Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

FCP_FGT_AD-7.4 FCP - FortiGate 7.4 Administrator Questions and Answers

Questions 4

Refer to the exhibits.

An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).

What must the administrator do to synchronize the address object?

Options:

A.

Change the csf setting on Local-FortiGate (root) to sec fabric-object-unification default.

B.

Change the csf setting on both devices to sec downscream-access enable.

C.

Change the csf setting on ISFW (downstream) to sec auchorizacion-requesc-cype certificace.

D.

Change the csf setting on ISFW (downstream) to sec configuration-sync local.

Buy Now
Questions 5

Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)

Options:

A.

Pre-shared key and certificate signature as authentication methods

B.

Extended authentication (XAuth)to request the remote peer to provide a username and password

C.

Extended authentication (XAuth) for faster authentication because fewer packets are exchanged

D.

No certificate is required on the remote peer when you set the certificate signature as the authentication method

Buy Now
Questions 6

Refer to the exhibits.

The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details.

Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?

Options:

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.

B.

Apple FaceTime will be allowed, based on the Apple filter configuration.

C.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.

D.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.

Buy Now
Questions 7

Which two statements are true about the FGCP protocol? (Choose two.)

Options:

A.

FGCP is not used when FortiGate is in transparent mode

B.

FGCP elects the primary FortiGate device

C.

FGCP is used to discover FortiGate devices in different HA groups

D.

FGCP runs only over the heartbeat links

Buy Now
Questions 8

Which three statements about SD-WAN zones are true? (Choose three.)

Options:

A.

An SD-WAN zone can contain physical and logical interfaces

B.

You can use an SD-WAN zone in static route definitions

C.

You can define up to three SD-WAN zones per FortiGate device

D.

An SD-WAN zone must contains at least two members

E.

An SD-WAN zone is a logical grouping of members

Buy Now
Questions 9

An administrator must enable a DHCP server on one of the directly connected networks on FortiGate. However, the administrator is unable to complete the process on the GUI to enable the service on the interface.

In this scenario, what prevents the administrator from enabling DHCP service?

Options:

A.

The role of the interface prevents setting a DHCP server.

B.

The DHCP server setting is available only on the CLI.

C.

Another interface is configured as the only DHCP server on FortiGate.

D.

The FortiGate model does not support the DHCP server.

Buy Now
Questions 10

Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.

Based on the exhibit, which statement is true?

Options:

A.

The underlay zone contains port1 and

B.

The d-wan zone contains no member.

C.

The d-wan zone cannot be deleted.

D.

The virtual-wan-link zone contains no member.

Buy Now
Questions 11

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

Options:

A.

Strict RPF checks the best route back to the source using the incoming interface.

B.

Strict RPF allows packets back to sources with all active routes.

C.

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

D.

Strict RPF check is run on the first sent and reply packet of any new session.

Buy Now
Questions 12

Refer to the exhibit.

Which two statements are true about the routing entries in this database table? (Choose two.)

Options:

A.

All of the entries in the routing database table are installed in the FortiGate routing table.

B.

The port2 interface is marked as inactive.

C.

Both default routes have different administrative distances.

D.

The default route on porc2 is marked as the standby route.

Buy Now
Questions 13

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

Options:

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

B.

The browser does not trust the certificate used by FortiGate for SSL inspection

C.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

D.

The matching firewall policy is set to proxy inspection mode

Buy Now
Questions 14

Which statement is a characteristic of automation stitches?

Options:

A.

They can be run only on devices in the Security Fabric.

B.

They can be created only on downstream devices in the fabric.

C.

They can have one or more triggers.

D.

They can run multiple actions at the same time.

Buy Now
Questions 15

Which three CLI commands, can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.)

Options:

A.

execute ping

B.

execute traceroute

C.

diagnose sys top

D.

get system arp

E.

diagnose sniffer packet any

Buy Now
Questions 16

What are three key routing principles in SD-WAN? (Choose three.)

Options:

A.

By default. SD-WAN members are skipped if they do not have a valid route to the destination

B.

By default. SD-WAN rules are skipped if only one route to the destination is available

C.

By default. SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member

D.

SD-WAN rules have precedence over any other type of routes

E.

Regular policy routes have precedence over SD-WAN rules

Buy Now
Questions 17

Which statement is correct regarding the use of application control for inspecting web applications?

Options:

A.

Application control can identify child and parent applications, and perform different actions on them

B.

Application control signatures are included in Fortinet Antivirus engine

C.

Application control does not display a replacement message for a blocked web application

D.

Application control does not require SSL Inspection to Identity web applications

Buy Now
Questions 18

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

Options:

A.

The host field in the HTTP header.

B.

The server name indication (SNI) extension in the client hello message.

C.

The subject alternative name (SAN) field in the server certificate.

D.

The subject field in the server certificate.

E.

The serial number in the server certificate.

Buy Now
Questions 19

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.)

Options:

A.

If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.

B.

If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.

C.

If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP

D.

If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.

Buy Now
Questions 20

Refer to the exhibit.

Based on the routing database shown in the exhibit which two conclusions can you make about the routes? (Choose two.)

Options:

A.

There will be eight routes active in the routing table

B.

The port1 and port2 default routes are active in the routing table

C.

The port3 default route has the highest distance

D.

The port3 default route has the lowest metric

Buy Now
Questions 21

Refer to the exhibits, which show the system performance output and the default configuration of high memory usage thresholds in a FortiGate.

Based on the system performance output, what can be the two possible outcomes? (Choose two.)

Options:

A.

FortiGate will start sending all files to FortiSandbox for inspection.

B.

FortiGate has entered conserve mode.

C.

Administrators cannot change the configuration.

D.

Administrators can access FortiGate onlythrough the console port.

Buy Now
Questions 22

Refer to the exhibits, which show the firewall policy and an antivirus profile configuration.

Why is the user unable to receive a block replacement message when downloading an infected file for the first time?

Options:

A.

The intrusion prevention security profile must be enabled when using flow-based inspection mode.

B.

The option to send files to FortiSandbox for inspection is enabled.

C.

The firewall policy performs a full content inspection on the file.

D.

Flow-based inspection is used, which resets the last packet to the user.

Buy Now
Questions 23

Which two statements describe how the RPF check is used? (Choose two.)

Options:

A.

The RPF check is run on the first sent packet of any new session.

B.

The RPF check is run on the first reply packet of any new session.

C.

The RPF check is run on the first sent and reply packet of any new session.

D.

The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.

Buy Now
Questions 24

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)

Options:

A.

Manual with load balancing

B.

Lowest Cost (SLA) with load balancing

C.

Best Quality with load balancing

D.

Lowest Quality (SLA) with load balancing

E.

Lowest Cost (SLA) without load balancing

Buy Now
Questions 25

Refer to the exhibit showing a debug flow output.

What two conclusions can you make from the debug flow output? (Choose two.)

Options:

A.

The debug flow is for ICMP traffic.

B.

A firewall policy allowed the connection.

C.

A new traffic session was created.

D.

The default route is required to receive a reply.

Buy Now
Exam Code: FCP_FGT_AD-7.4
Exam Name: FCP - FortiGate 7.4 Administrator
Last Update: Nov 23, 2024
Questions: 86
FCP_FGT_AD-7.4 pdf

FCP_FGT_AD-7.4 PDF

$25.5  $84.99
FCP_FGT_AD-7.4 Engine

FCP_FGT_AD-7.4 Testing Engine

$30  $99.99
FCP_FGT_AD-7.4 PDF + Engine

FCP_FGT_AD-7.4 PDF + Testing Engine

$40.5  $134.99