FCP - FortiGate 7.4 Administrator Questions and Answers
Refer to the exhibit showing a debug flow output.
What two conclusions can you make from the debug flow output? (Choose two.)
Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.)
An administrator has configured a strict RPF check on FortiGate.
How does strict RPF check work?
Which three statements explain a flow-based antivirus profile? (Choose three.)
Refer to the exhibit.
FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt.
What is the most likely reason for this situation?
Which inspection mode does FortiGate use for application profiles if it is configured as a profile-based next-generation firewall (NGFW)?
Refer to the exhibit which contains a RADIUS server configuration.
An administrator added a configuration for a new RADIUS server. While configuring, the administrator selected the Include in every user group option.
What is the impact of using the Include in every user group option in a RADIUS configuration?
Refer to the exhibits, which show the firewall policy and the security profile for Facebook.
Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other types of posts.
Which part of the configuration must you change to resolve the issue?
Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)
Which two statements are true about the FGCP protocol? (Choose two.)
Which statement about the deployment of the Security Fabric in a multi-VDOM environment is true?
Refer to the exhibit.
Review the intrusion prevention system (IPS) profile signature settings shown in the exhibit.
What do you conclude when adding the FTP.Login.Failed signature to the IPS sensor profile?
What are two features of collector agent advanced mode? (Choose two.)
Refer to the exhibit.
Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?
Refer to the exhibits.
The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details.
Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?
Refer to the exhibit.
Which two statements are true about the routing entries in this database table? (Choose two.)
Refer to the exhibit, which shows the IPS sensor configuration.
If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)
Refer to the exhibit.
Examine the intrusion prevention system (IPS) diagnostic command shown in the exhibit.
If option 5 is used with the IPS diagnostic command and the outcome is a decrease in the CPU usage, what is the correct conclusion?
What are three key routing principles in SD-WAN? (Choose three.)
Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.)
A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.
Which IPsec Wizard template must the administrator apply?
Which two statements are true regarding FortiGate HA configuration synchronization? (Choose two.)
Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.
Based on the exhibit, which statement is true?
Which three statements about SD-WAN zones are true? (Choose three.)
Which three methods are used by the collector agent for AD polling? (Choose three.)