0% found this document useful (0 votes)
275 views45 pages

FCP FGT

The document consists of a series of questions and answers related to FortiGate configurations and policies, covering topics such as timeout settings, NAT policies, sniffer commands, web proxy traffic, and security posture scorecards. Key correct answers include the use of 'hard-timeout' for user session management, specific NAT IP addresses for traffic, and the importance of SSL inspection and security policies in NGFW. Additional focus is given to understanding virtual IP addresses in HA clusters and the implications of using different polling modes for user logins.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views45 pages

FCP FGT

The document consists of a series of questions and answers related to FortiGate configurations and policies, covering topics such as timeout settings, NAT policies, sniffer commands, web proxy traffic, and security posture scorecards. Key correct answers include the use of 'hard-timeout' for user session management, specific NAT IP addresses for traffic, and the importance of SSL inspection and security policies in NGFW. Additional focus is given to understanding virtual IP addresses in HA clusters and the implications of using different polling modes for user logins.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 45

Question 1Skipped

An administrator wants to configure timeouts for users. Regardless of the user's behavior, the timer
should start as soon as the user authenticates and expire after the configured value.
Which timeout option should be configured on FortiGate?

A. auth-on-demand

B. soft-timeout

C. idle-timeout

D. new-session

Correct answer

E. hard-timeout

Overall explanation

Correct answer: E

For the described scenario, where the administrator wants the timer to start as soon as the user
authenticates and expire after the configured value, the appropriate timeout option to configure on
FortiGate is:

E. hard-timeout

The "hard-timeout" option sets the maximum time a user is allowed to remain logged in. The timer
starts as soon as the user authenticates, and the session expires after the configured time, regardless of
the user's activity or behavior.

Hard: time is an absolute value. Regardless of the user’s behavior, the timer starts as soon as the user
authenticates and expires after the configured value.

Question 2Skipped

Refer to the exhibit.


The exhibit contains a network diagram, central SNAT policy, and IP pool configuration.
The WAN (port1) interface has the IP address 10.200.1.1/24.
The LAN (port3) interface has the IP address 10.0.1.254/24.
A firewall policy is configured to allow to destinations from LAN (port3) to WAN (port1).
Central NAT is enabled, so NAT settings from matching Central SNAT policies will be applied.

Which IP address will be used to source NAT the traffic, if the user on Local-Client (10.0.1.10) pings the
IP address of Remote-FortiGate (10.200.3.1)?

A. 10.200.1.149

B. 10.200.1.1

C. 10.200.1.49

Correct answer

D. 10.200.1.99

Overall explanation

Correct answer: D

It's D because of the protocol number.

Ping is ICMP protocol - protocol number = 1

=> SNAT policy ID 1 is policy that used.

=> Translated address is "SNAT-Remote1" that 10.200.1.99

Question 3Skipped

An administrator is running the following sniffer command:


diagnose sniffer packet any "host 10.0.2.10" 3
What information will be included in the sniffer output? (Choose three.)

Correct selection

A. IP header

Correct selection

B. Ethernet header

Correct selection

C. Packet payload

D. Application header

E. Interface name

Overall explanation

Correct answer: ABC

It really depends on the Verbosity Level. This specific question for Verbosity level 3 is ABC.
C is correct:

Verbose levels in detail:

1: print header of packets.

2: print header and data from IP of packets.

3: print header and data from Ethernet of packets.

4: print header of packets with interface name.

5: print header and data from IP of packets with interface name.

6: print header and data from Ethernet of packets with interface name.

Reference:

https://kb.fortinet.com/kb/documentLink.do?externalID=11186

Question 4Skipped

Refer to the exhibit.


The exhibit shows proxy policies and proxy addresses, the authentication rule and authentication
scheme, users, and firewall address.
An explicit web proxy is configured for subnet range 10.0.1.0/24 with three explicit web proxy policies.
The authentication rule is configured to authenticate HTTP requests for subnet range 10.0.1.0/24 with
a form-based authentication scheme for the FortiGate local user database. Users will be prompted for
authentication.
How will FortiGate process the traffic when the HTTP request comes from a machine with the source
IP 10.0.1.10 to the destination http:// www.fortinet.com? (Choose three.)

A. If a Mozilla Firefox browser is used with User-B credentials, the HTTP request will be allowed.
Correct selection

B. If a Google Chrome browser is used with User-B credentials, the HTTP request will be allowed.

Correct selection

C. If a Mozilla Firefox browser is used with User-A credentials, the HTTP request will be allowed.

Correct selection

D. If a Microsoft Internet Explorer browser is used with User-B credentials, the HTTP request will be
allowed.

E. If a Mozilla Firefox browser is used with User-C credentials, the HTTP request will be denied.

Overall explanation

Correct answer: BCD

- Browser CAT2 & Local subnet & User B --> deny

- Browser CAT1 & Local subnet & User all --> accept

Above exhibits only users from Chrome and IE are allowed.

Chrome and IE use the same system proxy setting. Proxy rule is accept for all users with these two
browsers.

C: hit the 3rd rule.

Question 5Skipped

Refer to the exhibit.

The exhibit shows a FortiGate configuration.


How does FortiGate handle web proxy traffic coming from the IP address 10.2.1.200, that requires
authorization?

A. It always authorizes the traffic without requiring authentication.

B. It drops the traffic

C. It authenticates the traffic using the authentication scheme SCHEME2.


Correct answer

D. It authenticates the traffic using the authentication scheme SCHEME1.

Overall explanation

Correct answer: D. It authenticates the traffic using the authentication scheme SCHEME1.

What happens to traffic that requires authorization, but does not match any authentication rule? The
active and passive SSO schemes to use for those cases is defined under config authentication setting.

Question 6Skipped

Which two policies must be configured to allow traffic on a policy-based next-generation firewall
(NGFW) FortiGate? (Choose two.)

A. Firewall policy

B. Policy rule

Correct selection

C. Security policy

Correct selection

D. SSL inspection and authentication policy

Overall explanation

Correct answer: CD

NGFW policy based mode, you must configure a few policies to allow traffic:

SSL inspection & Authentication, Security policy.

Security policies work with SSL Inspection & Authentication policies to inspect traffic. To allow traffic
from a specific user or user group, both Security and SSL Inspection & Authentication policies must be
configured.

If you are using Policy Based Mode, SSL Inspection & Authentication (consolidated) and Security Policy
are required to allow traffic.

Question 7Skipped

Which Security rating scorecard helps identify configuration weakness and best practice violations in
your network?

A. Fabric Coverage

B. Automated Response
Correct answer

C. Security Posture

D. Optimization

Overall explanation

Correct answer: C. Security Posture

Description of the three major scorecards is seen in Security fabric > Security rating>Security posture.

Security Posture

Identify configuration weaknesses and best practice violations in your deployment.

Fabric Coverage

Identify in your overall network, where Security Fabric can enhance visibility and control.

Optimization

Optimize your fabric deployment.

The Security Posture scorecard is designed to identify configuration weaknesses and best practice
violations in a network. It assesses the overall security stance of an organization's network infrastructure
by evaluating how well it adheres to established security practices and configurations.

When using the Security Posture scorecard, the goal is to identify areas where the network configuration
may be vulnerable or where best practices are not being followed. It helps organizations assess and
improve their security posture by highlighting potential weaknesses and areas that require attention.

In contrast, the other options:

A. Fabric Coverage: Typically relates to the extent of coverage provided by a security fabric across an
organization's network.

B. Automated Response: Focuses on the ability of the security system to automatically respond to
security events or incidents.

D. Optimization: Generally refers to the efficiency and effectiveness of security measures in place.

Therefore, for identifying configuration weaknesses and best practice violations, the Security Posture
scorecard is the most relevant option.

Reference:

https://www.fortinet.com/content/dam/fortinet/assets/support/fortinet-recommended-security-best-
practices.pdf

Question 8Skipped
Which two statements are correct regarding FortiGate HA cluster virtual IP addresses? (Choose two.)

Correct selection

A. A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster.

Correct selection

B. Virtual IP addresses are used to distinguish between cluster members.

C. Heartbeat interfaces have virtual IP addresses that are manually assigned.

D. The primary device in the cluster is always assigned IP address 169.254.0.1.

Overall explanation

Correct answer: AB

A. A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster:

When a FortiGate device joins or leaves the High Availability (HA) cluster, there can be a change in the
virtual IP address. The virtual IP address is typically associated with the primary unit in the cluster, and if
there's a change in the cluster composition, the virtual IP may be reassigned to the new primary unit.

B. Virtual IP addresses are used to distinguish between cluster members:

Virtual IP addresses are indeed used to distinguish between cluster members. In an HA cluster, there is a
virtual IP address that is associated with the primary unit. This virtual IP address serves as the gateway
for devices on the network, and it helps ensure seamless failover in the event of a primary unit failure.

The other statements (C and D) are not accurate:

C. Heartbeat interfaces have virtual IP addresses that are manually assigned:

This statement is not correct. Heartbeat interfaces are used for communication between cluster
members to monitor each other's status. Virtual IP addresses are typically associated with the cluster
and are automatically assigned or reassigned based on the cluster configuration.

D. The primary device in the cluster is always assigned IP address 169.254.0.1:

This statement is not correct. The primary device in the cluster is assigned the virtual IP address
associated with the cluster. The IP address 169.254.0.1 is typically reserved for certain link-local purposes
and is not a standard IP address for the primary device in an HA cluster.

The correct statements regarding FortiGate HA cluster virtual IP addresses are:

A. A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster.

B. Virtual IP addresses are used to distinguish between cluster members.


Extra Explanation:

A. When a FortiGate device joins or leaves the cluster, the virtual IP address associated with the cluster
may change. The virtual IP address is assigned to the primary device in the cluster, and if that device
fails, the virtual IP address will failover to the secondary device.

B. Virtual IP addresses are used to distinguish between cluster members. Each device in the cluster has a
unique physical IP address, but they share a virtual IP address that is used by clients to communicate
with the cluster as a whole. The virtual IP address is used to identify the cluster, and clients use it to
connect to the cluster rather than connecting to a specific device.

A change in the heartbeat ip addresses might happend when a fortigate device joins or leaves the
cluster. In those cases, the cluster renegotiates the heartsbeat ip address assignment, this time taking
into account the serial number of any new device, o r removing the serial number of any device that left
the cluster & cluster uses these virtual ip addressesto: Distinguish the cluster member

Question 9Skipped

When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is
used as the source of the HTTP request?

A. remote user's public IP address

B. The public IP address of the FortiGate device.

C. The remote user's virtual IP address.

Correct answer

D. The internal IP address of the FortiGate device.

Overall explanation

Correct answer: D. The internal IP address of the FortiGate device.

The SSL VPN portal enables remote users to access internal network resources through a secure channel
using a web browser. The portal, bookmarks are used as links to internal network resources.

Source IP seen by the remote resources is FortiGate’s internal IP address and not the user’s IP address.

Reference:

https://kb.fortinet.com/kb/documentLink.do?externalID=FD36530

Question 10Skipped

How do you format the FortiGate flash disk?

A. Load the hardware test (HQIP) image.


Correct answer

B. Select the format boot device option from the BIOS menu.

C. Load a debug FortiOS image.

D. Execute the CLI command execute formatlogdisk.

Overall explanation

Correct answer: B. Select the format boot device option from the BIOS menu.

Selecting the format boot device option from the BIOS menu allows you to format the FortiGate flash
disk. This option is typically used when you need to reformat the flash disk to resolve issues or prepare it
for a fresh installation of the operating system. However, it's important to note that formatting the flash
disk will erase all data on it, so it should be done carefully.

Reference:

https://kb.fortinet.com/kb/documentLink.do?externalID=FD46582

https://kb.fortinet.com/kb/viewContent.do?externalId=10338

Question 11Skipped

When configuring a firewall virtual wire pair policy, which following statement is true?

A. Any number of virtual wire pairs can be included, as long as the policy traffic direction is the same.

B. Only a single virtual wire pair can be included in each policy.

Correct answer

C. Any number of virtual wire pairs can be included in each policy, regardless of the policy traffic
direction settings.

D. Exactly two virtual wire pairs need to be included in each policy.

Overall explanation

Correct answer: C. Any number of virtual wire pairs can be included in each policy, regardless of the
policy traffic direction settings.

Firewall virtual wire pair policies can include more than a single virtual wire pair. This capability can
streamline the policy management process by eliminating the need to create multiple, similiar policies
for each virtual wire pair. When creating or modifiying a policy, you can select the traffic direction for
each VWP included in the policy.

Note: We tested to create a policy. We can use any number of virtual wire pairs. We can select 3 options
in traffic direction: in/out/both.
Question 12Skipped

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

A. NetAPI polling can increase bandwidth usage in large networks.

Correct answer

B. The NetSessionEnum function is used to track user logouts.

C. The collector agent must search security event logs.

D. The collector agent uses a Windows API to query DCs for user logins.

Overall explanation

Correct answer: B. The NetSessionEnum function is used to track user logouts.

Study Guide – FSSO – FSSO with Windows Active Directory – Collector Agent-Based Polling Mode
Options.

Collector agent-based polling mode has three methods (or options) for collecting logon info: NetAPI,
WinSecLog and WMI.

NetAPI: Polls temporary sessions created on the DC when a user logs on or logs off and calls the
NetSessionEnum function on Windows. It’s faster than the WinSec and WMI methods; however, it can
miss some logon events if a DC is under heavy system load. This is because sessions can be quickly
created and purged form RAM, before the agent has a chance to poll and notify FG.

NetAPI: polls temporary sessions created on the DC when a user logs in or logs out and calls the
NetSessionEnum function on Windows. It’s faster than the WinSec and WMI methods; however, it can
miss some login events if a DC is under heavy system load. This is because sessions can be quickly
created and purged from RAM, before the agent has a chance to poll and notify FortiGate.

Incorrect:

A. NetAPI polling can increase bandwidth usage in large networks. (WinSecLog)

C. The collector agent must search security event logs. (WinSecLog)

D. The collector agent uses a Windows API to query DCs for user logins. (WMI)

- WinSecLog: polis all the security event logs from the DC. It doesn't miss any login events that have been
recorded by the DC because events are not normally deleted from the logs. There can be some delay in
FortiGate receiving events if the network is large and, therefore, writing to the logs is slow. It also
requires that the audit success of specific event IDs is recorded in the Windows security logs. For a full
list of supported event IDs, visit the Fortinet Knowledge Base (http://kb.fortinet.com).

- NetAPI: polls temporary sessions created on the DC when a user logs in or logs out and calls the
NetSessionEnum function on Windows. It's faster than the WinSec and WMI methods; however, it can
miss some login events if a DC is under heavy system load. This is because sessions can be quickly
created and purged from RAM, before the agent has a chance to poll and notify FortiGate.

Question 13Skipped

An administrator has configured outgoing interface any in a firewall policy.


Which statement is true about the policy list view?

Correct answer

A. Interface Pair view will be disabled.

B. Search option will be disabled.

C. Policy lookup will be disabled.

D. By Sequence view will be disabled.

Overall explanation

Correct answer: A. Interface Pair view will be disabled.

Study Guide – FW Policies – Managing FW Policies – Policy List – Interface Pair View and By Sequence.

FW policies appear in an organized list. The list is organized either in Interface Pair View or By Sequence.

Usually, the list will appear in Interface Pair View. Each section contains policies for that ingress-egress
pair. Alternatively, you can view your policies as a single, comprehensive list by selecting By Sequence at
the top of the page.

In some cases, you won’t have a choice of which view is used.

If you use multiple source or destination interfaces, or the any interface, in a FW policy, policies cannot
be separated into sections by interface pairs – some would be triplets or more. So instead, policies are
then always displayed in a single list (By Sequence).

Interface Pair view will be disabled.

Question 14Skipped

An administrator must disable RPF check to investigate an issue.


Which method is best suited to disable RPF without affecting features like antivirus and intrusion
prevention system?
A. Enable asymmetric routing, so the RPF check will be bypassed.

Correct answer

B. Disable the RPF check at the FortiGate interface level for the source check.

C. Disable the RPF check at the FortiGate interface level for the reply check.

D. Enable asymmetric routing at the interface level.

Overall explanation

Correct answer: B

"B" is the answer be careful question are very tricky. RPF methods in NSE guide says: Two ways to disable
RFP. 1 Enable asymetric routing, which disables RPF checking system wide (but not at interface level is
through the CLI command config system settings) 2 Disable RPF checkking at the interface level (the only
way at the interface level in the CLI command). A incorrect. If you enable asymetric routing, RPF not will
be bypass because is disable. B Correct. You have to disable the RPF check an the interface level, for the
source. C Is incorrect is for the source D is incorrect: Asymetric routing is not enable at interface level.

RPF checking can be disabled in tho ways. If you enable asymmetric routing, it will disable RPF checking
system wide. However this reduces the security of you network greatly. Features such us ANTIVIRUS, and
IPS become non-effective. So, if you need to disable RPF checking, you can do so at the interface level
using the command:

config system interface

edit <interface>

set src-check [enable | disable]

end

Question 15Skipped

Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?

Correct answer

A. Intrusion prevention system engine

B. Detection engine

C. Flow engine

D. Antivirus engine

Overall explanation

Correct Answer: A. Intrusion prevention system engine


IPS Engine is used by Application Control, AV, Web filter and Email filter.

Application control can be configured in proxy-based and flow-based firewall policies. However, because
application control uses the IPS engine, which uses flow-based inspection, inspection is always flow-
based.

It uses an IPS engine to analyze network traffic and detect application traffic, even if the application is
using standard or non-standard protocols and ports.

Question 16Skipped

A team manager has decided that, while some members of the team need access to a particular
website, the majority of the team does not Which configuration option is the most effective way to
support this request?

A. Implement web filter quotas for the specified website

B. Implement a DNS filter for the specified website.

C. Implement a web filter category override for the specified website

Correct answer

D. Implement web filter authentication for the specified website.

Overall explanation

Correct answer: D. Implement web filter authentication for the specified website.

Only some members can authenticated by providing their credentials.

- DNS filter & Web Filter Category Overide = Nobody can reach the site

- Web Filter Quotas = Everybody can reach

A could be a solution if you set custom categories and specify a webfilter to the group with access.. but B
is the most efective and simple solution.

Since both C and D are working options, answer C needs one more Web filter profile - the one that will
allow access to the category in which resides website's domain name. In both cases a custom category is
needed and a rating override, which will assign the website to that category. The question is "Which
configuration option is the most effective way to support this request" in that case this is answer D

Question 17Skipped

Which three options are the remote log storage options you can configure on FortiGate? (Choose
three.)

A. FortiSandbox
Correct selection

B. FortiCloud

Correct selection

C. FortiSIEM

D. FortiCache

Correct selection

E. FortiAnalyzer

Overall explanation

Answer: BCE

B. FortiCloud

C. FortiSIEM

E. FortiAnalyzer

You can configure FortiGate to store logs on syslog servers, FortiCloud, FortiSIEM, FortiAnalyzer, or
FortiManager. These logging devices can also be used as a backup solution. Whenever possible, it is
preferred to store logs externally.

If storing logs locally does not fit your requirements, you can store logs externally. You can configure FG
to store logs on syslog servers, FortiCloud, FortiSIEM, FortiAnalyzer or FortiManager. These logging
devices can also be used as a backup solution.

Question 18Skipped

Examine this PAC file configuration.

Which of the following statements are true? (Choose two.)

Correct selection

A. Browsers can be configured to retrieve this PAC file from the FortiGate.
B. Any web request to the 172.25. 120.0/24 subnet is allowed to bypass the proxy.

C. All requests not made to Fortinet.com or the 172.25. 120.0/24 subnet, have to go through
altproxy.corp.com: 8060.

Correct selection

D. Any web request fortinet.com is allowed to bypass the proxy.

Overall explanation

Correct answer: AD

The command direct bypass the proxy and it is a standard for pac files. And browsers can download de
pac file from any server/fortigate.

Question 19Skipped

In consolidated firewall policies, IPv4 and IPv6 policies are combined in a single consolidated policy.
Instead of separate policies.

Which three statements are true about consolidated IPv4 and IPv6 policy configuration? (Choose
three.)

A. The policy table in the GUI can be filtered to display policies with IPv4, IPv6 or IPv4 and IPv6 sources
and destinations.

B. The IP version of the sources and destinations in a firewall policy must be different.

Correct selection

C. The Incoming Interface. Outgoing Interface. Schedule, and Service fields can be shared with both
IPv4 and IPv6.

Correct selection

D. The policy table in the GUI will be consolidated to display policies with IPv4 and IPv6 sources and
destinations.

Correct selection

E. The IP version of the sources and destinations in a policy must match.

Overall explanation

Correct answer: CDE

C. The Incoming Interface, Outgoing Interface, Schedule, and Service fields can be shared with both IPv4
and IPv6.

 This statement is true. In a consolidated IPv4 and IPv6 policy, these fields can be shared, making
it more efficient to manage and configure policies.
D. The policy table in the GUI will be consolidated to display policies with IPv4 and IPv6 sources and
destinations.

 This statement is true. In consolidated firewall policies, the policy table in the graphical user
interface (GUI) is consolidated to display policies with both IPv4 and IPv6 sources and
destinations.

E. The IP version of the sources and destinations in a policy must match.

 This statement is true. While certain fields can be shared, the IP version of the sources and
destinations in a policy must match. If it's an IPv4 policy, the sources and destinations must be
IPv4, and if it's an IPv6 policy, the sources and destinations must be IPv6.

So, statements C, D, and E are correct

Question 20Skipped

Which timeout setting can be responsible for deleting SSL VPN associated sessions?

Correct answer

A. SSL VPN idle-timeout

B. SSL VPN http-request-body-timeout

C. SSL VPN login-timeout

D. SSL VPN dtls-hello-timeout

Overall explanation

Correct answer: A. SSL VPN idle-timeout

The SSL VPN idle-timeout setting determines how long an SSL VPN session can be inactive before it is
terminated. When an SSL VPN session becomes inactive (for example, if the user closes the VPN client or
disconnects from the network), the session timer begins to count down. If the timer reaches the idle-
timeout value before the user reconnects or sends any new traffic, the session will be terminated and
the associated resources (such as VPN tunnels and virtual interfaces) will be deleted.

Also, an inactive SSL VPN is disconnected after 300 seconds (5 minutes) of inactivity. You can change this
timeout using the Idle Logout setting on the GUI.

Question 21Skipped

On FortiGate, which type of logs record information about traffic directly to and from the FortiGate
management IP addresses?

A. Forward traffic logs

Correct answer

B. Local traffic logs


C. Security logs

D. System event logs

Overall explanation

Correct answer: B. Local traffic logs

Local traffic logs contain information about traffic directly to and from the FortiGate management IP
addresses. They also include connections to the GUI and FortiGuard queries.

Question 22Skipped

Which three CLI commands can you use to troubleshoot Layer 3 issues if the issue is in neither the
physical layer nor the link layer? (Choose three.)

A. diagnose sys top

Correct selection

B. execute ping

Correct selection

C. execute traceroute

Correct selection

D. diagnose sniffer packet any

E. get system arp

Overall explanation

Correct answer: BCD

”dia sys top” is not for troubleshooting layer 3 issues rather for troubleshooting CPU and Memory issues

diagnose sys top - list of processes with most CPU

get system arp - show interface, IP, MAC (physical layer)

"If you suspect that there is an IP address conflict.....you may need to look at the ARP table" - get system
arp (ans. E), and two other answers, B and C - execute ping, execute traceroute.

B. execute ping: The ping command is a fundamental tool for checking the connectivity between two
devices. It sends ICMP Echo Request packets to the destination and waits for ICMP Echo Reply packets.
This can help you verify if there is connectivity at the IP layer.
C. execute traceroute: The traceroute command allows you to trace the route that packets take from the
source to the destination. It shows the IP addresses of routers in the path and can help identify where a
packet might be dropping or encountering issues.

D. diagnose sniffer packet any: The diagnose sniffer packet any command is used to capture and
analyze packets on the FortiGate device. This can be helpful in inspecting the actual packets flowing
through the device, allowing you to identify any anomalies or potential issues at the packet level.

These commands are valuable for troubleshooting Layer 3 issues and gaining insights into the network
behavior at the IP layer.

Question 23Skipped

An administrator has a requirement to keep an application session from timing out on port 80. What
two changes can the administrator make to resolve the issue without affecting any existing services
running through FortiGate? (Choose two.)

Correct selection

A. Create a new firewall policy with the new HTTP service and place it above the existing HTTP policy.

Correct selection

B. Create a new service object for HTTP service and set the session TTL to never

C. Set the TTL value to never under config system-ttl

D. Set the session TTL on the HTTP policy to maximum

Overall explanation

The correct answers are:

A. Create a new firewall policy with the new HTTP service and place it above the existing HTTP policy.

B. Create a new service object for HTTP service and set the session TTL to never.

Explanation:

A. By creating a new firewall policy with the new HTTP service and placing it above the existing HTTP
policy, the administrator can ensure that this policy takes precedence and keeps the application session
from timing out on port 80.

B. Creating a new service object for HTTP service and setting the session TTL to never ensures that the
application session on port 80 does not time out.

key is: without affecting any existing services.

So, define new service on TCP80 with no session-ttl expire. Make new FW policy and place above other
HTTP policy.
Reference:

https://community.fortinet.com/t5/FortiGate/Technical-Tip-Session-timeout-settings/ta-p/191228

Question 24Skipped

Which statements best describe auto discovery VPN (ADVPN). (Choose two.)

Correct selection

A. It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.

B. ADVPN is only supported with IKEv2.

Correct selection

C. Tunnels are negotiated dynamically between spokes.

D. Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2
proposals are defined in advance.

Overall explanation

Correct answer: AC

A. "It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes."

 This statement is accurate. Auto Discovery VPN (ADVPN) often works in conjunction with
dynamic routing protocols to allow spokes to dynamically learn routes to other spokes. This
dynamic routing capability enhances the scalability and flexibility of the VPN.

C. "Tunnels are negotiated dynamically between spokes."

 This statement is also accurate. In ADVPN, the tunnels between spokes are negotiated
dynamically, meaning the VPN connections are established on-demand without requiring
manual configuration for each potential spoke.

Therefore, both statements A and C are correct, and they provide a comprehensive view of Auto
Discovery VPN (ADVPN) functionalities.

Question 25Skipped

Which security fabric feature causes an event trigger to monitor the network when a threat is
detected?

A. Security rating

B. Optimization

Correct answer

C. Automation stiches
D. Fabric connectors

Overall explanation

Correct answer: C. Automation stitches

In the context of the Fortinet Security Fabric, automation stitches are responsible for orchestrating
responses to security events. When a threat is detected, automation stitches can trigger events to
monitor the network, coordinate responses, and ensure a synchronized defense across the entire
security fabric. Therefore, option C is the correct answer.

Each automation stitch pairs an event trigger and one or more actions, it allows you to monitor your
network and take appropiate action when SecFabric detects a threat.

Question 26Skipped

Refer to the exhibit.

Based on the ZTNA tag, the security posture of the remote endpoint has changed.
What will happen to endpoint active ZTNA sessions?

A. They will be re-evaluated to match the endpoint policy.

B. They will be re-evaluated to match the firewall policy.

Correct answer

C. They will be re-evaluated to match the ZTNA policy.

D. They will be re-evaluated to match the security policy.

Overall explanation

C. They will be re-evaluated to match the ZTNA policy.


Endpoint posture changes trigger active ZTNA proxy sessions to be re-verified and terminated if the
endpoint is no longer compliant with the ZTNA policy.

Question 27Skipped

What devices form the core of the security fabric?

A. Two FortiGate devices and one FortiManager device

B. One FortiGate device and one FortiManager device

Correct answer

C. Two FortiGate devices and one FortiAnalyzer device

D. One FortiGate device and one FortiAnalyzer device

Overall explanation

C. Two FortiGate devices and one FortiAnalyzer device.

These devices form the core of the Fortinet Security Fabric, providing firewall functionality, centralized
management, logging, and reporting capabilities.

In certain scenarios, especially when emphasizing visibility and analysis, having multiple FortiGate
devices and a FortiAnalyzer device can indeed form a core configuration within the Fortinet Security
Fabric. FortiAnalyzer is used for centralized logging, reporting, and analysis of data from multiple
FortiGate devices, enhancing the overall security posture.

Question 28Skipped

Which of the following methods can be used to configure FortiGate to perform source NAT (SNAT) for
outgoing traffic?

A. Configure a static route pointing to the external interface.

Correct answer

B. Enable the "Use Outgoing Interface Address" option in a firewall policy.

C. Create a virtual server with an external IP address.

D. Deploy an IPsec VPN tunnel with NAT enabled.

Overall explanation

B. Enable the "Use Outgoing Interface Address" option in a firewall policy.

Explanation:

Source NAT (SNAT) is typically used to translate the private IP addresses of outgoing traffic to a public IP
address. One common method to perform SNAT in FortiGate is by enabling the "Use Outgoing Interface
Address" option in the firewall policy. This setting automatically translates the source IP of outgoing
packets to the IP address of the interface from which the traffic is leaving the FortiGate.

Options A, C, and D are related to routing and other forms of NAT but do not directly configure source
NAT in the firewall policy context.

Question 29Skipped

Refer to the exhibit:

Given the routing database shown in the exhibit, which two statements are correct? (Choose two.)

A. The port3 default route has the lowest metric.

Correct selection

B. The port3 default route has the highest distance.

C. There will be eight routes active in the routing table.

Correct selection

D. The port1 and port2 default routes are active in the routing table.

Overall explanation

Correct answer: BD

*> mean active routes

first square bracked mean administrative distance

second bracket square mean priority (valid only on static routes)

metric applies only in multiroutes with same administrative distance.

Question 30Skipped
Refer to the web filter raw logs.

Based on the raw logs shown in the exhibit, which statement is correct?

A. Access to the social networking web filter category was explicitly blocked to all users.

B. The action on firewall policy ID 1 is set to warning.

Correct answer

C. Social networking web filter category is configured with the action set to authenticate.

D. The name of the firewall policy is all_users_web.

Overall explanation

C is correct. We have two logs, first with action deny and second with passthrough.

A incorrect - second log shows: action="passthrough".

B incorrect - Firewall action can be allow or deny.

D incorrect - CLI don't show policy name, only ID.

Remember ... action="passthrough" mean that authentication has occurred/


At first attempt from the same IP source connection is blocked, but a warning message is displayed. At
the second attempt with the same IP source connection passtrough, so considering the first block and
the second pass, the user must authenticate to be granted with access.

Question 31Skipped

Refer to the exhibit.

The global settings on a FortiGate device must be changed to align with company security policies.
What does the Administrator account need to access the FortiGate global settings?

A. Enable restrict access to trusted hosts

B. Change password

C. Enable two-factor authentication

Correct answer

D. Change Administrator profile

Overall explanation

Correct answer: D. Change Administrator profile


By default, there is a special profile named super_admin, which is used by the account named admin.
You can't change it. It provides full access to everything, making the admin account similar to a root
superuser account.The prof_admin is another default profile. It also provides full access, but unlike
super_admin, it applies only to its virtual domain—not the global settings of FortiGate. Also, you can
change its permissions.

Question 32Skipped

When configuring a firewall virtual wire pair policy, which following statement is true?

A. Any number of virtual wire pairs can be included, as long as the policy traffic direction is the same.

B. Only a single virtual wire pair can be included in each policy.

Correct answer

C. Any number of virtual wire pairs can be included in each policy, regardless of the policy traffic
direction settings.

D. Exactly two virtual wire pairs need to be included in each policy.

Overall explanation

Correct answer: C. Any number of virtual wire pairs can be included in each policy, regardless of the
policy traffic direction settings.

We tested to create a policy. We can use any number of virtual wire pairs. We can select 3 options in
traffic direction: in/out/both.

Firewall virtual wire pair policies can include more than a single virtual wire pair. This capability can
streamline the policy management process by eliminating the need to create multiple, similar policies for
each virtual wire pair. When creating or modifying a policy, you can select the traffic direction for each
VWP included in the policy.

Question 33Skipped

Refer to the exhibit, which contains a session list output.


Based on the information shown in the exhibit, which statement is true?

A. Port block allocation IP pool is used in the firewall policy

B. Destination NAT is disabled in the firewall policy

C. Overload NAT IP pool is used in the firewall policy

Correct answer

D. One-to-one NAT IP pool is used in the firewall policy

Overall explanation

Correct answer: D. One-to-one NAT IP pool is used in the firewall policy.

In one-to-one, PAT is not required.

In the one-to-one pool type, an internal IP address is mapped with an external address on a first-come,
first-served basis.

There is a single mapping of an internal address to an external address. Mappings are not fixed and, if
there are no more addresses available, a connection will be refused.

Also, in one-to-one, PAT is not required. In the example on this slide, you can see the same source port is
shown for both the ingress and egress address.

Question 34Skipped

Which two statements are true about the FGCP protocol? (Choose two.)

A. Is used to discover FortiGate devices in different HA groups

B. Not used when FortiGate is in Transparent mode

Correct selection

C. Runs only over the heartbeat links

Correct selection

D. Elects the primary FortiGate device

Overall explanation

Correct answer: CD

C. Runs only over the heartbeat links: FGCP utilizes heartbeat links for exchanging heartbeat packets to
monitor the health of the cluster. While heartbeat links play a crucial role, other interfaces can also be
used for synchronization and communication within the cluster.

D. Elects the primary FortiGate device: FGCP is responsible for the election of the primary FortiGate
device in a high availability (HA) cluster. The primary FortiGate manages the traffic while the secondary
FortiGate stays in standby mode.
Question 35Skipped

Refer to the exhibit, which contains a session diagnostic output.

Which statement is true about the session diagnostic output?

A. The session is in TCP ESTABLISHED state.

Correct answer

B. The session is a bidirectional UDP connection.

C. The session is a UDP unidirectional state.

D. The session is a bidirectional TCP connection.

Overall explanation

Correct answer: B. The session is a bidirectional UDP connection.

B. Protocol 17 means UDP and proto_state=1 is bidirectional (proto_state=0 is unidirectional)

proto=17 -> UDP

proto_state=01 -> UDP Reply seen

A is wrong

Question 36Skipped

Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)

Correct selection

A. SSH

Correct selection

B. HTTPS
C. FTM

D. FortiTelemetry

Overall explanation

Correct answer: AB

The two protocols used to enable administrator access to a FortiGate device are:

A. SSH (Secure Shell)

SSH is a secure protocol used for accessing the command-line interface (CLI) of FortiGate devices.

B. HTTPS (Hypertext Transfer Protocol Secure)

HTTPS is a secure protocol used for accessing the web-based graphical user interface (GUI) of FortiGate
devices.

Question 37Skipped

An administrator has configured the following settings:

What are the two results of this configuration? (Choose two.)

A. Device detection on all interfaces is enforced for 30 minutes

B. Denied users are blocked for 30 minutes

Correct selection

C. A session for denied traffic is created

Correct selection

D. The number of logs generated by denied traffic is reduced

Overall explanation

Correct answer: CD

C. A session for denied traffic is created.

D. The number of logs generated by denied traffic is reduced.


During the session, if a security profile detects a violation, FortiGate records the attack log immediately.
To reduce the number of log messages generated and improve performance, you can enable a session
table entry of dropped traffic. This creates the denied session in the session table and, if the session is
denied, all packets of that session are also denied. This ensures that FortiGate does not have to do a
policy lookup for each new packet matching the denied session, which reduces CPU usage and log
generation.

This option is in the CLI, and is called ses-denied-traffic. You can also set the duration for block sessions.
This determines how long a session will be kept in the session table by setting block-sessiontimer in the
CLI. By default, it is set to 30 seconds.

Question 38Skipped

Refer to the exhibit.

Which contains a network diagram and routing table output. The Student is unable to access
Webserver.
What is the cause of the problem and what is the solution for the problem?

A. The first packet sent from Student failed the RPF check. This issue can be resolved by adding a static
route to 10.0.4.0/24 through wan1.

B. The first reply packet for Student failed the RPF check. This issue can be resolved by adding a static
route to 10.0.4.0/24 through wan1.

Correct answer

C. The first reply packet for Student failed the RPF check. This issue can be resolved by adding a static
route to 203.0.114.24/32 through port3.

D. The first packet sent from Student failed the RPF check. This issue can be resolved by adding a static
route to 203.0.114.24/32 through port3.
Overall explanation

Correct answer: C. The first reply packet for Student failed the RPF check. This issue can be resolved by
adding a static route to 203.0.114.24/32 through port3.

Option C is the correct answer based on the provided information, let's analyze it:

Option C states: "The first reply packet for Student failed the RPF check. This issue can be resolved by
adding a static route to 203.0.114.24/32 through port3."

The issue is related to the first reply packet from the Student failing the Reverse Path Forwarding (RPF)
check and that adding a static route to 203.0.114.24/32 through "port3" will resolve the problem, then
you can go ahead with this solution.

In a typical RPF check scenario, it ensures that the incoming packet is arriving on the expected interface
based on the routing table. Adding a static route to 203.0.114.24/32 through "port3" may indeed resolve
the RPF issue if the routing is misconfigured.

Option C is the correct solution based on your network setup and further analysis, you can proceed with
implementing that static route to see if it resolves the issue. Additionally, it's a good practice to monitor
the network to ensure that the problem is indeed resolved after making the change.

Question 39Skipped

Refer to the FortiGuard connection debug output.

Based on the output shown in the exhibit, which two statements are correct? (Choose two.)

A. There is at least one server that lost packets consecutively.

Correct selection
B. One server was contacted to retrieve the contract information.

C. A local FortiManager is one of the servers FortiGate communicates with.

Correct selection

D. FortiGate is using default FortiGuard communication settings.

Overall explanation

Correct answer: BD

B is correct, one server has the flag DI which means it was contacted to retrieve contract information.

A: no server has packets dropped

C: No local(ip) fortimanager can be seen

D: .... Anycast is enabled by default(as it says on the study guide) so its not using default settings. still, it
uses HTTPS(TCP) and port 443 under tcp so we can consider this a default setting.

"by default, FortiGate is configured to enforce the use of HTTPS port 443 to perform live filtering with
FortiGuard or FortiManager"

We did check ourFortiGate and its configured the same.

Anycast is Enabled by default, but A and C are definitely incorrect.

Question 40Skipped

Refer to the exhibit.


A user located behind the FortiGate device is trying to go to http://www.addictinggames.com
(Addicting.Games). The exhibit shows the application detains and application control profile.
Based on this configuration, which statement is true?

A. Addicting.Games will be blocked, based on the Filter Overrides configuration.

B. Addicting.Games will be allowed only if the Filter Overrides action is set to Learn.

C. Addicting.Games will be allowed, based on the Categories configuration.

Correct answer
D. Addicting.Games will be allowed, based on the Application Overrides configuration.

Overall explanation

Correct answer: D. Addicting.Games will be allowed, based on the Application Overrides configuration.

Based on the Scan order. Application and Filter overrides>>Category.

Application and Filter overrides follows the same rules as firewall policy. Application override will be
considered first.

Question 41Skipped

Which two statements are true about the RPF check? (Choose two.)

Correct selection

A. The RPF check is run on the first sent packet of any new session.

B. The RPF check is run on the first reply packet of any new session.

C. The RPF check is run on the first sent and reply packet of any new session.

Correct selection

D. RPF is a mechanism that protects FortiGuard and your network from IP spoofing attacks.

Overall explanation

Correct answer: AD

RPF protect against IP spoofin attacks. The source IP address is checked against the routing table for a
return path. RPF is only carried out on: The first packet in the session, not on reply.

Question 42Skipped

Refer to the exhibit.


The exhibit contains a network diagram, firewall policies, and a firewall address object configuration.
An administrator created a Deny policy with default settings to deny Webserver access for Remote-
user2. Remote-user2 is still able to access Webserver.
Which two changes can the administrator make to deny Webserver access for Remote-User2? (Choose
two.)

A. Disable match-vip in the Deny policy.

B. Set the Destination address as Deny_IP in the Allow-access policy.

Correct selection

C. Enable match-vip in the Deny policy.

Correct selection

D. Set the Destination address as Web_server in the Deny policy.

Overall explanation

Correct answer: CD

By default does not match vip in deny policy for destination all. So 2 options we have:

1. Enable match vip in the Deny policy.

2. Add destination as webserver in deny policy.

It should set match-vip enable, nor disable it...

Reference:

https://community.fortinet.com/t5/FortiGate/Technical-Tip-Firewall-does-not-block-incoming-WAN-to-
LAN/ta-p/189641

Question 43Skipped

Which two statements are correct about a software switch on FortiGate? (Choose two.)

Correct selection

A. It can be configured only when FortiGate is operating in NAT mode

B. Can act as a Layer 2 switch as well as a Layer 3 router

Correct selection

C. All interfaces in the software switch share the same IP address

D. It can group only physical interfaces

Overall explanation
Correct answer: AC

A is correct: "Only supported in NAT mode"

C is correct: "The interfaces share the same IP address and belong to the same broadcast domain.

Incorrect options:

B is incorrect: "Acts Like a traditional Layer 2 switch".

D is incorrect: "Can group multiple physical and wireless interfaces into a single virtual switch Interface"

Can group physical and wireless.

Only works on NAT mode.

Acts like traditional layer 3 switch.

Interfaces share same IP and broadcast domain.

Question 44Skipped

Which of statement is true about SSL VPN web mode?

A. The external network application sends data through the VPN

B. It assigns a virtual IP address to the client

Correct answer

C. It supports a limited number of protocols

D. The tunnel is up while the client is connected

Overall explanation

C. It supports a limited number of protocols

SSL VPN web mode typically supports a limited number of protocols compared to the full SSL VPN tunnel
mode. This limitation is due to the nature of web-based applications and the restrictions of running
within a web browser.

Web mode requires only a web browser, but supports a limited number of protocols.

A is incorrect - External network applications running on the user’s PC cannot send data across the VPN.

C is correct - Web mode requires only a web browser, but supports a limited number of protocols.

Question 45Skipped
Which two statements about IPsec authentication on FortiGate are correct? (Choose two.)

Correct selection

A. For a stronger authentication, you can also enable extended authentication (XAuth) to request the
remote peer to provide a username and password.

Correct selection

B. FortiGate supports pre-shared key and signature as authentication methods.

C. Enabling XAuth results in a faster authentication because fewer packets are exchanged.

D. A certificate is not required on the remote peer when you set the signature as the authentication
method.

Overall explanation

Correct answer: AB

A. For a stronger authentication, you can also enable extended authentication (XAuth) to request the
remote peer to provide a username and password.

B. FortiGate supports pre-shared key and signature as authentication methods.

Explanation: A. XAuth provides an additional layer of authentication by requiring the remote peer to
provide a username and password in addition to the pre-shared key or certificate. This enhances
security. B. FortiGate supports both pre-shared key and signature (using certificates) as authentication
methods for IPsec VPN connections, offering flexibility based on security requirements.

C. Enabling XAuth does not necessarily result in faster authentication because additional packets are
exchanged to complete the XAuth process. D. When using the signature as the authentication method, a
certificate is required on the remote peer for authentication, ensuring secure communication.

To authenticate each other, the peers use two methods: pre-shared key or digital signature. You can also
enable an additional authentication method, XAuth, to enhance authentication.

Question 46Skipped

Which CLI command will display sessions both from client to the proxy and from the proxy to the
servers?

Correct answer

A. diagnose wad session list

B. diagnose wad session list | grep hook-pre&&hook-out

C. diagnose wad session list | grep hook=pre&&hook=out


D. diagnose wad session list | grep "hook=pre"&"hook=out"

Overall explanation

Correct answer: A. diagnose wad session list

Running the diagnose wad session list command will indeed display the sessions managed by the Web
Application Firewall (WAF) module, and you can review the information in the output to analyze traffic
from the client to the proxy and from the proxy to the servers.

Question 47Skipped

By default, FortiGate is configured to use HTTPS when performing live web filtering with FortiGuard
servers.
Which CLI command causes FortiGate to use an unreliable protocol to communicate with FortiGuard
servers for live web filtering?

A. set webfilter-force-off disable

B. set webfilter-cache disable

C. set protocol tcp

Correct answer

D. set fortiguard-anycast disable

Overall explanation

The CLI command that causes FortiGate to use an unreliable protocol to communicate with FortiGuard
servers for live web filtering is: D. set fortiguard-anycast disable

Disabling FortiGuard Anycast will cause FortiGate to use a direct connection (unreliable protocol) instead
of the anycast-based connection for communication with FortiGuard servers. This may be necessary in
certain scenarios where anycast is causing issues, and a direct connection is preferred.

By default, FortiGate is configured to enforce the use of HTTPS port 443 to perform live filtering with
FortiGuard or FortiManager. Other ports and protocols are available by disabling the FortiGuard anycast
setting on the CLI.

Question 48Skipped

Which two configuration settings are synchronized when FortiGate devices are in an active-active HA
cluster? (Choose two.)

A. FortiGuard web filter cache

B. FortiGate hostname

Correct selection

C. NTP
Correct selection

D. DNS

Overall explanation

Correct answer: CD

C. NTP

D. DNS

Not all the configuration settings are synchronized. There are a few that are not, such as:

• System interface settings of the HA reserved management interface and the HA default route for the
reserved management interface

• In-band HA management interface

• HA override

• HA device priority

• Virtual cluster priority

• FortiGate hostname

• HA priority setting for a ping server (or dead gateway detection) configuration

• All licenses except FortiToken licenses (serial numbers)

• Cache

Fortigate Hostname is not synchronized between cluster member.

Question 49Skipped

Refer to the exhibits.


Exhibit A.
Exhibit B.

An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security
fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).
What must the administrator do to synchronize the address object?

A. Change the csf setting on Local-FortiGate (root) to set configuration-sync local.

B. Change the csf setting on ISFW (downstream) to set configuration-sync local.

Correct answer

C. Change the csf setting on Local-FortiGate (root) to set fabric-object-unification default.


D. Change the csf setting on ISFW (downstream) to set fabric-object-unification default.

Overall explanation

Correct answer: C. Change the csf setting on Local-FortiGate (root) to set fabric-object-unification
default.

The CLI command set fabric-object-unification is only available on the root FortiGate. When set to local,
global objects will not be synchronized to downstream devices in the Security Fabric. The default value is
default.

Option A will not synchronise global fabric objects downstream.

When both devices are configured with set downstream-access-disable (answer in C) then the newly
created address objects are still replicated. However, when I configure the root with set fabric-object-
unification local the address object is no longer replicated to the downstream FortiGates.

Question 50Skipped

Which two statements are correct about NGFW Policy-based mode? (Choose two.)

A. NGFW policy-based mode does not require the use of central source NAT policy

B. NGFW policy-based mode can only be applied globally and not on individual VDOMs

Correct selection

C. NGFW policy-based mode supports creating applications and web filtering categories directly in a
firewall policy

Correct selection

D. NGFW policy-based mode policies support only flow inspection

Overall explanation

Correct answer: CD

C. NGFW policy-based mode supports creating applications and web filtering categories directly in a
firewall policy.

In NGFW policy-based mode, you can define applications and web filtering categories directly within the
firewall policy. This allows you to apply specific controls and restrictions based on the types of
applications and content, offering a more granular approach to managing network traffic.

D. NGFW policy-based mode policies support only flow inspection.


In NGFW (Next-Generation Firewall) policy-based mode, the emphasis is on flow inspection. Flow
inspection involves evaluating the traffic based on predefined rules and policies without deep packet
inspection of the content. This mode is optimized for efficiently processing large volumes of traffic by
analyzing the flow of data and making decisions based on factors such as source, destination, ports, and
protocol.

Back to result overviewScroll back to top

Continue

Retake test

You might also like