لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Refer to exhibit. An administrator configured the web filtering profile shown in the exhibit to block access to all social networking sites except Twitter. However, when users try to access twitter.com, they are redirected to a FortiGuard web filtering block page. Based on the exhibit, which configuration change can the administrator make to allow Twitter while blocking all other social networking sites?
A. On the Static URL Filter configuration set Type to Simple
B. On the FortiGuard Category Based Filter configuration set Action to Warning for Social Networking
C. On the Static URL Filter configuration set Action to Monitor
D. On the Static URL Filter configuration set Action to Exempt
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Refer to the exhibits, which show a diagram of a FortiGate device connected to the network. VIP object configuration, and the firewall policy configuration. The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IP address 10.0.1.254/24. If the host 10.200.3.1 sends a TCP SYN packet on port 8080 to 10.200.1.10, what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?
A. 10
B. 10
C. 10
D. 10
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)
A. The issuer must be a public CA
B. The CA extension must be set to TRUE
C. The Authority Key Identifier must be of type SSL
D. The keyUsage extension must be set to
عرض الإجابة
اجابة صحيحة: BC
السؤال #4
Refer to the exhibit showing a debug flow output. What two conclusions can you make from the debug flow output? (Choose two.)
A. The debug flow is for ICMP traffic
B. The default route is required to receive a reply
C. A new traffic session was created
D. A firewall policy allowed the connection
عرض الإجابة
اجابة صحيحة: AC
السؤال #5
What is the common feature shared between IPv4 and SD-WAN ECMP algorithms?
A. Both can be enabled at the same time
B. Both support volume algorithms
C. Both control ECMP algorithms
D. Both use the same physical interface load balancing settings
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)
A. Remote Access
B. Site to Site
C. Dial up User
D. iHub-and-Spoke
عرض الإجابة
اجابة صحيحة: BCD
السؤال #7
A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes. All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover. Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)
A. Enable Dead Peer Detection
B. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels
C. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel
D. Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
Refer to the exhibit showing a debug flow output. What two conclusions can you make from the debug flow output? (Choose two.)
A. The debug flow is for ICMP traffic
B. A firewall policy allowed the connection
C. A new traffic session was created
D. The default route is required to receive a reply
عرض الإجابة
اجابة صحيحة: AC
السؤال #9
Refer to the exhibit. Which algorithm does SD - WAN use to distribute traffic that does not match any of the SD - WAN rules?
A. All traffic from a source IP to a destination IP is sent to the same interface
B. Traffic is sent to the link with the lowest latency
C. Traffic is distributed based on the number of sessions through each interface
D. All traffic from a source IP is sent to the same interface
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which method allows management access to the FortiGate CLI without network connectivity?
A. CLI console widget
B. Serial console
C. Telnet console
D. SSH console
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Refer to the exhibits. The exhibits contain a network diagram, and virtual IP, IP pool, and firewall policies configuration information. The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IP address 10.0.1.254/24. The first firewall policy has NAT enabled using IP pool. The second firewall policy is configured with a VIP as the destination address. Which IP address will be used to source NAT (SNAT) the internet traffic coming from a workstation with the IP address
A. 10
B. 10
C. 10
D. 10
عرض الإجابة
اجابة صحيحة: D
السؤال #12
An administrator has configured the following settings: config system settings set ses-denied-traffic enable end config system global set block-session-timer 30 end What are the two results of this configuration? (Choose two.)
A. Device detection on all interfaces is enforced for 30 seconds
B. Denied users are blocked for 30 seconds
C. The number of logs generated by denied traffic is reduced
D. A session for denied traffic is created
عرض الإجابة
اجابة صحيحة: ACD
السؤال #13
Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)
A. The host field in the HTTP header
B. The server name indication (SNI) extension in the client hello message
C. The subject alternative name (SAN) field in the server certificate
D. The subject field in the server certificate
E. The serial number in the server certificate
عرض الإجابة
اجابة صحيحة: BCD
السؤال #14
Refer to the exhibits. The exhibits show the firewall policies and the objects used in the firewall policies. The administrator is using the Policy Lookup feature and has entered the search criteria shown in the exhibit. Which policy will be highlighted, based on the input criteria?
A. Policy with ID 4
B. Policy with ID 5
C. Policies with ID 2 and 3
D. Policy with ID 1
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which timeout setting can be responsible for deleting SSL VPN associated sessions?
A. SSL VPN idle-timeoutcorrect
B. SSL VPN http-request-body-timeout
C. SSL VPN login-timeout
D. SSL VPN dtls-hello-timeout
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.)
A. The client FortiGate requires a manually added route to remote subnets
B. The client FortiGate requires a client certificate signed by the CA on the server FortiGate
C. The server FortiGate requires a CA certificate to verify the client FortiGate certificate
D. The client FortiGate requires the SSL VPN tunnel interface type to connect SSL VPcorrect
عرض الإجابة
اجابة صحيحة: ACD

View The Updated Fortinet Exam Questions

SPOTO Provides 100% Real Fortinet Exam Questions for You to Pass Your Fortinet Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: