FCP FGT
FCP FGT
An administrator wants to configure timeouts for users. Regardless of the user's behavior, the timer
should start as soon as the user authenticates and expire after the configured value.
Which timeout option should be configured on FortiGate?
A. auth-on-demand
B. soft-timeout
C. idle-timeout
D. new-session
Correct answer
E. hard-timeout
Overall explanation
Correct answer: E
For the described scenario, where the administrator wants the timer to start as soon as the user
authenticates and expire after the configured value, the appropriate timeout option to configure on
FortiGate is:
E. hard-timeout
The "hard-timeout" option sets the maximum time a user is allowed to remain logged in. The timer
starts as soon as the user authenticates, and the session expires after the configured time, regardless of
the user's activity or behavior.
Hard: time is an absolute value. Regardless of the user’s behavior, the timer starts as soon as the user
authenticates and expires after the configured value.
Question 2Skipped
Which IP address will be used to source NAT the traffic, if the user on Local-Client (10.0.1.10) pings the
IP address of Remote-FortiGate (10.200.3.1)?
A. 10.200.1.149
B. 10.200.1.1
C. 10.200.1.49
Correct answer
D. 10.200.1.99
Overall explanation
Correct answer: D
Question 3Skipped
Correct selection
A. IP header
Correct selection
B. Ethernet header
Correct selection
C. Packet payload
D. Application header
E. Interface name
Overall explanation
It really depends on the Verbosity Level. This specific question for Verbosity level 3 is ABC.
C is correct:
6: print header and data from Ethernet of packets with interface name.
Reference:
https://kb.fortinet.com/kb/documentLink.do?externalID=11186
Question 4Skipped
A. If a Mozilla Firefox browser is used with User-B credentials, the HTTP request will be allowed.
Correct selection
B. If a Google Chrome browser is used with User-B credentials, the HTTP request will be allowed.
Correct selection
C. If a Mozilla Firefox browser is used with User-A credentials, the HTTP request will be allowed.
Correct selection
D. If a Microsoft Internet Explorer browser is used with User-B credentials, the HTTP request will be
allowed.
E. If a Mozilla Firefox browser is used with User-C credentials, the HTTP request will be denied.
Overall explanation
- Browser CAT1 & Local subnet & User all --> accept
Chrome and IE use the same system proxy setting. Proxy rule is accept for all users with these two
browsers.
Question 5Skipped
Overall explanation
Correct answer: D. It authenticates the traffic using the authentication scheme SCHEME1.
What happens to traffic that requires authorization, but does not match any authentication rule? The
active and passive SSO schemes to use for those cases is defined under config authentication setting.
Question 6Skipped
Which two policies must be configured to allow traffic on a policy-based next-generation firewall
(NGFW) FortiGate? (Choose two.)
A. Firewall policy
B. Policy rule
Correct selection
C. Security policy
Correct selection
Overall explanation
Correct answer: CD
NGFW policy based mode, you must configure a few policies to allow traffic:
Security policies work with SSL Inspection & Authentication policies to inspect traffic. To allow traffic
from a specific user or user group, both Security and SSL Inspection & Authentication policies must be
configured.
If you are using Policy Based Mode, SSL Inspection & Authentication (consolidated) and Security Policy
are required to allow traffic.
Question 7Skipped
Which Security rating scorecard helps identify configuration weakness and best practice violations in
your network?
A. Fabric Coverage
B. Automated Response
Correct answer
C. Security Posture
D. Optimization
Overall explanation
Description of the three major scorecards is seen in Security fabric > Security rating>Security posture.
Security Posture
Fabric Coverage
Identify in your overall network, where Security Fabric can enhance visibility and control.
Optimization
The Security Posture scorecard is designed to identify configuration weaknesses and best practice
violations in a network. It assesses the overall security stance of an organization's network infrastructure
by evaluating how well it adheres to established security practices and configurations.
When using the Security Posture scorecard, the goal is to identify areas where the network configuration
may be vulnerable or where best practices are not being followed. It helps organizations assess and
improve their security posture by highlighting potential weaknesses and areas that require attention.
A. Fabric Coverage: Typically relates to the extent of coverage provided by a security fabric across an
organization's network.
B. Automated Response: Focuses on the ability of the security system to automatically respond to
security events or incidents.
D. Optimization: Generally refers to the efficiency and effectiveness of security measures in place.
Therefore, for identifying configuration weaknesses and best practice violations, the Security Posture
scorecard is the most relevant option.
Reference:
https://www.fortinet.com/content/dam/fortinet/assets/support/fortinet-recommended-security-best-
practices.pdf
Question 8Skipped
Which two statements are correct regarding FortiGate HA cluster virtual IP addresses? (Choose two.)
Correct selection
A. A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster.
Correct selection
Overall explanation
Correct answer: AB
A. A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster:
When a FortiGate device joins or leaves the High Availability (HA) cluster, there can be a change in the
virtual IP address. The virtual IP address is typically associated with the primary unit in the cluster, and if
there's a change in the cluster composition, the virtual IP may be reassigned to the new primary unit.
Virtual IP addresses are indeed used to distinguish between cluster members. In an HA cluster, there is a
virtual IP address that is associated with the primary unit. This virtual IP address serves as the gateway
for devices on the network, and it helps ensure seamless failover in the event of a primary unit failure.
This statement is not correct. Heartbeat interfaces are used for communication between cluster
members to monitor each other's status. Virtual IP addresses are typically associated with the cluster
and are automatically assigned or reassigned based on the cluster configuration.
This statement is not correct. The primary device in the cluster is assigned the virtual IP address
associated with the cluster. The IP address 169.254.0.1 is typically reserved for certain link-local purposes
and is not a standard IP address for the primary device in an HA cluster.
A. A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster.
A. When a FortiGate device joins or leaves the cluster, the virtual IP address associated with the cluster
may change. The virtual IP address is assigned to the primary device in the cluster, and if that device
fails, the virtual IP address will failover to the secondary device.
B. Virtual IP addresses are used to distinguish between cluster members. Each device in the cluster has a
unique physical IP address, but they share a virtual IP address that is used by clients to communicate
with the cluster as a whole. The virtual IP address is used to identify the cluster, and clients use it to
connect to the cluster rather than connecting to a specific device.
A change in the heartbeat ip addresses might happend when a fortigate device joins or leaves the
cluster. In those cases, the cluster renegotiates the heartsbeat ip address assignment, this time taking
into account the serial number of any new device, o r removing the serial number of any device that left
the cluster & cluster uses these virtual ip addressesto: Distinguish the cluster member
Question 9Skipped
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is
used as the source of the HTTP request?
Correct answer
Overall explanation
The SSL VPN portal enables remote users to access internal network resources through a secure channel
using a web browser. The portal, bookmarks are used as links to internal network resources.
Source IP seen by the remote resources is FortiGate’s internal IP address and not the user’s IP address.
Reference:
https://kb.fortinet.com/kb/documentLink.do?externalID=FD36530
Question 10Skipped
B. Select the format boot device option from the BIOS menu.
Overall explanation
Correct answer: B. Select the format boot device option from the BIOS menu.
Selecting the format boot device option from the BIOS menu allows you to format the FortiGate flash
disk. This option is typically used when you need to reformat the flash disk to resolve issues or prepare it
for a fresh installation of the operating system. However, it's important to note that formatting the flash
disk will erase all data on it, so it should be done carefully.
Reference:
https://kb.fortinet.com/kb/documentLink.do?externalID=FD46582
https://kb.fortinet.com/kb/viewContent.do?externalId=10338
Question 11Skipped
When configuring a firewall virtual wire pair policy, which following statement is true?
A. Any number of virtual wire pairs can be included, as long as the policy traffic direction is the same.
Correct answer
C. Any number of virtual wire pairs can be included in each policy, regardless of the policy traffic
direction settings.
Overall explanation
Correct answer: C. Any number of virtual wire pairs can be included in each policy, regardless of the
policy traffic direction settings.
Firewall virtual wire pair policies can include more than a single virtual wire pair. This capability can
streamline the policy management process by eliminating the need to create multiple, similiar policies
for each virtual wire pair. When creating or modifiying a policy, you can select the traffic direction for
each VWP included in the policy.
Note: We tested to create a policy. We can use any number of virtual wire pairs. We can select 3 options
in traffic direction: in/out/both.
Question 12Skipped
Which statement correctly describes NetAPI polling mode for the FSSO collector agent?
Correct answer
D. The collector agent uses a Windows API to query DCs for user logins.
Overall explanation
Study Guide – FSSO – FSSO with Windows Active Directory – Collector Agent-Based Polling Mode
Options.
Collector agent-based polling mode has three methods (or options) for collecting logon info: NetAPI,
WinSecLog and WMI.
NetAPI: Polls temporary sessions created on the DC when a user logs on or logs off and calls the
NetSessionEnum function on Windows. It’s faster than the WinSec and WMI methods; however, it can
miss some logon events if a DC is under heavy system load. This is because sessions can be quickly
created and purged form RAM, before the agent has a chance to poll and notify FG.
NetAPI: polls temporary sessions created on the DC when a user logs in or logs out and calls the
NetSessionEnum function on Windows. It’s faster than the WinSec and WMI methods; however, it can
miss some login events if a DC is under heavy system load. This is because sessions can be quickly
created and purged from RAM, before the agent has a chance to poll and notify FortiGate.
Incorrect:
D. The collector agent uses a Windows API to query DCs for user logins. (WMI)
- WinSecLog: polis all the security event logs from the DC. It doesn't miss any login events that have been
recorded by the DC because events are not normally deleted from the logs. There can be some delay in
FortiGate receiving events if the network is large and, therefore, writing to the logs is slow. It also
requires that the audit success of specific event IDs is recorded in the Windows security logs. For a full
list of supported event IDs, visit the Fortinet Knowledge Base (http://kb.fortinet.com).
- NetAPI: polls temporary sessions created on the DC when a user logs in or logs out and calls the
NetSessionEnum function on Windows. It's faster than the WinSec and WMI methods; however, it can
miss some login events if a DC is under heavy system load. This is because sessions can be quickly
created and purged from RAM, before the agent has a chance to poll and notify FortiGate.
Question 13Skipped
Correct answer
Overall explanation
Study Guide – FW Policies – Managing FW Policies – Policy List – Interface Pair View and By Sequence.
FW policies appear in an organized list. The list is organized either in Interface Pair View or By Sequence.
Usually, the list will appear in Interface Pair View. Each section contains policies for that ingress-egress
pair. Alternatively, you can view your policies as a single, comprehensive list by selecting By Sequence at
the top of the page.
If you use multiple source or destination interfaces, or the any interface, in a FW policy, policies cannot
be separated into sections by interface pairs – some would be triplets or more. So instead, policies are
then always displayed in a single list (By Sequence).
Question 14Skipped
Correct answer
B. Disable the RPF check at the FortiGate interface level for the source check.
C. Disable the RPF check at the FortiGate interface level for the reply check.
Overall explanation
Correct answer: B
"B" is the answer be careful question are very tricky. RPF methods in NSE guide says: Two ways to disable
RFP. 1 Enable asymetric routing, which disables RPF checking system wide (but not at interface level is
through the CLI command config system settings) 2 Disable RPF checkking at the interface level (the only
way at the interface level in the CLI command). A incorrect. If you enable asymetric routing, RPF not will
be bypass because is disable. B Correct. You have to disable the RPF check an the interface level, for the
source. C Is incorrect is for the source D is incorrect: Asymetric routing is not enable at interface level.
RPF checking can be disabled in tho ways. If you enable asymmetric routing, it will disable RPF checking
system wide. However this reduces the security of you network greatly. Features such us ANTIVIRUS, and
IPS become non-effective. So, if you need to disable RPF checking, you can do so at the interface level
using the command:
edit <interface>
end
Question 15Skipped
Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?
Correct answer
B. Detection engine
C. Flow engine
D. Antivirus engine
Overall explanation
Application control can be configured in proxy-based and flow-based firewall policies. However, because
application control uses the IPS engine, which uses flow-based inspection, inspection is always flow-
based.
It uses an IPS engine to analyze network traffic and detect application traffic, even if the application is
using standard or non-standard protocols and ports.
Question 16Skipped
A team manager has decided that, while some members of the team need access to a particular
website, the majority of the team does not Which configuration option is the most effective way to
support this request?
Correct answer
Overall explanation
Correct answer: D. Implement web filter authentication for the specified website.
- DNS filter & Web Filter Category Overide = Nobody can reach the site
A could be a solution if you set custom categories and specify a webfilter to the group with access.. but B
is the most efective and simple solution.
Since both C and D are working options, answer C needs one more Web filter profile - the one that will
allow access to the category in which resides website's domain name. In both cases a custom category is
needed and a rating override, which will assign the website to that category. The question is "Which
configuration option is the most effective way to support this request" in that case this is answer D
Question 17Skipped
Which three options are the remote log storage options you can configure on FortiGate? (Choose
three.)
A. FortiSandbox
Correct selection
B. FortiCloud
Correct selection
C. FortiSIEM
D. FortiCache
Correct selection
E. FortiAnalyzer
Overall explanation
Answer: BCE
B. FortiCloud
C. FortiSIEM
E. FortiAnalyzer
You can configure FortiGate to store logs on syslog servers, FortiCloud, FortiSIEM, FortiAnalyzer, or
FortiManager. These logging devices can also be used as a backup solution. Whenever possible, it is
preferred to store logs externally.
If storing logs locally does not fit your requirements, you can store logs externally. You can configure FG
to store logs on syslog servers, FortiCloud, FortiSIEM, FortiAnalyzer or FortiManager. These logging
devices can also be used as a backup solution.
Question 18Skipped
Correct selection
A. Browsers can be configured to retrieve this PAC file from the FortiGate.
B. Any web request to the 172.25. 120.0/24 subnet is allowed to bypass the proxy.
C. All requests not made to Fortinet.com or the 172.25. 120.0/24 subnet, have to go through
altproxy.corp.com: 8060.
Correct selection
Overall explanation
Correct answer: AD
The command direct bypass the proxy and it is a standard for pac files. And browsers can download de
pac file from any server/fortigate.
Question 19Skipped
In consolidated firewall policies, IPv4 and IPv6 policies are combined in a single consolidated policy.
Instead of separate policies.
Which three statements are true about consolidated IPv4 and IPv6 policy configuration? (Choose
three.)
A. The policy table in the GUI can be filtered to display policies with IPv4, IPv6 or IPv4 and IPv6 sources
and destinations.
B. The IP version of the sources and destinations in a firewall policy must be different.
Correct selection
C. The Incoming Interface. Outgoing Interface. Schedule, and Service fields can be shared with both
IPv4 and IPv6.
Correct selection
D. The policy table in the GUI will be consolidated to display policies with IPv4 and IPv6 sources and
destinations.
Correct selection
Overall explanation
C. The Incoming Interface, Outgoing Interface, Schedule, and Service fields can be shared with both IPv4
and IPv6.
       This statement is true. In a consolidated IPv4 and IPv6 policy, these fields can be shared, making
        it more efficient to manage and configure policies.
D. The policy table in the GUI will be consolidated to display policies with IPv4 and IPv6 sources and
destinations.
       This statement is true. In consolidated firewall policies, the policy table in the graphical user
        interface (GUI) is consolidated to display policies with both IPv4 and IPv6 sources and
        destinations.
       This statement is true. While certain fields can be shared, the IP version of the sources and
        destinations in a policy must match. If it's an IPv4 policy, the sources and destinations must be
        IPv4, and if it's an IPv6 policy, the sources and destinations must be IPv6.
Question 20Skipped
Which timeout setting can be responsible for deleting SSL VPN associated sessions?
Correct answer
Overall explanation
The SSL VPN idle-timeout setting determines how long an SSL VPN session can be inactive before it is
terminated. When an SSL VPN session becomes inactive (for example, if the user closes the VPN client or
disconnects from the network), the session timer begins to count down. If the timer reaches the idle-
timeout value before the user reconnects or sends any new traffic, the session will be terminated and
the associated resources (such as VPN tunnels and virtual interfaces) will be deleted.
Also, an inactive SSL VPN is disconnected after 300 seconds (5 minutes) of inactivity. You can change this
timeout using the Idle Logout setting on the GUI.
Question 21Skipped
On FortiGate, which type of logs record information about traffic directly to and from the FortiGate
management IP addresses?
Correct answer
Overall explanation
Local traffic logs contain information about traffic directly to and from the FortiGate management IP
addresses. They also include connections to the GUI and FortiGuard queries.
Question 22Skipped
Which three CLI commands can you use to troubleshoot Layer 3 issues if the issue is in neither the
physical layer nor the link layer? (Choose three.)
Correct selection
B. execute ping
Correct selection
C. execute traceroute
Correct selection
Overall explanation
”dia sys top” is not for troubleshooting layer 3 issues rather for troubleshooting CPU and Memory issues
"If you suspect that there is an IP address conflict.....you may need to look at the ARP table" - get system
arp (ans. E), and two other answers, B and C - execute ping, execute traceroute.
B. execute ping: The ping command is a fundamental tool for checking the connectivity between two
devices. It sends ICMP Echo Request packets to the destination and waits for ICMP Echo Reply packets.
This can help you verify if there is connectivity at the IP layer.
C. execute traceroute: The traceroute command allows you to trace the route that packets take from the
source to the destination. It shows the IP addresses of routers in the path and can help identify where a
packet might be dropping or encountering issues.
D. diagnose sniffer packet any: The diagnose sniffer packet any command is used to capture and
analyze packets on the FortiGate device. This can be helpful in inspecting the actual packets flowing
through the device, allowing you to identify any anomalies or potential issues at the packet level.
These commands are valuable for troubleshooting Layer 3 issues and gaining insights into the network
behavior at the IP layer.
Question 23Skipped
An administrator has a requirement to keep an application session from timing out on port 80. What
two changes can the administrator make to resolve the issue without affecting any existing services
running through FortiGate? (Choose two.)
Correct selection
A. Create a new firewall policy with the new HTTP service and place it above the existing HTTP policy.
Correct selection
B. Create a new service object for HTTP service and set the session TTL to never
Overall explanation
A. Create a new firewall policy with the new HTTP service and place it above the existing HTTP policy.
B. Create a new service object for HTTP service and set the session TTL to never.
Explanation:
A. By creating a new firewall policy with the new HTTP service and placing it above the existing HTTP
policy, the administrator can ensure that this policy takes precedence and keeps the application session
from timing out on port 80.
B. Creating a new service object for HTTP service and setting the session TTL to never ensures that the
application session on port 80 does not time out.
So, define new service on TCP80 with no session-ttl expire. Make new FW policy and place above other
HTTP policy.
Reference:
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Session-timeout-settings/ta-p/191228
Question 24Skipped
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
Correct selection
A. It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.
Correct selection
D. Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2
proposals are defined in advance.
Overall explanation
Correct answer: AC
A. "It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes."
       This statement is accurate. Auto Discovery VPN (ADVPN) often works in conjunction with
        dynamic routing protocols to allow spokes to dynamically learn routes to other spokes. This
        dynamic routing capability enhances the scalability and flexibility of the VPN.
       This statement is also accurate. In ADVPN, the tunnels between spokes are negotiated
        dynamically, meaning the VPN connections are established on-demand without requiring
        manual configuration for each potential spoke.
Therefore, both statements A and C are correct, and they provide a comprehensive view of Auto
Discovery VPN (ADVPN) functionalities.
Question 25Skipped
Which security fabric feature causes an event trigger to monitor the network when a threat is
detected?
A. Security rating
B. Optimization
Correct answer
C. Automation stiches
D. Fabric connectors
Overall explanation
In the context of the Fortinet Security Fabric, automation stitches are responsible for orchestrating
responses to security events. When a threat is detected, automation stitches can trigger events to
monitor the network, coordinate responses, and ensure a synchronized defense across the entire
security fabric. Therefore, option C is the correct answer.
Each automation stitch pairs an event trigger and one or more actions, it allows you to monitor your
network and take appropiate action when SecFabric detects a threat.
Question 26Skipped
Based on the ZTNA tag, the security posture of the remote endpoint has changed.
What will happen to endpoint active ZTNA sessions?
Correct answer
Overall explanation
Question 27Skipped
Correct answer
Overall explanation
These devices form the core of the Fortinet Security Fabric, providing firewall functionality, centralized
management, logging, and reporting capabilities.
In certain scenarios, especially when emphasizing visibility and analysis, having multiple FortiGate
devices and a FortiAnalyzer device can indeed form a core configuration within the Fortinet Security
Fabric. FortiAnalyzer is used for centralized logging, reporting, and analysis of data from multiple
FortiGate devices, enhancing the overall security posture.
Question 28Skipped
Which of the following methods can be used to configure FortiGate to perform source NAT (SNAT) for
outgoing traffic?
Correct answer
Overall explanation
Explanation:
Source NAT (SNAT) is typically used to translate the private IP addresses of outgoing traffic to a public IP
address. One common method to perform SNAT in FortiGate is by enabling the "Use Outgoing Interface
Address" option in the firewall policy. This setting automatically translates the source IP of outgoing
packets to the IP address of the interface from which the traffic is leaving the FortiGate.
Options A, C, and D are related to routing and other forms of NAT but do not directly configure source
NAT in the firewall policy context.
Question 29Skipped
Given the routing database shown in the exhibit, which two statements are correct? (Choose two.)
Correct selection
Correct selection
D. The port1 and port2 default routes are active in the routing table.
Overall explanation
Correct answer: BD
Question 30Skipped
Refer to the web filter raw logs.
Based on the raw logs shown in the exhibit, which statement is correct?
A. Access to the social networking web filter category was explicitly blocked to all users.
Correct answer
C. Social networking web filter category is configured with the action set to authenticate.
Overall explanation
C is correct. We have two logs, first with action deny and second with passthrough.
Question 31Skipped
The global settings on a FortiGate device must be changed to align with company security policies.
What does the Administrator account need to access the FortiGate global settings?
B. Change password
Correct answer
Overall explanation
Question 32Skipped
When configuring a firewall virtual wire pair policy, which following statement is true?
A. Any number of virtual wire pairs can be included, as long as the policy traffic direction is the same.
Correct answer
C. Any number of virtual wire pairs can be included in each policy, regardless of the policy traffic
direction settings.
Overall explanation
Correct answer: C. Any number of virtual wire pairs can be included in each policy, regardless of the
policy traffic direction settings.
We tested to create a policy. We can use any number of virtual wire pairs. We can select 3 options in
traffic direction: in/out/both.
Firewall virtual wire pair policies can include more than a single virtual wire pair. This capability can
streamline the policy management process by eliminating the need to create multiple, similar policies for
each virtual wire pair. When creating or modifying a policy, you can select the traffic direction for each
VWP included in the policy.
Question 33Skipped
Correct answer
Overall explanation
In the one-to-one pool type, an internal IP address is mapped with an external address on a first-come,
first-served basis.
There is a single mapping of an internal address to an external address. Mappings are not fixed and, if
there are no more addresses available, a connection will be refused.
Also, in one-to-one, PAT is not required. In the example on this slide, you can see the same source port is
shown for both the ingress and egress address.
Question 34Skipped
Which two statements are true about the FGCP protocol? (Choose two.)
Correct selection
Correct selection
Overall explanation
Correct answer: CD
C. Runs only over the heartbeat links: FGCP utilizes heartbeat links for exchanging heartbeat packets to
monitor the health of the cluster. While heartbeat links play a crucial role, other interfaces can also be
used for synchronization and communication within the cluster.
D. Elects the primary FortiGate device: FGCP is responsible for the election of the primary FortiGate
device in a high availability (HA) cluster. The primary FortiGate manages the traffic while the secondary
FortiGate stays in standby mode.
Question 35Skipped
Correct answer
Overall explanation
A is wrong
Question 36Skipped
Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)
Correct selection
A. SSH
Correct selection
B. HTTPS
C. FTM
D. FortiTelemetry
Overall explanation
Correct answer: AB
The two protocols used to enable administrator access to a FortiGate device are:
SSH is a secure protocol used for accessing the command-line interface (CLI) of FortiGate devices.
HTTPS is a secure protocol used for accessing the web-based graphical user interface (GUI) of FortiGate
devices.
Question 37Skipped
Correct selection
Correct selection
Overall explanation
Correct answer: CD
This option is in the CLI, and is called ses-denied-traffic. You can also set the duration for block sessions.
This determines how long a session will be kept in the session table by setting block-sessiontimer in the
CLI. By default, it is set to 30 seconds.
Question 38Skipped
Which contains a network diagram and routing table output. The Student is unable to access
Webserver.
What is the cause of the problem and what is the solution for the problem?
A. The first packet sent from Student failed the RPF check. This issue can be resolved by adding a static
route to 10.0.4.0/24 through wan1.
B. The first reply packet for Student failed the RPF check. This issue can be resolved by adding a static
route to 10.0.4.0/24 through wan1.
Correct answer
C. The first reply packet for Student failed the RPF check. This issue can be resolved by adding a static
route to 203.0.114.24/32 through port3.
D. The first packet sent from Student failed the RPF check. This issue can be resolved by adding a static
route to 203.0.114.24/32 through port3.
Overall explanation
Correct answer: C. The first reply packet for Student failed the RPF check. This issue can be resolved by
adding a static route to 203.0.114.24/32 through port3.
Option C is the correct answer based on the provided information, let's analyze it:
Option C states: "The first reply packet for Student failed the RPF check. This issue can be resolved by
adding a static route to 203.0.114.24/32 through port3."
The issue is related to the first reply packet from the Student failing the Reverse Path Forwarding (RPF)
check and that adding a static route to 203.0.114.24/32 through "port3" will resolve the problem, then
you can go ahead with this solution.
In a typical RPF check scenario, it ensures that the incoming packet is arriving on the expected interface
based on the routing table. Adding a static route to 203.0.114.24/32 through "port3" may indeed resolve
the RPF issue if the routing is misconfigured.
Option C is the correct solution based on your network setup and further analysis, you can proceed with
implementing that static route to see if it resolves the issue. Additionally, it's a good practice to monitor
the network to ensure that the problem is indeed resolved after making the change.
Question 39Skipped
Based on the output shown in the exhibit, which two statements are correct? (Choose two.)
Correct selection
B. One server was contacted to retrieve the contract information.
Correct selection
Overall explanation
Correct answer: BD
B is correct, one server has the flag DI which means it was contacted to retrieve contract information.
D: .... Anycast is enabled by default(as it says on the study guide) so its not using default settings. still, it
uses HTTPS(TCP) and port 443 under tcp so we can consider this a default setting.
"by default, FortiGate is configured to enforce the use of HTTPS port 443 to perform live filtering with
FortiGuard or FortiManager"
Question 40Skipped
B. Addicting.Games will be allowed only if the Filter Overrides action is set to Learn.
Correct answer
D. Addicting.Games will be allowed, based on the Application Overrides configuration.
Overall explanation
Correct answer: D. Addicting.Games will be allowed, based on the Application Overrides configuration.
Application and Filter overrides follows the same rules as firewall policy. Application override will be
considered first.
Question 41Skipped
Which two statements are true about the RPF check? (Choose two.)
Correct selection
A. The RPF check is run on the first sent packet of any new session.
B. The RPF check is run on the first reply packet of any new session.
C. The RPF check is run on the first sent and reply packet of any new session.
Correct selection
D. RPF is a mechanism that protects FortiGuard and your network from IP spoofing attacks.
Overall explanation
Correct answer: AD
RPF protect against IP spoofin attacks. The source IP address is checked against the routing table for a
return path. RPF is only carried out on: The first packet in the session, not on reply.
Question 42Skipped
Correct selection
Correct selection
Overall explanation
Correct answer: CD
By default does not match vip in deny policy for destination all. So 2 options we have:
Reference:
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Firewall-does-not-block-incoming-WAN-to-
LAN/ta-p/189641
Question 43Skipped
Which two statements are correct about a software switch on FortiGate? (Choose two.)
Correct selection
Correct selection
Overall explanation
Correct answer: AC
C is correct: "The interfaces share the same IP address and belong to the same broadcast domain.
Incorrect options:
D is incorrect: "Can group multiple physical and wireless interfaces into a single virtual switch Interface"
Question 44Skipped
Correct answer
Overall explanation
SSL VPN web mode typically supports a limited number of protocols compared to the full SSL VPN tunnel
mode. This limitation is due to the nature of web-based applications and the restrictions of running
within a web browser.
Web mode requires only a web browser, but supports a limited number of protocols.
A is incorrect - External network applications running on the user’s PC cannot send data across the VPN.
C is correct - Web mode requires only a web browser, but supports a limited number of protocols.
Question 45Skipped
Which two statements about IPsec authentication on FortiGate are correct? (Choose two.)
Correct selection
A. For a stronger authentication, you can also enable extended authentication (XAuth) to request the
remote peer to provide a username and password.
Correct selection
C. Enabling XAuth results in a faster authentication because fewer packets are exchanged.
D. A certificate is not required on the remote peer when you set the signature as the authentication
method.
Overall explanation
Correct answer: AB
A. For a stronger authentication, you can also enable extended authentication (XAuth) to request the
remote peer to provide a username and password.
Explanation: A. XAuth provides an additional layer of authentication by requiring the remote peer to
provide a username and password in addition to the pre-shared key or certificate. This enhances
security. B. FortiGate supports both pre-shared key and signature (using certificates) as authentication
methods for IPsec VPN connections, offering flexibility based on security requirements.
C. Enabling XAuth does not necessarily result in faster authentication because additional packets are
exchanged to complete the XAuth process. D. When using the signature as the authentication method, a
certificate is required on the remote peer for authentication, ensuring secure communication.
To authenticate each other, the peers use two methods: pre-shared key or digital signature. You can also
enable an additional authentication method, XAuth, to enhance authentication.
Question 46Skipped
Which CLI command will display sessions both from client to the proxy and from the proxy to the
servers?
Correct answer
Overall explanation
Running the diagnose wad session list command will indeed display the sessions managed by the Web
Application Firewall (WAF) module, and you can review the information in the output to analyze traffic
from the client to the proxy and from the proxy to the servers.
Question 47Skipped
By default, FortiGate is configured to use HTTPS when performing live web filtering with FortiGuard
servers.
Which CLI command causes FortiGate to use an unreliable protocol to communicate with FortiGuard
servers for live web filtering?
Correct answer
Overall explanation
The CLI command that causes FortiGate to use an unreliable protocol to communicate with FortiGuard
servers for live web filtering is: D. set fortiguard-anycast disable
Disabling FortiGuard Anycast will cause FortiGate to use a direct connection (unreliable protocol) instead
of the anycast-based connection for communication with FortiGuard servers. This may be necessary in
certain scenarios where anycast is causing issues, and a direct connection is preferred.
By default, FortiGate is configured to enforce the use of HTTPS port 443 to perform live filtering with
FortiGuard or FortiManager. Other ports and protocols are available by disabling the FortiGuard anycast
setting on the CLI.
Question 48Skipped
Which two configuration settings are synchronized when FortiGate devices are in an active-active HA
cluster? (Choose two.)
B. FortiGate hostname
Correct selection
C. NTP
Correct selection
D. DNS
Overall explanation
Correct answer: CD
C. NTP
D. DNS
Not all the configuration settings are synchronized. There are a few that are not, such as:
• System interface settings of the HA reserved management interface and the HA default route for the
reserved management interface
• HA override
• HA device priority
• FortiGate hostname
• HA priority setting for a ping server (or dead gateway detection) configuration
• Cache
Question 49Skipped
An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security
fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).
What must the administrator do to synchronize the address object?
Correct answer
Overall explanation
Correct answer: C. Change the csf setting on Local-FortiGate (root) to set fabric-object-unification
default.
The CLI command set fabric-object-unification is only available on the root FortiGate. When set to local,
global objects will not be synchronized to downstream devices in the Security Fabric. The default value is
default.
When both devices are configured with set downstream-access-disable (answer in C) then the newly
created address objects are still replicated. However, when I configure the root with set fabric-object-
unification local the address object is no longer replicated to the downstream FortiGates.
Question 50Skipped
Which two statements are correct about NGFW Policy-based mode? (Choose two.)
A. NGFW policy-based mode does not require the use of central source NAT policy
B. NGFW policy-based mode can only be applied globally and not on individual VDOMs
Correct selection
C. NGFW policy-based mode supports creating applications and web filtering categories directly in a
firewall policy
Correct selection
Overall explanation
Correct answer: CD
C. NGFW policy-based mode supports creating applications and web filtering categories directly in a
firewall policy.
In NGFW policy-based mode, you can define applications and web filtering categories directly within the
firewall policy. This allows you to apply specific controls and restrictions based on the types of
applications and content, offering a more granular approach to managing network traffic.
Continue
Retake test