لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the route-tag setting in an SD-WAN rule used for?
A. To indicate the routes for health check probes
B. To indicate the destination of a rule based on learned BGP prefixes
C. To indicate the routes that can be used for routing SD-WAN traffic
D. To indicate the members that can be used to route SD-WAN traffic
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which two statements about SLA targets and SD-WAN rules are true? (Choose two.)
A. When configuring an SD-WAN rule, you can select multiple SLA targets of the same performance SLA
B. SD-WAN rules use SLA targets to check if the preferred members meet the SLA requirements
C. SLA targets are used only by SD-WAN rules that are configured with Lowest Cost (SLA) or Maximize Bandwidth (SLA) as strategy
D. Member metrics are measured only if an SLA target is configured
عرض الإجابة
اجابة صحيحة: BC
السؤال #3
Which conclusion about the packet debug flow output is correct?
A. The original traffic exceeded the maximum packets per second of the outgoing interface, and the packet was dropped
B. The reply traffic exceeded the maximum bandwidth configured in the traffic shaper, and the packet was dropped
C. The original traffic exceeded the maximum bandwidth of the outgoing interface, and the packet was dropped
D. The original traffic exceeded the maximum bandwidth configured in the traffic shaper, and the packet was dropped
عرض الإجابة
اجابة صحيحة: BC
السؤال #4
Which two performance SLA protocols enable you to verify that the server response contains a specific value? (Choose two.)
A. http
B. icmp
C. twamp
D. dns
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which CLI command do you use to perform real-time troubleshooting for ADVPN negotiation?
A. get router info routing-table all
B. diagnose debug application ike
C. diagnose vpn tunnel list
D. get ipsec tunnel list
عرض الإجابة
اجابة صحيحة: AD
السؤال #6
Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)
A. Encapsulating Security Payload (ESP)
B. Secure Shell (SSH)
C. Internet Key Exchange (IKE)
D. Security Association (SA)
عرض الإجابة
اجابة صحيحة: AE
السؤال #7
Which two conclusions for traffic that matches the traffic shaper are true? (Choose two.)
A. The traffic shaper drops packets if the bandwidth is less than 2500 KBps
B. The measured bandwidth is less than 100 KBps
C. The traffic shaper drops packets if the bandwidth exceeds 6250 KBps
D. The traffic shaper limits the bandwidth of each source IP to a maximum of 6250 KBps
عرض الإجابة
اجابة صحيحة: A
السؤال #8
What does enabling the exchange-interface-ip setting enable FortiGate devices to exchange?
A. The gateway address of their IPsec interfaces
B. The tunnel ID of their IPsec interfaces
C. The IP address of their IPsec interfaces
D. The name of their IPsec interfaces
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which statement about the role of the ADVPN device in handling traffic is true?
A. This is a spoke that has received a query from a remote hub and has forwarded the response to its hub
B. Two hubs, 10
C. This is a hub that has received a query from a spoke and has forwarded it to another spoke
D. Two spokes, 192
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Which two statements about the SD-WAN zone configuration are true? (Choose two.)
A. The service-sla-tie-break setting enables you to configure preferred member selection based on the best route to the destination
B. You can delete the default zones
C. The default zones are virtual-wan-link and SASE
D. An SD-WAN member can belong to two or more zones
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Exhibit A – Exhibit B – Exhibit A shows the system interface with the static routes and exhibit B shows the firewall policies on the managed FortiGate. Based on the FortiGate configuration shown in the exhibits, what issue might you encounter when creating an SD-WAN zone for port1 and port2?
A. port1 is assigned a manual IP address
B. port1 is referenced in a firewall policy
C. port2 is referenced in a static route
D. port1 and port2 are not administratively down
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: