Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet FCSS_SDW_AR-7.4 FCSS - SD-WAN 7.4 Architect Exam Practice Test

FCSS - SD-WAN 7.4 Architect Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Refer to the exhibit.

An administrator configures SD-WAN rules for a DIA setup using the FortiGate GUI. The page to configure the source and destination part of the rule looks as shown in the exhibit. The GUI page shows no option to configure an application as the destination of the SD-WAN rule Why?

Options:

A.

You cannot use applications as the destination when FortiGate is used for a DIA setup.

B.

FortiGate allows the configuration of applications as the destination of SD-WAN rules only on the CLI.

C.

You must enable the feature on the CLI.

D.

You must enable the feature first using the GUI menu System > Feature Visibility.

Question 2

Refer to the exhibits.

You use FortiManager to configure SD-WAN on three branch devices.

When you install the device settings. FortiManager prompts you with the error "Copy Failed" for the device branch1_fat When you click the log button. FortiManager displays the message shown in the exhibit.

Options:

A.

Based on the exhibits, which statement best describes the issue and how you can resolve it?

B.

Remove the installation target for the SD-WAN member port4. You cannot combine metadata variable and installation targets.

C.

Gateways forall members in a zone must be defined the same way. Specify the gateway of the SD-WAN member port! without metadata variables.

D.

Check the metadata variable definitions, and review the per-device mapping configuration.

E.

Check the connection between branch1_fgt and FortiManager

Question 3

What are three key routing principles of SD-WAN? (Choose three.)

Options:

A.

Directly connected routes have precedence over SD-WAN rules.

B.

Policy routes have precedence over SD-WAN rules.

C.

SD-WAN rules are skipped if the best route to the destination is a static route

D.

SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member.

E.

SD-WAN members are skipped if they do not have a valid route to the destination.

Question 4

Which three characteristics apply to provisioning templates available on FortiManager? (Choose three.)

Options:

A.

A template group can include a system template and an SD-WAN template.

B.

Each template group can contain up to three IPsec tunnel templates.

C.

CLI templates are applied in order, from top to bottom

D.

A CLI template group can contain CLI templates of both types.

E.

A CLI template can be of type CLI script or Perl script.

Question 5

Refer to the exhibit.

Which statement best describe the role of the ADVPN device in handling traffic?

Options:

A.

This is a hub that has received a query from a spoke and has forwarded it to another spoke.

B.

This is a hub in a dual-region topology. The remote hub tunnel ID is 10.0.2.101.

C.

This is a spoke that has received a shortcut query from another spoke and has forwarded the response to its hub.

D.

This is a spoke. The kernel received a shortcut request and forwards the query to another spoke.

Question 6

Refer to the exhibit.

An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network.

The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over HUB1-VPN1. However, the traffic is routed over HUB1-VPN3.

Based on the output shown in the exhibit, which two reasons, individually or together, could explain the observed behavior? (Choose two.)

Options:

A.

HUB1-VPN3 has a higher member configuration priority than HUB1-VPN1.

B.

The traffic matches a regular policy route configured with HUB1-VPN3 as the outgoing device

C.

HUB1-VPN1 does not have a valid route to the destination

D.

HUB1-VPN3 has a lower route priority value (higher priority) than HUB1-VPN1.

Question 7

Refer to the exhibits.

The exhibits show the source NAT (SNAT) global setting. port2 interface settings, and the routing table on FortiGate.

The administrator increases the member priority on port2 to 20.

Upon configuration changes and the receipt of new packets, which two actions does FortiGate perform on existing sessions established over port2? (Choose two.)

Options:

A.

FortiGate continues routing all existing sessions over port2.

B.

FortiGate routes only new sessions over port2.

C.

FortiGate flags the SNAT session as dirty only if the administrator has assigned an IP pool to the firewall policies with NAT.

D.

FortiGate flags the sessions as dirty.

E.

FortiGate updates the gateway information of the sessionswith SNAT so that they use port1instead of port2.

Question 8

When a customer delegate the installation and management of its SD-WAN infrastructure to an MSSP, the MSSP usually keeps the hub within its infrastructure for ease of management and to share costly resources.

In which two situations will the MSSP install the hub in customer premises? (Choose two.)

Options:

A.

The customer requires SIA with centralized breakout.

B.

The administrator expects a large volume of traffic between the branches.

C.

The customer expects a large amount of VoIP traffic.

D.

The majority of the branch traffic is directed to a corporate data center.

Question 9

Exhibit.

Which action will FortiGate take if it detects SD-WAN members as dead?

Options:

A.

FoftiGate bounces port5 after it detects all SD-WAN members as dead.

B.

FortiGate fails over to the secondary device after it detects port5 as dead.

C.

FortiGate sends alert messages through poft5 when it detects all SD-WAN members as dead

D.

FortiGate brings down port5 after it detects all SD-WAN members as dead.

Question 10

Exhibit.

The administrator configured the IPsec tunnel VPN1 on a FortiGate device with the parameters shown in exhibit.

Based on the configuration, which three conclusions can you draw about the characteristics and requirements of the VPN tunnel? (Choose three.)

Options:

A.

The tunnel interface IP address on the spoke side is provided by the hub.

B.

The remote end can be a third-party IPsec device.

C.

The administrator must manually assign the tunnel interface IP address on the hub side

D.

The remote end must support IKEv2.

E.

This configuration allows user-defined overlay IP addresses.

Question 11

The SD-WAN overlay template helps to prepare SD-WAN deployments. To complete the tasks performed by the SD-WAN overlay template, the administrator must perform some post-run tasks. What are two mandatory post-run tasks that must be performed? (Choose two.)

Options:

A.

Configure routing through the overlay tunnels created by the SD-WAN overlay template.

B.

Create policy packages andassign them to the branch devices.

C.

Assign a hub id metadata variable to each hub device.

D.

Configure SD-WAN rules

E.

Assign ansdwan_id metadata variable to each device (branch and hub)