Tuesday, 30 April 2024

FCP - FortiGate 7.4 Administrator Sample Questions



Green Answers is right 



Which two statements about incoming and outgoing interfaces in firewall policies are true? (Choose two.)

Select one or more:

Only the any interface can be chosen as an incoming interface.

Multiple interfaces can be selected as incoming and outgoing interfaces.

A zone can be chosen as the outgoing interface.

 

 

Which three methods can you use to deliver the token code to a user who is configured to use two-factor authentication? (Choose three.)

Select one or more:

Email

SMS text message

Instant message app

FortiToken Mobile

 

 

 

Which two statements correctly describe the differences between IPsec main mode and IPsec aggressive mode? (Choose two.)

Select one or more:

The first packet of aggressive mode contains the peer ID, while the first packet of main mode does not.

Aggressive mode supports XAuth, while main mode does not.

Main mode cannot be used for dialup VPNs, while aggressive mode can.

Six packets are usually exchanged during main mode, while only three packets are exchanged during aggressive mode.

 

 

 

Which two statements about advanced AD access mode for the FSSO collector agent are true? (Choose two.)

Select one or more:

It uses the Windows convention for naming; that is, Domain\Username.

FortiGate can act as an LDAP client to configure the group filters.

It supports monitoring of nested groups.

It is only supported if DC agents are deployed.

 

 

 


A user at 
192.168.32.15 is trying to access the web server at 172.16.32.254.
Which two statements best describe how the FortiGate will perform reverse path forwarding (RPF) checks on this traffic? (Choose two.)

Select one or more:

Loose RPF check will deny the traffic.

Strict RPF check will allow the traffic.

Loose RPF check will allow the traffic.

 

 

 

 

Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)

Select one or more:

SSH

Trusted authentication

HTTPS

Trusted host

 

 

 

Which two IP pool types are useful for carrier-grade NAT deployments? (Choose two.)

Select one or more:

Port block allocation

Overload

One-to-one

Fixed port range

 

 

Which NAT method translates the source IP address in a packet to another IP address?

Select one:

VIP

SNAT

IPPOOL

DNAT

 

 

 

What is eXtended Authentication (XAuth)?

Select one:

It is an IPsec extension that authenticates remote VPN peers using digital certificates.

It is an IPsec extension that forces remote VPN users to authenticate using their local ID.

It is an IPsec extension that authenticates remote VPN peers using a pre-shared key.

It is an IPsec extension that forces remote VPN users to authenticate using their credentials (username and password).

 

 

 

Which statement about the HA override setting in FortiGate HA clusters is true?

Select one:

It synchronizes device priority on all cluster members.

You must configure override settings manually and separately for each cluster member.

It enables monitored ports.

It reboots FortiGate.

 

 

 

 

 

What must you configure to enable proxy-based TCP session failover?

Select one:

You must configure session-pickup-connectionless enable under configure system ha.

You must configure ha-configuration-sync under configure system ha.

You do not need to configure anything because all TCP sessions are automatically failed over.

You must configure session-pickup-enable under configure system ha.

 

 

 

 

 

 

 

 

 

 

 

 

 

Which statement about the configuration settings is true?

Select one:

When a remote user accesses https://10.200.1.1:443, the FortiGate login page opens.

When a remote user accesses http://10.200.1.1:443, the SSL-VPN login page opens.

When a remote user accesses https://10.200.1.1:443, the SSL-VPN login page opens.

The settings are invalid. The administrator settings and the SSL-VPN settings cannot use the same port.

 

 

 

A user at 192.168.32.15 is trying to access the web server at 172.16.32.254.
Which two statements best describe how the FortiGate will perform reverse path forwarding (RPF) checks on this traffic? (Choose two.)

Select one or more:

Loose RPF check will allow the traffic.

Loose RPF check will deny the traffic.

Strict RPF check will allow the traffic.

Strict RPF check will deny the traffic.

 

 

 

Which route will be selected when trying to reach 10.20.30.254?

Select one:

0.0.0.0/0 [10/0] via 172.20.121.2, port1, [1/0]

10.20.30.0/26 [10/0] via 172.20.168.254, port2, [1/0]

10.30.20.0/24 [10/0] via 172.20.121.2, port1, [1/0]

10.20.30.0/24 [10/0] via 172.20.167.254, port3, [1/0]

 

 

 

 

An administrator needs to create a tunnel mode SSL-VPN to access an internal web server from the internet. The web server is connected to port1. The internet is connected to port2. Both interfaces belong to the VDOM named Corporation.
What interface must the administrator use as the source for the firewall policy that will allow this traffic?

Select one:

port2

ssl.root

port1

ssl.Corporation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Which type of traffic inspection requires FortiGate to act as a CA?

Select one:

SSL traffic inspection when protecting multiple clients connecting to multiple servers.


SSL traffic inspection when protecting a local SSL server.

SSL certificate inspection when protecting a local SSL server.

SSL certificate inspection when protecting multiple clients connecting to multiple servers.

 

 

 

 

What is the common feature shared between IPv4 and SD-WAN ECMP algorithms?

Select one:

Both can be enabled at the same time.

Both use the same physical interface load balancing settings.

Both control ECMP algorithms.

Both support volume algorithms.

 

 

 

 

Which route will be selected when trying to reach 10.20.30.254?

Select one:

10.20.30.0/26 [10/0] via 172.20.168.254, port2, [1/0]

10.30.20.0/24 [10/0] via 172.20.121.2, port1, [1/0]

10.20.30.0/24 [10/0] via 172.20.167.254, port3, [1/0]

0.0.0.0/0 [10/0] via 172.20.121.2, port1, [1/0]

 

 

 

 

 

 

Which two behaviours result from this full SSL configuration? (Choose two.)

Select one or more:

The browser bypasses all certificate warnings and allows the connection.

A temporary untrusted FortiGate certificate replaces the server certificate when the server certificate is untrusted.

A temporary trusted FortiGate certificate replaces the server certificate when the server certificate is trusted.

A temporary trusted FortiGate certificate replaces the server certificate, even when the server certificate is untrusted.

 

 

Which two statements about advanced AD access mode for the FSSO collector agent are true? (Choose two.)

Select one or more:

FortiGate can act as an LDAP client to configure the group filters.

It is only supported if DC agents are deployed.

It supports monitoring of nested groups.

It uses the Windows convention for naming; that is, Domain\Username.

 

 

 

 

Which two behaviours result from this full SSL configuration? (Choose two.)

Select one or more:

A temporary untrusted FortiGate certificate replaces the server certificate when the server certificate is untrusted.

A temporary trusted FortiGate certificate replaces the server certificate when the server certificate is trusted.

The browser bypasses all certificate warnings and allows the connection.

A temporary trusted FortiGate certificate replaces the server certificate, even when the server certificate is untrusted.

 

 

 

An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to the SSL-VPN.
How can this be achieved?

Select one:

Using web-only mode

Configuring web bookmarks

Disabling split tunneling

Assigning public IP addresses to SSL-VPN users

 

 

 

 

 

Which two settings must you configure when FortiGate is being deployed as a root FortiGate in a Security Fabric topology? (Choose two.)

Select one or more:

FortiAnalyzer IP address

FortiManager IP address

Fabric name

 

 

 

 

Which statement about firewall policy NAT is true?

Select one:

You must configure SNAT for each firewall policy.

DNAT is not supported.

SNAT can automatically apply to multiple firewall policies, based on SNAT policies.

DNAT can automatically apply to multiple firewall policies, based on DNAT rules.

 

 

 

 

FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt.
What is the most likely reason for this situation?

Select one:

The user was authenticated using passive authentication.

The user is using a super admin account.

No matching user account exists for this user.

The user is using a guest account profile.