لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Examine the exhibit, which contains a virtual IP and firewall policy configuration. The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port2) interface has the IP address 10.0.1.254/24. The first firewall policy has NAT enabled on the outgoing interface address. The second firewall policy is configured with a VIP as the destination address. Which IP address will be used to source NAT the Internet traffic coming from a workstation with the IP address 10.0.1.10/24?
A. 10
B. Any available IP address in the WAN (port1) subnet 10
C. 10
D. 10
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Examine the FortiGate configuration: What will happen to unauthenticated users when an active authentication policy is followed by a fall through policy without authentication?
A. The user must log in again to authenticate
B. The user will be denied access to resources without authentication
C. The user will not be prompted for authentication
D. User authentication happens at an interface level
عرض الإجابة
اجابة صحيحة: A
السؤال #3
An administrator has configured the following settings: What does the configuration do? (Choose two.)
A. Reduces the amount of logs generated by denied traffic
B. Enforces device detection on all interfaces for 30 minutes
C. Blocks denied users for 30 minutes
D. Creates a session for traffic being denied
عرض الإجابة
اجابة صحيحة: CD
السؤال #4
Which of the following statements about the FSSO collector agent timers is true?
A. The workstation verify interval is used to periodically check of a workstation is still a domain member
B. The IP address change verify interval monitors the server IP address where the collector agent is installed, and the updates the collector agent configuration if it changes
C. The user group cache expiry is used to age out the monitored groups
D. The dead entry timeout interval is used to age out entries with an unverified status
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A team manager has decided that while some members of the team need access to particular website, the majority of the team does not. Which configuration option is the most effective option to support this request?
A. Implement a web filter category override for the specified website
B. Implement web filter authentication for the specified website
C. Implement web filter quotas for the specified website
D. Implement DNS filter for the specified website
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which of the following features is supported by web filter in flow-based inspection mode with NGFW mode set to profile-based?
A. FortiGuard Quotas
B. Static URL
C. Search engines
D. Rating option
عرض الإجابة
اجابة صحيحة: D
السؤال #7
How does FortiGate verify the login credentials of a remote LDAP user?
A. FortiGate regenerates the algorithm based on the login credentials and compares it to the algorithm stored on the LDAP server
B. FortiGate sends the user-entered credentials to the LDAP server for authentication
C. FortiGate queries the LDAP server for credentials
D. FortiGate queries its own database for credentials
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which of the following statements is true regarding SSL VPN settings for an SSL VPN portal?
A. By default, FortiGate uses WINS servers to resolve names
B. By default, the SSL VPN portal requires the installation of a client’s certificate
C. By default, split tunneling is enabled
D. By default, the admin GUI and SSL VPN portal use the same HTTPS port
عرض الإجابة
اجابة صحيحة: D
السؤال #9
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server?
A. srv_proxy
B. srv_tcp
C. wpad
D. proxy
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)
A. Log downloads from the GUI are limited to the current filter view
B. Log backups from the CLI cannot be restored to another FortiGate
C. Log backups from the CLI can be configured to upload to FTP as a scheduled time
D. Log downloads from the GUI are stored as LZ4 compressed files
عرض الإجابة
اجابة صحيحة: BC
السؤال #11
Examine the network diagram shown in the exhibit, and then answer the following question: A firewall administrator must configure equal cost multipath (ECMP) routing on FGT1 to ensure both port1 and port3 links are used at the same time for all traffic destined for 172.20.2.0/24. Which of the following static routes will satisfy this requirement on FGT1? (Choose two.)
A. 172
B. 172
C. 172
D. 172
عرض الإجابة
اجابة صحيحة: CD
السؤال #12
An administrator needs to create an SSL-VPN connection for accessing an internal server using the bookmark Port Forward. What step is required for this configuration?
A. Configure an SSL VPN realm for clients to use the port forward bookmark
B. Configure the client application to forward IP traffic through FortiClient
C. Configure the virtual IP address to be assigned t the SSL VPN users
D. Configure the client application to forward IP traffic to a Java applet proxy
عرض الإجابة
اجابة صحيحة: D
السؤال #13
An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.)
A. The interface has been configured for one-arm sniffer
B. The interface is a member of a virtual wire pair
C. The operation mode is transparent
D. The interface is a member of a zone
E. Captive portal is enabled in the interface
عرض الإجابة
اجابة صحيحة: ABC
السؤال #14
Examine the exhibit, which shows the output of a web filtering real time debug. Why is the site www.bing.com being blocked?
A. The web site www
B. The user has not authenticated with the FortiGate yet
C. The web server IP address 204
D. The rating for the web site www
عرض الإجابة
اجابة صحيحة: AB
السؤال #15
Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)
A. They can be configured in both NAT/Route and transparent operation modes
B. They support L2TP-over-IPsec
C. They require two firewall policies: one for each directions of traffic flow
D. They support GRE-over-IPsec
عرض الإجابة
اجابة صحيحة: AB
السؤال #16
Examine this FortiGate configuration: Examine the output of the following debug command: Based on the diagnostic outputs above, how is the FortiGate handling the traffic for new sessions that require inspection?
A. It is allowed, but with no inspection
B. It is allowed and inspected as long as the inspection is flow based
C. It is dropped
D. It is allowed and inspected, as long as the only inspection required is antivirus
عرض الإجابة
اجابة صحيحة: A
السؤال #17
HTTP Public Key Pinning (HPKP) can be an obstacle to implementing full SSL inspection. What solutions could resolve this problem? (Choose two.)
A. Enable Allow Invalid SSL Certificates for the relevant security profile
B. Change web browsers to one that does not support HPKP
C. Exempt those web sites that use HPKP from full SSL inspection
D. Install the CA certificate (that is required to verify the web server certificate) stores of users’ computers
عرض الإجابة
اجابة صحيحة: BC
السؤال #18
Examine the routing database shown in the exhibit, and then answer the following question: Which of the following statements are correct? (Choose two.)
A. The port3 default route has the highest distance
B. The port3 default route has the lowest metric
C. There will be eight routes active in the routing table
D. The port1 and port2 default routes are active in the routing table
عرض الإجابة
اجابة صحيحة: AD
السؤال #19
In an HA cluster operating in active-active mode, which path is taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?
A. Client > secondary FortiGate > primary FortiGate > web server
B. Client > primary FortiGate > secondary FortiGate > primary FortiGate > web server
C. Client > primary FortiGate > secondary FortiGate > web server
D. Client > secondary FortiGate > web server
عرض الإجابة
اجابة صحيحة: B
السؤال #20
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not. Which configuration option is the most effective way to support this request?
A. Implement web filter authentication for the specified website
B. Implement a web filter category override for the specified website
C. Implement DNS filter for the specified website
D. Implement web filter quotas for the specified website
عرض الإجابة
اجابة صحيحة: C
السؤال #21
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does FortiGate take?
A. It notifies the administrator by sending an email
B. It provides a DLP block replacement page with a link to download the file
C. It blocks all future traffic for that IP address for a configured interval
D. It archives the data for that IP address
عرض الإجابة
اجابة صحيحة: C
السؤال #22
Examine the exhibit, which shows the partial output of an IKE real-time debug. Which of the following statement about the output is true?
A. The VPN is configured to use pre-shared key authentication
B. Extended authentication (XAuth) was successful
C. Remote is the host name of the remote IPsec peer
D. Phase 1 went down
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Examine the exhibit, which contains a session diagnostic output. Which of the following statements about the session diagnostic output is true?
A. The session is in ESTABLISHED state
B. The session is in LISTEN state
C. The session is in TIME_WAIT state
D. The session is in CLOSE_WAIT state
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which statements are true regarding firewall policy NAT using the outgoing interface IP address with fixed port disabled? (Choose two.)
A. This is known as many-to-one NAT
B. Source IP is translated to the outgoing interface IP
C. Connections are tracked using source port and source MAC address
D. Port address translation is not used
عرض الإجابة
اجابة صحيحة: AB
السؤال #25
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
A. It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes
B. ADVPN is only supported with IKEv2
C. Tunnels are negotiated dynamically between spokes
D. Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2 proposals are defined in advance
عرض الإجابة
اجابة صحيحة: AC
السؤال #26
Which of the following statements are true when using WPAD with the DHCP discovery method? (Choose two.)
A. If the DHCP method fails, browsers will try the DNS method
B. The browser needs to be preconfigured with the DHCP server’s IP address
C. The browser sends a DHCPONFORM request to the DHCP server
D. The DHCP server provides the PAC file for download
عرض الإجابة
اجابة صحيحة: AC

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: