Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet FCSS_EFW_AD-7.6 Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Exam Practice Test

Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A company that acquired multiple branches across different countries needs to install new FortiGate devices on each of those branches. However, the IT staff lacks sufficient knowledge to implement the initial configuration on the FortiGate devices.

Which three approaches can the company take to successfully deploy advanced initial configurations on remote branches? (Choose three.)

Options:

A.

Use metadata variables to dynamically assign values according to each FortiGate device.

B.

Use provisioning templates and install configuration settings at the device layer.

C.

Use the Global ADOM to deploy global object configurations to each FortiGate device.

D.

Apply Jinja in the FortiManager scripts for large-scale and advanced deployments.

E.

Add FortiGate devices on FortiManager as model devices, and use ZTP or LTP to connect to FortiGate devices.

Question 2

An administrator needs to install an IPS profile without triggering false positives that can impact applications and cause problems with the user's normal traffic flow.

Which action can the administrator take to prevent false positives on IPS analysis?

Options:

A.

Use the IPS profile extension to select an operating system, protocol, and application for all the network internal services and users to prevent false positives.

B.

Enable Scan Outgoing Connections to avoid clicking suspicious links or attachments that can deliver botnet malware and create false positives.

C.

Use an IPS profile with action monitor, however, the administrator must be aware that this can compromise network integrity.

D.

Install missing or expired SSUTLS certificates on the client PC to prevent expected false positives.

Question 3

What does the command set forward-domain in a transparent VDOM interface do?

Options:

A.

It configures the interface to prioritize traffic based on the domain ID, enhancing quality of service for specified VLANs.

B.

It isolates traffic within a specific VLAN by assigning a broadcast domain to an interface based on the VLAN ID.

C.

It restricts the interface to managing traffic only from the specified VLAN, effectively segregating network traffic.

D.

It assigns a unique domain ID to the interface, allowing it to operate across multiple VLANs within the same VDOM.

Question 4

An administrator received a FortiAnalyzer alert that a 1 ТВ disk filled up in a day. Upon investigation, they found thousands of unusual DNS log requests, such as JHCMQK.website.com, with no answers. They later discovered that DNS exfiltration was occurring through both UDP and TLS.

How can the administrator prevent this data theft technique?

Options:

A.

Create an inline-CASB to protect against DNS exfiltration.

B.

Configure a File Filter profile to prevent DNS exfiltration.

C.

Enable DNS Filter to protect against DNS exfiltration.

D.

Use an IPS profile and DNS exfiltration-related signatures.

Question 5

Refer to the exhibits.

A policy package conflict status and information from the import device wizard in the Core1 VDOM are shown. When you import a policy package, the following message appears for the Web_restrictions web filter profile and the deep-inspection SSL-SSH profile: "The following objects were found having conflicts. Please confirm your settings, then continue." The Web_restrictions and deep-inspection profiles are used by other FortiGate devices within FortiManager. Which step must you take to resolve the issue? (Choose one answer)

Options:

A.

Retrieve the FortiGate configuration to automatically export correct objects and policies.

B.

Create uniquely named objects on FortiGate and reimport them into the policy package.

C.

Select the FortiManager configuration that accepts changes on FortiManager and preserves existing configurations on FortiGate devices.

D.

Use non-default object values because FortiManager is unable to alter default values.

Question 6

An administrator is designing an ADVPN network for a large enterprise with spokes that have varying numbers of internet links. They want to avoid a high number of routes and peer connections at the hub.

Which method should be used to simplify routing and peer management?

Options:

A.

Deploy a full-mesh VPN topology to eliminate hub dependency.

B.

Implement static routing over IPsec interfaces for each spoke.

C.

Use a dynamic routing protocol using loopback interfaces to streamline peers and routes.

D.

Establish a traditional hub-and-spoke VPN topology with policy routes.

Question 7

Refer to the exhibit, which shows the ADVPN IPsec interface representing the VPN IPsec phase 1 from Hub A to Spoke 1 and Spoke 2, and from Hub В to Spoke 3 and Spoke 4.

An administrator must configure an ADVPN using IBGP and EBGP to connect overlay network 1 with 2.

What must the administrator configure in the phase 1 VPN IPsec configuration of the ADVPN tunnels?

Options:

A.

set auto-discovery-sender enable and set network-id x

B.

set auto-discovery-forwarder enable and set remote-as x

C.

set auto-discovery-crossover enable and set enforce-multihop enable

D.

set auto-discovery-receiver enable and set npu-offload enable

Question 8

Refer to the exhibit, which shows the VDOM section of a FortiGate device.

An administrator discovers that webfilter stopped working in Core1 and Core2 after a maintenance window.

Which two reasons could explain why webfilter stopped working? (Choose two.)

Options:

A.

The root VDOM does not have access to FortiManager in a closed network.

B.

The root VDOM does not have a VDOM link to connect with the Corel and Core2 VDOMs.

C.

The Core1 and Core2 VDOMs must also be enabled as Management VDOMs to receive FortiGuard updates

D.

The root VDOM does not have access to any valid public FDN.

Question 9

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

An administrator must configure a loopback as a BGP source to connect to the ISP.

Which two commands are required to establish the connection? (Choose two.)

Options:

A.

ebgp-enforce-multihop

B.

update-source

C.

ibgp-enforce-multihop

D.

recursive-next-hop

Question 10

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

Options:

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.

The ISDB limits access by URL and domain.

Question 11

A user reports that their computer was infected with malware after accessing a secured HTTPS website. However, when the administrator checks the FortiGate logs, they do not see that the website was detected as insecure despite having an SSL certificate and correct profiles applied on the policy.

How can an administrator ensure that FortiGate can analyze encrypted HTTPS traffic on a website?

Options:

A.

The administrator must enable reputable websites to allow only SSL/TLS websites rated by FortiGuard web filter.

B.

The administrator must enable URL extraction from SNI on the SSL certificate inspection to ensure the TLS three-way handshake is correctly analyzed by FortiGate.

C.

The administrator must enable DNS over TLS to protect against fake Server Name Indication (SNI) that cannot be analyzed in common DNS requests on HTTPS websites.

D.

The administrator must enable full SSL inspection in the SSL/SSH Inspection Profile to decrypt packets and ensure they are analyzed as expected.

Question 12

Refer to the exhibit, which shows a network diagram showing the addition of site 2 with an overlapping network segment to the existing VPN IPsec connection between the hub and site 1.

Which IPsec phase 2 configuration must an administrator make on the FortiGate hub to enable equal-cost multi-path (ECMP) routing when multiple remote sites connect with overlapping subnets?

Options:

A.

Set route-overlap to either use-new or use-old

B.

Set net-device to ecmp

C.

Set single-source to enable

D.

Set route-overlap to allow

Question 13

Refer to the exhibit, which shows the HA status of an active-passive cluster.

An administrator wants FortiGate_B to handle the Core2 VDOM traffic.

Which modification must the administrator apply to achieve this?

Options:

A.

The administrator must disable override on FortiGate_A.

B.

The administrator must change the priority from 100 to 160 for FortiGate_B.

C.

The administrator must change the load balancing method on FortiGate_B.

D.

The administrator must change the priority from 128 to 200 for FortiGate_B.

Question 14

Refer to the exhibit, which shows an ADVPN network.

The client behind Spoke-1 generates traffic to the device located behind Spoke-2.

What is the first message that the hub sends to Spoke-1 to bring up the dynamic tunnel?

Options:

A.

Shortcut query

B.

Shortcut offer

C.

Shortcut reply

D.

Shortcut forward

Question 15

An administrator must standardize the deployment of FortiGate devices across branches with consistent interface roles and policy packages using FortiManager.

What is the recommended best practice for interface assignment in this scenario?

Options:

A.

Enable metadata variables to use dynamic configurations in the standard interfaces of FortiManager.

B.

Use the Install On feature in the policy package to automatically assign different interfaces based on the branch.

C.

Create interfaces using device database scripts to use them on the same policy package of FortiGate devices.

D.

Create normalized interface types per-platform to automatically recognize device layer interfaces based on the FortiGate model and interface name.

Question 16

Refer to the exhibit, which shows the packet capture output of a three-way handshake between FortiGate and FortiManager Cloud.

What two conclusions can you draw from the exhibit? (Choose two.)

Options:

A.

FortiGate will receive a certificate that supports multiple domains because FortiManager operates in a cloud computing environment.

B.

FortiGate is connecting to the same IP server and will receive an independent certificate for its connection between FortiGate and FortiManager Cloud.

C.

If the TLS handshake contains 17 cipher suites it means the TLS version must be 1.0 on this three-way handshake.

D.

The wildcard for the domain *.fortinet-ca2.support.fortinet.com must be supported by FortiManager Cloud.

Question 17

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

Options:

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.

C.

Select flow mode in the IPS profile to accurately analyze application patterns.

D.

Set the IPS profile signature action to default to discard all possible false positives.

Question 18

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

Options:

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

Question 19

Refer to the exhibit.

The partial output of an OSPF command is shown. You are checking the OSPF status of a FortiGate device when you receive the output shown in the exhibit. Based on the output, which two statements about FortiGate are correct? (Choose two answers)

Options:

A.

FortiGate is a backup designated router.

B.

FortiGate supports OSPF ECMP.

C.

FortiGate is in the area 0.0.0.5.

D.

FortiGate can inject external routing information.