لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
- (Exam Topic 1) Which statement about the policy ID number of a firewall policy is true?
A. It is required to modify a firewall policy using the CLI
B. It represents the number of objects used in the firewall policy
C. It changes when firewall policies are reordered
D. It defines the order in which rules are processed
عرض الإجابة
اجابة صحيحة: BD
السؤال #2
- (Exam Topic 2) The exhibit shows a CLI output of firewall policies, proxy policies, and proxy addresses. How does FortiGate process the traffic sent to http://www.fortinet.com?
A. Traffic will be redirected to the transparent proxy and it will be allowed by proxy policy ID 3
B. Traffic will not be redirected to the transparent proxy and it will be allowed by firewall policy ID 1
C. Traffic will be redirected to the transparent proxy and It will be allowed by proxy policy ID 1
D. Traffic will be redirected to the transparent proxy and it will be denied by the proxy implicit deny policy
عرض الإجابة
اجابة صحيحة: C
السؤال #3
- (Exam Topic 2) Why does FortiGate keep TCP sessions in the session table for some seconds even after both sides (client and server) have terminated the session?
A. To remove the NAT operation
B. To generate logs
C. To finish any inspection operations
D. To allow for out-of-order packets that could arrive after the FIN/ACK packets
عرض الإجابة
اجابة صحيحة: C
السؤال #4
- (Exam Topic 1) Review the Intrusion Prevention System (IPS) profile signature settings. Which statement is correct in adding the FTP.Login.Failed signature to the IPS sensor profile?
A. The signature setting uses a custom rating threshold
B. The signature setting includes a group of other signatures
C. Traffic matching the signature will be allowed and logged
D. Traffic matching the signature will be silently dropped and logged
عرض الإجابة
اجابة صحيحة: D
السؤال #5
- (Exam Topic 2) Which contains a Performance SLA configuration. An administrator has configured a performance SLA on FortiGate. Which failed to generate any traffic. Why is FortiGate not generating any traffic for the performance SLA?
A. Participants configured are not SD-WAN members
B. There may not be a static route to route the performance SLA traffic
C. The Ping protocol is not supported for the public servers that are configured
D. You need to turn on the Enable probe packets switch
عرض الإجابة
اجابة صحيحة: A
السؤال #6
- (Exam Topic 1) A network administrator has enabled SSL certificate inspection and antivirus on FortiGate. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and the file can be downloaded. What is the reason for the failed virus detection by FortiGate?
A. Application control is not enabled
B. SSL/SSH Inspection profile is incorrect
C. Antivirus profile configuration is incorrect
D. Antivirus definitions are not up to date
عرض الإجابة
اجابة صحيحة: BC
السؤال #7
- (Exam Topic 2) Which Security rating scorecard helps identify configuration weakness and best practice violations in your network?
A. Fabric Coverage
B. Automated Response
C. Security Posture
D. Optimization
عرض الإجابة
اجابة صحيحة: ABD
السؤال #8
- (Exam Topic 2) Which of the following are valid actions for FortiGuard category based filter in a web filter profile ui proxy-based inspection mode? (Choose two.)
A. Warning
B. Exempt
C. Allow
D. Learn
عرض الإجابة
اجابة صحيحة: AD
السؤال #9
- (Exam Topic 2) A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors. What is the reason for the certificate warning errors?
A. The browser requires a software update
B. FortiGate does not support full SSL inspection when web filtering is enabled
C. The CA certificate set on the SSL/SSH inspection profile has not been imported into the browser
D. There are network connectivity issues
عرض الإجابة
اجابة صحيحة: B
السؤال #10
- (Exam Topic 2) What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
A. It limits the scanning of application traffic to the DNS protocol only
B. It limits the scanning of application traffic to use parent signatures only
C. It limits the scanning of application traffic to the browser-based technology category only
D. It limits the scanning of application traffic to the application category only
عرض الإجابة
اجابة صحيحة: D
السؤال #11
- (Exam Topic 1) How does FortiGate act when using SSL VPN in web mode?
A. FortiGate acts as an FDS server
B. FortiGate acts as an HTTP reverse proxy
C. FortiGate acts as DNS server
D. FortiGate acts as router
عرض الإجابة
اجابة صحيحة: AC
السؤال #12
- (Exam Topic 1) Which three options are the remote log storage options you can configure on FortiGate? (Choose three.)
A. FortiCache
B. FortiSIEM
C. FortiAnalyzer
D. FortiSandbox
E. FortiCloud
عرض الإجابة
اجابة صحيحة: BCE
السؤال #13
- (Exam Topic 1) The Root and To_Internet VDOMs are configured in NAT mode. The DMZ and Local VDOMs are configured in transparent mode. The Root VDOM is the management VDOM. The To_Internet VDOM allows LAN users to access the internet. The To_Internet VDOM is the only VDOM with internet access and is directly connected to ISP modem. With this configuration, which statement is true?
A. Inter-VDOM links are required to allow traffic between the Local and Root VDOMs
B. A static route is required on the To_Internet VDOM to allow LAN users to access the internet
C. Inter-VDOM links are required to allow traffic between the Local and DMZ VDOMs
D. Inter-VDOM links are not required between the Root and To_Internet VDOMs because the Root VDOM is used only as a management VDOM
عرض الإجابة
اجابة صحيحة: AB
السؤال #14
- (Exam Topic 2) FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy. Which two other security profiles can you apply to the security policy? (Choose two.)
A. Antivirus scanning
B. File filter
C. DNS filter
D. Intrusion prevention
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: