Halloween Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Fortinet NSE7_LED-7.0 Dumps

Fortinet NSE 7 - LAN Edge 7.0 Questions and Answers

Question 1

Which EAP method requires the use of a digital certificate on both the server end and the client end?

Options:

A.

EAP-TTLS

B.

PEAP

C.

EAP-GTC

D.

EAP-TLS

Question 2

Refer to the exhibit.

as

By default FortiOS creates the following DHCP server scope for the FortiLink interface as shown in the exhibit

What is the objective of the vci-string setting?

Options:

A.

To ignore DHCP requests coming from FortiSwitch and FortiExtender devices

B.

To reserve IP addresses for FortiSwitch and FortiExtender devices

C.

To restrict the IP address assignment to FortiSwitch and FortiExtender devices

D.

To restrict the IP address assignment to devices that have FortiSwitch or FortiExtender as their hostname

Question 3

Which two pieces of information can the diagnose test authserver ldap command provide? (Choose two.)

Options:

A.

It displays whether the admin bind user credentials are correct

B.

It displays whether the user credentials are correct

C.

It displays the LDAP codes returned by the LDAP server

D.

It displays the LDAP groups found for the user

Question 4

Which two statements about the MAC-based 802 1X security mode available on FortiSwitch are true? (Choose two.)

Options:

A.

FortiSwitch authenticates a single device and opens the port to other devices connected to the port

B.

FortiSwitch authenticates each device connected to the port

C.

It cannot be used in conjunction with MAC authentication bypass

D.

FortiSwitch can grant different access levels to each device connected to the port

Question 5

Refer to the exhibit

as

Examine the FortiGate RSSO configuration shown in the exhibit

FortiGate is configured to receive RADIUS accounting messages on port3 to authenticate RSSO users The users are located behind port3 and the internet link is connected to port1 FortiGate is processing incoming RADIUS accounting messages successfully and RSSO users are getting associated with the RSSO Group user group However all the users are able to access the internet, and the administrator wants to restrict internet access to RSSO users only

Which configuration change should the administrator make to fix the problem?

Options:

A.

Change the RADIUS Attribute Value selling to match the name of the RADIUS attribute containing the group membership information of the RSSO users

B.

Add RSSO Group to the firewall policy

C.

Enable Security Fabric Connection on port3

D.

Create a second firewall policy from port3 lo port1 and select the target destination subnets

Question 6

When you configure a FortiAP wireless interface for auto TX power control which statement describes how it configures its transmission power"?

Options:

A.

Every 30 seconds the AP will measure the signal strength of the AP using the client The AP will adjust its signal strength up or down until the AP signal is detected at -70 dBm

B.

Every 30 seconds FortiGate measures the signal strength of adjacent AP interfaces It will adjust its own AP power to match the adjacent AP signal strength

C.

Every 30 seconds FortiGate measures the signal strength of adjacent FortiAP interfaces It will adjust the adjacent AP power to be detectable at -70 dBm

D.

Every 30 seconds FortiGate measures the signal strength of the weakest associated client The AP will then configure its radio power to match the detected signal strength of the client

Question 7

Refer to the exhibit.

as

Examine the IPsec VPN phase 1 configuration shown in theexhibit

An administrator wants to use certificate-based authentication for an IPsec VPN user

Which three configuration changes must you make on FortiGate to perform certificate-based authentication for the IPsec VPN user? (Choose three)

Options:

A.

Create a PKI user for the IPsec VPN user, and then configure the IPsec VPN tunnel to accept the PKI user as peer

certificate

B.

In the Authentication section of the IPsec VPN tunnel in the Method drop-down list select Signature and then select the certificate that FortiGate will use for IPsec VPN

C.

In the IKE section of the IPsec VPN tunnel in the Mode field select Main (ID protection)

D.

Import the CA that signed the user certificate

E.

Enable XAUTH on the IPsec VPN tunnel

Question 8

Which FortiSwitch VLANs are automatically created on FortGate when the first FortiSwitch device is discovered1?

Options:

A.

default quarantine, rspan voice video onboarding and nac_segment

B.

access, quarantine, rspan. voice, video, and onboarding

C.

default quarantine rspan voice video and nac_segment

D.

fortilink. quarantine erspan voice video and onboarding

Question 9

Refer to the exhibit.

as

Examine the FortiSwitch security policy shown in the exhibit

If the security profile shown in the exhibit is assigned to all ports on a FortiSwitch device for 802 1X authentication which statement about the switch is correct?

Options:

A.

FortiSwitch cannot authenticate multiple devices connected to the same port

B.

FortiSwitch will try to authenticate non-802 1X devices using the device MAC address as the username and password

C.

FortiSwitch will assign non-802 1X devices to the onboarding VLAN

D.

All EAP messages will be terminated on FortiSwitch

Question 10

Refer to the exhibits

as

The exhibits show the wireless network (VAP) SSID profiles defined on FortiManager and an AP profile assigned to a group of APs that are supported by FortiGate

None of the APs are broadcasting the SSlDs defined by the AP profile

Which changes do you need to make to enable the SSIDs to broadcast?

Options:

A.

In the SSIDs section enable Tunnel

B.

Enable one channel in the Channels section

C.

Enable multiple channels in the Channels section and enable Radio Resource Provision

D.

In the SSIDs section enable Manual and assign the networks manually

Question 11

Which two statements about the guest portal on FortiAuthenticator are true? (Choose two.)

Options:

A.

Each remote user on FortiAuthenticator can sponsor up to 10 guest accounts

B.

Administrators must approve all guest accounts before they can be used

C.

The guest portal provides pre and post-log in services

D.

Administrators can use one or more incoming parameters to configure a mapping rule for the guest portal

Page: 1 / 4
Total 37 questions