCP server setting is available only on the CLI.


C. Another interface is configured as the only DHCP server on FortiGate.


D. The FortiGate model does not support the DHCP server.





A.
  The role of the interface prevents setting a DHCP server.

Explanation:

FortiGate interfaces can be configured in different roles, such as WAN or LAN. If an interface is set as a "WAN" role, you cannot configure it to act as a DHCP server through the GUI. The interface role must be set to "LAN" or "Undefined" to allow DHCP server configuration.

The HTTP inspection process in web filtering follows a specific order when multiple features are enabled in the web filter profile. Which order must FortiGate use when the web filter profile has features such as safe search enabled?


A. FortiGuard category filter and rating filter


B. Static domain filter, SSL inspection filter, and external connectors filters


C. DNS-based web filter and proxy-based web filter


D. Static URL filter, FortiGuard category filter, and advanced filters





D.
  Static URL filter, FortiGuard category filter, and advanced filters

Explanation:

FortiGate applies web filters in the following order: Static URL filter, FortiGuard category filter, Web content filter, Web script filter, and Antivirus scanning.

A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes. All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover. Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)


A. Enable Dead Peer Detection


B. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.


C. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.


D. Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.





A.
  Enable Dead Peer Detection

C.
  Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.

Explanation:

To configure redundant IPsec VPN tunnels on FortiGate with failover capability, the following two key configuration changes are required:

A. Enable Dead Peer Detection (DPD): Dead Peer Detection is crucial for detecting if the remote peer is unreachable. By enabling DPD, FortiGate can quickly detect a dead tunnel, ensuring a faster failover to the secondary tunnel when the primary tunnel goes down.

C. Configure a lower distance on the static route for the primary tunnel and a higher distance on the static route for the secondary tunnel: The static route with the lower distance (higher priority) will be used when both tunnels are operational. If the primary tunnel fails, the higher distance (lower priority) route for the secondary tunnel will take over, ensuring traffic is routed correctly.

The other options are not suitable:

B. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels:

This option is not directly related to the requirements of failover between two IPsec VPN tunnels.

D. Configure a higher distance on the static route for the primary tunnel and a lower distance on the static route for the secondary tunnel: This would prioritize the secondary tunnel over the primary tunnel, which is opposite to the desired configuration.


Page 2 out of 8 Pages
Previous