Thanks for Visiting my channel
FCP - FortiGate 7.4 Administrator Sample Questions
I’m sorry, you did not pass.
Question 1
Correct
1 points out of 1
Flag question
Question text
FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt.
What is the most likely reason for this situation?
Select one:
No matching user account exists for this user.
The user is using a super admin account.
The user was authenticated using passive authentication.
The user is using a guest account profile.
Question 2
Correct
1 points out of 1
Flag question
Question text
An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to the SSL-VPN.
How can this be achieved?
Select one:
Using web-only mode
Configuring web bookmarks
Assigning public IP addresses to SSL-VPN users
Disabling split tunneling
Question 3
Correct
1 points out of 1
Flag question
Question text
Which two statements correctly describe the differences between IPsec main mode and IPsec aggressive mode? (Choose two.)
Select one or more:
Aggressive mode supports XAuth, while main mode does not.
The first packet of aggressive mode contains the peer ID, while the first packet of main mode does not.
Six packets are usually exchanged during main mode, while only three packets are exchanged during aggressive mode.
Main mode cannot be used for dialup VPNs, while aggressive mode can.
Question 4
Correct
1 points out of 1
Flag question
Question text
Which statement about firewall policy NAT is true?
Select one:
DNAT can automatically apply to multiple firewall policies, based on DNAT rules.
DNAT is not supported.
SNAT can automatically apply to multiple firewall policies, based on SNAT policies.
You must configure SNAT for each firewall policy.
Question 5
Correct
1 points out of 1
Flag question
Question text
Which two statements about advanced AD access mode for the FSSO collector agent are true? (Choose two.)
Select one or more:
It uses the Windows convention for naming; that is, Domain\Username.
It supports monitoring of nested groups.
FortiGate can act as an LDAP client to configure the group filters.
It is only supported if DC agents are deployed.
Question 6
Incorrect
0 points out of 1
Flag question
Question text
Which two IP pool types are useful for carrier-grade NAT deployments? (Choose two.)
Select one or more:
One-to-one
Port block allocation
Overload
Fixed port range
Question 7
Correct
1 points out of 1
Flag question
Question text
Refer to the exhibit.
Which route will be selected when trying to reach 10.20.30.254?
Select one:
0.0.0.0/0 [10/0] via 172.20.121.2, port1, [1/0]
10.20.30.0/26 [10/0] via 172.20.168.254, port2, [1/0]
10.20.30.0/24 [10/0] via 172.20.167.254, port3, [1/0]
10.30.20.0/24 [10/0] via 172.20.121.2, port1, [1/0]
Question 8
Incorrect
0 points out of 1
Flag question
Question text
Refer to the exhibit.
Which two behaviours result from this full SSL configuration? (Choose two.)
Select one or more:
A temporary untrusted FortiGate certificate replaces the server certificate when the server certificate is untrusted.
A temporary trusted FortiGate certificate replaces the server certificate, even when the server certificate is untrusted.
A temporary trusted FortiGate certificate replaces the server certificate when the server certificate is trusted.
The browser bypasses all certificate warnings and allows the connection.
Question 9
Correct
1 points out of 1
Flag question
Question text
Which statement best describes the role of a DC agent in an FSSO DC agent mode solution?
Select one:
It captures the login events and forwards them to FortiGate.
It captures the login and logoff events and forwards them to the collector agent.
It captures the user IP address and workstation name and forwards them to FortiGate.
It captures the login events and forwards them to the collector agent.
Question 10
Correct
1 points out of 1
Flag question
Question text
Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
Select one or more:
Trusted authentication
HTTPS
Trusted host
SSH
FortiTelemetry
Question 11
Correct
1 points out of 1
Flag question
Question text
Which three methods can you use to deliver the token code to a user who is configured to use two-factor authentication? (Choose three.)
Select one or more:
Instant message app
FortiToken Mobile
Voicemail message
SMS text message
Question 12
Correct
1 points out of 1
Flag question
Question text
Which NAT method translates the source IP address in a packet to another IP address?
Select one:
SNAT
DNAT
VIP
IPPOOL
Question 13
Incorrect
0 points out of 1
Flag question
Question text
What must you configure to enable proxy-based TCP session failover?
Select one:
You must configure ha-configuration-sync under configure system ha.
You do not need to configure anything because all TCP sessions are automatically failed over.
You must configure session-pickup-connectionless enable under configure system ha.
You must configure session-pickup-enable under configure system ha.
Question 14
Correct
1 points out of 1
Flag question
Question text
Which two settings must you configure when FortiGate is being deployed as a root FortiGate in a Security Fabric topology? (Choose two.)
Select one or more:
Fabric name
FortiManager IP address
Pre-authorize downstream FortiGate devices
FortiAnalyzer IP address
Question 15
Correct
1 points out of 1
Flag question
Question text
Which two statements about incoming and outgoing interfaces in firewall policies are true? (Choose two.)
Select one or more:
A zone can be chosen as the outgoing interface.
Multiple interfaces can be selected as incoming and outgoing interfaces.
Only the any interface can be chosen as an incoming interface.
An incoming interface is mandatory in a firewall policy, but an outgoing interface is optional.
Question 16
Correct
1 points out of 1
Flag question
Question text
An administrator needs to create a tunnel mode SSL-VPN to access an internal web server from the internet. The web server is connected to port1. The internet is connected to port2. Both interfaces belong to the VDOM named Corporation.
What interface must the administrator use as the source for the firewall policy that will allow this traffic?
Select one:
port2
port1
ssl.root
ssl.Corporation
Question 17
Incorrect
0 points out of 1
Flag question
Question text
Refer to the exhibit.
Which statement about the configuration settings is true?
Select one:
The settings are invalid. The administrator settings and the SSL-VPN settings cannot use the same port.
When a remote user accesses https://10.200.1.1:443, the SSL-VPN login page opens.
When a remote user accesses http://10.200.1.1:443, the SSL-VPN login page opens.
When a remote user accesses https://10.200.1.1:443, the FortiGate login page opens.
Question 18
Incorrect
0 points out of 1
Flag question
Question text
Which type of traffic inspection requires FortiGate to act as a CA?
Select one:
SSL certificate inspection when protecting multiple clients connecting to multiple servers.
SSL traffic inspection when protecting a local SSL server.
SSL traffic inspection when protecting multiple clients connecting to multiple servers.
SSL certificate inspection when protecting a local SSL server.
Question 19
Incorrect
0 points out of 1
Flag question
Question text
What is the common feature shared between IPv4 and SD-WAN ECMP algorithms?
Select one:
Both use the same physical interface load balancing settings.
Both control ECMP algorithms.
Both support volume algorithms.
Both can be enabled at the same time.
Question 20
Correct
1 points out of 1
Flag question
Question text
Which statement about the HA override setting in FortiGate HA clusters is true?
Select one:
It synchronizes device priority on all cluster members.
You must configure override settings manually and separately for each cluster member.
It reboots FortiGate.
It enables monitored ports.
Question 21
Correct
1 points out of 1
Flag question
Question text
What is eXtended Authentication (XAuth)?
Select one:
It is an IPsec extension that authenticates remote VPN peers using a pre-shared key.
It is an IPsec extension that forces remote VPN users to authenticate using their credentials (username and password).
It is an IPsec extension that authenticates remote VPN peers using digital certificates.
It is an IPsec extension that forces remote VPN users to authenticate using their local ID.
Question 22
Incorrect
0 points out of 1
Flag question
Question text
Refer to the exhibit.
A user at 192.168.32.15 is trying to access the web server at 172.16.32.254.
Which two statements best describe how the FortiGate will perform reverse path forwarding (RPF) checks on this traffic? (Choose two.)
Select one or more:
Loose RPF check will deny the traffic.
Strict RPF check will deny the traffic.
Loose RPF check will allow the traffic.
Strict RPF check will allow the traffic.
No comments:
Post a Comment