لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
- (Exam Topic 2) Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)
A. The subject field in the server certificate
B. The serial number in the server certificate
C. The server name indication (SNI) extension in the client hello message
D. The subject alternative name (SAN) field in the server certificate
E. The host field in the HTTP header
عرض الإجابة
اجابة صحيحة: A
السؤال #2
- (Exam Topic 2) Consider the topology: Application on a Windows machine <--{SSL VPN} -->FGT--> Telnet to Linux server. An administrator is investigating a problem where an application establishes a Telnet session to a Linux server over the SSL VPN through FortiGate and the idle session times out after about 90 minutes. The administrator would like to increase or disable this timeout. The administrator has already verified that the issue is not caused by the application or Linux server. This issue does not
A. Set the maximum session TTL value for the TELNET service object
B. Set the session TTL on the SSLVPN policy to maximum, so the idle session timeout will not happen after 90 minutes
C. Create a new service object for TELNET and set the maximum session TTL
D. Create a new firewall policy and place it above the existing SSLVPN policy for the SSL VPN traffic, and set the new TELNET service object in the policy
عرض الإجابة
اجابة صحيحة: B
السؤال #3
- (Exam Topic 2) What inspection mode does FortiGate use if it is configured as a policy-based next-generation firewall (NGFW)?
A. Full Content inspection
B. Proxy-based inspection
C. Certificate inspection
D. Flow-based inspection
عرض الإجابة
اجابة صحيحة: C
السؤال #4
- (Exam Topic 2) Which two statements are correct regarding FortiGate FSSO agentless polling mode? (Choose two.)
A. FortiGate points the collector agent to use a remote LDAP server
B. FortiGate uses the AD server as the collector agent
C. FortiGate uses the SMB protocol to read the event viewer logs from the DCs
D. FortiGate queries AD by using the LDAP to retrieve user group information
عرض الإجابة
اجابة صحيحة: D
السؤال #5
- (Exam Topic 1) Which two statements about SSL VPN between two FortiGate devices are true? (Choose two.)
A. The client FortiGate requires a client certificate signed by the CA on the server FortiGate
B. The client FortiGate requires a manually added route to remote subnets
C. The client FortiGate uses the SSL VPN tunnel interface type to connect SSL VPN
D. Server FortiGate requires a CA certificate to verify the client FortiGate certificate
عرض الإجابة
اجابة صحيحة: AD
السؤال #6
- (Exam Topic 2) Which two VDOMs are the default VDOMs created when FortiGate is set up in split VDOM mode? (Choose two.)
A. FG-traffic
B. Mgmt
C. FG-Mgmt
D. Root
عرض الإجابة
اجابة صحيحة: ACD
السؤال #7
- (Exam Topic 2) NGFW mode allows policy-based configuration for most inspection rules. Which security profile’s configuration does not change when you enable policy-based inspection?
A. Web filtering
B. Antivirus
C. Web proxy
D. Application control
عرض الإجابة
اجابة صحيحة: CD
السؤال #8
- (Exam Topic 2) Refer to the exhibit to view the application control profile. Based on the configuration, what will happen to Apple FaceTime?
A. Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration
B. Apple FaceTime will be allowed, based on the Apple filter configuration
C. Apple FaceTime will be allowed only if the filter in Application and Filter Overrides is set to Learn
D. Apple FaceTime will be allowed, based on the Categories configuration
عرض الإجابة
اجابة صحيحة: B
السؤال #9
- (Exam Topic 1) The global settings on a FortiGate device must be changed to align with company security policies. What does the Administrator account need to access the FortiGate global settings?
A. Change password
B. Enable restrict access to trusted hosts
C. Change Administrator profile
D. Enable two-factor authentication
عرض الإجابة
اجابة صحيحة: C
السؤال #10
- (Exam Topic 1) Which statement is correct regarding the inspection of some of the services available by web applications embedded in third-party websites?
A. The security actions applied on the web applications will also be explicitly applied on the third-party websites
B. The application signature database inspects traffic only from the original web application server
C. FortiGuard maintains only one signature of each web application that is unique
D. FortiGate can inspect sub-application traffic regardless where it was originated
عرض الإجابة
اجابة صحيحة: A
السؤال #11
- (Exam Topic 1) Refer to the exhibits. Exhibit A shows system performance output. Exhibit B shows a FortiGate configured with the default configuration of high memory usage thresholds. Based on the system performance output, which two statements are correct? (Choose two.)
A. Administrators can access FortiGate only through the console port
B. FortiGate has entered conserve mode
C. FortiGate will start sending all files to FortiSandbox for inspection
D. Administrators cannot change the configuration
عرض الإجابة
اجابة صحيحة: BD
السؤال #12
- (Exam Topic 2) In consolidated firewall policies, IPv4 and IPv6 policies are combined in a single consolidated policy. Instead of separate policies. Which three statements are true about consolidated IPv4 and IPv6 policy configuration? (Choose three.)
A. The IP version of the sources and destinations in a firewall policy must be different
B. The Incoming Interfac
C. Outgoing Interfac
D. Schedule, and Service fields can be shared with both IPv4 and IPv6
E. The policy table in the GUI can be filtered to display policies with IPv4, IPv6 or IPv4 and IPv6 sources and destinations
F. The IP version of the sources and destinations in a policy must match
عرض الإجابة
اجابة صحيحة: CD
السؤال #13
- (Exam Topic 1) Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)
A. SSH
B. HTTPS
C. FTM
D. FortiTelemetry
عرض الإجابة
اجابة صحيحة: C
السؤال #14
- (Exam Topic 1) Which two attributes are required on a certificate so it can be used as a CA certificate on SSL Inspection? (Choose two.)
A. The keyUsage extension must be set to keyCertSign
B. The common name on the subject field must use a wildcard name
C. The issuer must be a public CA
D. The CA extension must be set to TRUE
عرض الإجابة
اجابة صحيحة: A
السؤال #15
- (Exam Topic 1) Which two statements are correct about NGFW Policy-based mode? (Choose two.)
A. NGFW policy-based mode does not require the use of central source NAT policy
B. NGFW policy-based mode can only be applied globally and not on individual VDOMs
C. NGFW policy-based mode supports creating applications and web filtering categories directly in a firewall policy
D. NGFW policy-based mode policies support only flow inspection
عرض الإجابة
اجابة صحيحة: B
السؤال #16
- (Exam Topic 2) You have enabled logging on your FortiGate device for Event logs and all Security logs, and you have set up logging to use the FortiGate local disk. What is the default behavior when the local disk is full?
A. Logs are overwritten and the only warning is issued when log disk usage reaches the threshold of 95%
B. No new log is recorded until you manually clear logs from the local disk
C. Logs are overwritten and the first warning is issued when log disk usage reaches the threshold of 75%
D. No new log is recorded after the warning is issued when log disk usage reaches the threshold of 95%
عرض الإجابة
اجابة صحيحة: B
السؤال #17
- (Exam Topic 1) When configuring a firewall virtual wire pair policy, which following statement is true?
A. Any number of virtual wire pairs can be included, as long as the policy traffic direction is the same
B. Only a single virtual wire pair can be included in each policy
C. Any number of virtual wire pairs can be included in each policy, regardless of the policy traffic direction settings
D. Exactly two virtual wire pairs need to be included in each policy
عرض الإجابة
اجابة صحيحة: AD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: