لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following FortiGate configuration tasks will create a route in the policy route table? (Choose two.)
A. Static route created with a Named Address object
B. Static route created with an Internet Services object
C. SD-WAN route created for individual member interfaces
D. SD-WAN rule created to route traffic based on link latency
عرض الإجابة
اجابة صحيحة: AD
السؤال #2
Refer to the FortiGuard connection debug output. Based on the output shown in the exhibit, which two statements are correct? (Choose two.)
A. A local FortiManager is one of the servers FortiGate communicates with
B. One server was contacted to retrieve the contract information
C. There is at least one server that lost packets consecutively
D. FortiGate is using default FortiGuard communication settings
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Exhibit A Exhibit B The exhibit shows the configuration for the SD-WAN member, Performance SLA and SD-WAN Rule, as well as the output of diagnose sys virtual wan link health-check. Which interface will be selected as an outgoing interface?
A. port4
B. port2
C. port1
D. port3
عرض الإجابة
اجابة صحيحة: C
السؤال #4
View the exhibit. Based on this output, which statements are correct? (Choose two.)
A. The all VDOM is not synchronized between the primary and secondary FortiGate devices
B. The root VDOM is not synchronized between the primary and secondary FortiGate devices
C. The global configuration is synchronized between the primary and secondary FortiGate devices
D. The FortiGate devices have three VDOMs
عرض الإجابة
اجابة صحيحة: CD
السؤال #5
Refer to the exhibit, which contains a static route configuration. An administrator created a static route for Amazon Web Services. What CLI command must the administrator use to view the route?
A. get router info routing-table all
B. get internet service route list
C. get router info routing-table database
D. diagnose firewall proute list
عرض الإجابة
اجابة صحيحة: BC
السؤال #6
Exhibit A Exhibit B The SSL VPN connection fails when a user attempts to connect to it. What should the user do to successfully connect to SSL VPN?
A. Change the SSL VPN port on the client
B. Change the Server IP address
C. Change the idle-timeout
D. Change the SSL VPN portal to the tunnel
عرض الإجابة
اجابة صحيحة: AB
السؤال #7
An administrator has configured central DNAT and virtual IPs. Which of the following can be selected in the firewall policy Destination field?
A. A VIP group
B. The mapped IP address object of the VIP object
C. A VIP object
D. An IP pool
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which of the following route attributes must be equal for static routes to be eligible for equal cost multipath (ECMP) routing? (Choose two.)
A. Priority
B. Metric
C. Distance
D. Cost
عرض الإجابة
اجابة صحيحة: AC
السؤال #9
Given the interfaces shown in the exhibit, which two statements are true? (Choose two.)
A. Traffic between port2 and port2-vlan1 is allowed by default
B. port1-vlan10 and port2-vlan10 are part of the same broadcast domain
C. port1 is a native VLAN
D. port1-vlan and port2-vlan1 can be assigned in the same VDOM or to different VDOMs
عرض الإجابة
اجابة صحيحة: ABD
السؤال #10
Which statement is true regarding SSL VPN timers? (Choose two.)
A. Allow to mitigate DoS attacks from partial HTTP requests
B. SSL VPN settings do not have customizable timers
C. Disconnect idle SSL VPN users when a firewall policy authentication timeout occurs
D. Prevent SSL VPN users from being logged out because of high network latency
عرض الإجابة
اجابة صحيحة: AD
السؤال #11
An administrator is investigating a report of users having intermittent issues with browsing the web. The administrator ran diagnostics and received the output shown in the exhibit. Examine the diagnostic output shown exhibit. Which of the following options is the most likely cause of this issue?
A. NAT port exhaustion
B. High CPU usage
C. High memory usage
D. High session timeout value
عرض الإجابة
اجابة صحيحة: C
السؤال #12
If Internet Service is already selected as Source in a firewall policy, which other configuration objects can be added to the Source filed of a firewall policy?
A. IP address
B. Once Internet Service is selected, no other object can be added
C. User or User Group
D. FQDN address
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)
A. The subject field in the server certificate
B. The serial number in the server certificate
C. The server name indication (SNI) extension in the client hello message
D. The subject alternative name (SAN) field in the server certificate
E. The host field in the HTTP header
عرض الإجابة
اجابة صحيحة: AD
السؤال #14
What files are sent to FortiSandbox for inspection in flow-based inspection mode?
A. All suspicious files that do not have their hash value in the FortiGuard antivirus signature database
B. All suspicious files that are above the defined oversize limit value in the protocol options
C. All suspicious files that match patterns defined in the antivirus profile
D. All suspicious files that are allowed to be submitted to FortiSandbox in the antivirus profile
عرض الإجابة
اجابة صحيحة: C
السؤال #15
How does FortiGate act when using SSL VPN in web mode?
A. FortiGate acts as an FDS server
B. FortiGate acts as an HTTP reverse proxy
C. FortiGate acts as DNS server
D. FortiGate acts as router
عرض الإجابة
اجابة صحيحة: D
السؤال #16
The exhibit contains a network diagram, firewall policies, and a firewall address object configuration. An administrator created a Deny policy with default settings to deny Webserver access for Remote-user2. Remote-user2 is still able to access Webserver. Which two changes can the administrator make to deny Webserver access for Remote-User2? (Choose two.)
A. Disable match-vip in the Deny policy
B. Set the Destination address as Deny_IP in the Allow-access policy
C. Enable match vip in the Deny policy
D. Set the Destination address as Web_server in the Deny policy
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which statement about FortiGuard services for FortiGate is true?
A. The web filtering database is downloaded locally on FortiGate
B. Antivirus signatures are downloaded locally on FortiGate
C. FortiGate downloads IPS updates using UDP port 53 or 8888
D. FortiAnalyzer can be configured as a local FDN to provide antivirus and IPS updates
عرض الإجابة
اجابة صحيحة: B
السؤال #18
An administrator needs to strengthen the security for SSL VPN access. Which of the following statements are best practices to do so? (Choose three.)
A. Configure split tunneling for content inspection
B. Configure host restrictions by IP or MAC address
C. Configure two-factor authentication using security certificates
D. Configure SSL offloading to a content processor (FortiASIC)
E. Configure a client integrity check (host-check)
عرض الإجابة
اجابة صحيحة: CDE
السؤال #19
Review the Intrusion Prevention System (IPS) profile signature settings. Which statement is correct in adding the FTP.Login.Failed signature to the IPS sensor profile?
A. Traffic matching the signature will be silently dropped and logged
B. The signature setting uses a custom rating threshold
C. The signature setting includes a group of other signatures
D. Traffic matching the signature will be allowed and logged
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Based on the raw log, which two statements are correct? (Choose two.)
A. Traffic is blocked because Action is set to DENY in the firewall policy
B. Traffic belongs to the root VDOM
C. This is a security log
D. Log severity is set to error on FortiGate
عرض الإجابة
اجابة صحيحة: A
السؤال #21
The exhibit contains a network interface configuration, firewall policies, and a CLI console configuration. How will FortiGate handle user authentication for traffic that arrives on the LAN interface?
A. If there is a full-through policy in place, users will not be prompted for authentication
B. Users from the Sales group will be prompted for authentication and can authenticate successfully with the correct credentials
C. Authentication is enforced at a policy level; all users will be prompted for authentication
D. Users from the HR group will be prompted for authentication and can authenticate successfully with the correct credentials
عرض الإجابة
اجابة صحيحة: AC
السؤال #22
Which of the following conditions must be met in order for a web browser to trust a web server certificate signed by a third-party CA?
A. The public key of the web server certificate must be installed on the browser
B. The web-server certificate must be installed on the browser
C. The CA certificate that signed the web-server certificate must be installed on the browser
D. The private key of the CA certificate that signed the browser certificate must be installed on the browser
عرض الإجابة
اجابة صحيحة: C
السؤال #23
An administrator needs to configure VPN user access for multiple sites using the same soft FortiToken. Each site has a FortiGate VPN gateway. What must an administrator do to achieve this objective?
A. The administrator can register the same FortiToken on more than one FortiGate
B. The administrator must use a FortiAuthenticator device
C. The administrator can use a third-party radius OTP server
D. The administrator must use the user self-registration server
عرض الإجابة
اجابة صحيحة: AC
السؤال #24
A company needs to provide SSL VPN access to two user groups. The company also needs to display different welcome messages on the SSL VPN login screen for both user groups. What is required in the SSL VPN configuration to meet these requirements?
A. Different SSL VPN realms for each group
B. Two separate SSL VPNs in different interfaces mapping the same ssl
C. Two firewall policies with different captive portals
D. Different virtual SSL VPN IP addresses for each group
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Which statements about a One-to-One IP pool are true? (Choose two.)
A. It is used for destination NAT
B. It allows the fixed mapping of an internal address range to an external address range
C. It does not use port address translation
D. It allows the configuration of ARP replies
عرض الإجابة
اجابة صحيحة: BC
السؤال #26
The exhibit displays the output of the CLI command: diagnose sys ha dump-by vcluster. Which two statements are true? (Choose two.)
A. FortiGate SN FGVM010000065036 HA uptime has been reset
B. FortiGate devices are not in sync because one device is down
C. FortiGate SN FGVM010000064692 is the primary because of higher HA uptime
D. FortiGate SN FGVM010000064692 has the higher HA priority
عرض الإجابة
اجابة صحيحة: AD
السؤال #27
Which Security rating scorecard helps identify configuration weakness and best practice violations in your network?
A. Fabric Coverage
B. Automated Response
C. Security Posture
D. Optimization
عرض الإجابة
اجابة صحيحة: BDE
السؤال #28
Consider the topology: Application on a Windows machine <--{SSL VPN} -->FGT--> Telnet to Linux server. An administrator is investigating a problem where an application establishes a Telnet session to a Linux server over the SSL VPN through FortiGate and the idle session times out after about 90 minutes. The administrator would like to increase or disable this timeout. The administrator has already verified that the issue is not caused by the application or Linux server. This issue does not happen when the a
A. Set the maximum session TTL value for the TELNET service object
B. Set the session TTL on the SSLVPN policy to maximum, so the idle session timeout will not happen after 90 minutes
C. Create a new service object for TELNET and set the maximum session TTL
D. Create a new firewall policy and place it above the existing SSLVPN policy for the SSL VPN traffic, and set the new TELNET service object in the policy
عرض الإجابة
اجابة صحيحة: AB

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: