لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An administrator has configured a route-based IPsec VPN between two FortiGate devices. Which statement about this IPsec VPN configuration is true?
A. A phase 2 configuration is not required
B. This VPN cannot be used as part of a hub-and-spoke topology
C. A virtual IPsec interface is automatically created after the phase 1 configuration is completed
D. The IPsec firewall policies must be placed at the top of the list
عرض الإجابة
اجابة صحيحة: C
السؤال #2
To complete the final step of a Security Fabric configuration, an administrator must authorize all the devices on which device?
A. FortiManager
B. Root FortiGate
C. FortiAnalyzer
D. Downstream FortiGate
عرض الإجابة
اجابة صحيحة: B
السؤال #3
When using SD-WAN, how do you configure the next-hop gateway address for a member interface so that FortiGate can forward Internet traffic?
A. It must be configured in a static route using the sdwan virtual interface
B. It must be provided in the SD-WAN member interface configuration
C. It must be configured in a policy-route using the sdwan virtual interface
D. It must be learned automatically through a dynamic routing protocol
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which statement about FortiGuard services for FortiGate is true?
A. The web filtering database is downloaded locally on FortiGate
B. Antivirus signatures are downloaded locally on FortiGate
C. FortiGate downloads IPS updates using UDP port 53 or 8888
D. FortiAnalyzer can be configured as a local FDN to provide antivirus and IPS updates
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which of the following statements describe WMI polling mode for the FSSO collector agent? (Choose two.)
A. The NetSessionEnum function is used to track user logoffs
B. WMI polling can increase bandwidth usage in large networks
C. The collector agent uses a Windows API to query DCs for user logins
D. The collector agent do not need to search any security event logs
عرض الإجابة
اجابة صحيحة: BC
السؤال #6
Refer to the exhibits. The exhibits contain a network diagram and virtual IP and firewall policy configuration. The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port2) interface has the IP address 10.0.1.254/24. The first firewall policy has NAT enabled on the outgoing interface address. The second firewall policy is configured with a VIP as the destination address. Which IP address will be used to source NAT the Internet traffic coming from a workstation with the IP address 10.0.1.10/32
A. Any available IP address in the WAN (port1) subnet 10
B. 10
C. 10
D. 10
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Why must you use aggressive mode when a local FortiGate IPSec gateway hosts multiple dialup tunnels?
A. In aggressive mode, the remote peers are able to provide their peer IDs in the first message
B. FortiGate is able to handle NATed connections only in aggressive mode
C. FortiClient only supports aggressive mode
D. Main mode does not support XAuth for user authentication
عرض الإجابة
اجابة صحيحة: A
السؤال #8
View the exhibit: The client cannot connect to the HTTP web server. The administrator ran the FortiGate built-in sniffer and got the following output: What should be done next to troubleshoot the problem?
A. Run a sniffer in the web server
B. Execute another sniffer in the FortiGate, this time with the filter “host 10
C. Capture the traffic using an external sniffer connected to port1
D. Execute a debug flow
عرض الإجابة
اجابة صحيحة: C
السؤال #9
How does FortiGate select the central SNAT policy that is applied to a TCP session?
A. It selects the SNAT policy specified in the configuration of the outgoing interface
B. It selects the first matching central SNAT policy, reviewing from top to bottom
C. It selects the central SNAT policy with the lowest priority
D. It selects the SNAT policy specified in the configuration of the firewall policy that matches the traffic
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which two SD-WAN load balancing methods use interface weight value to distribute traffic?
A. Spillover
B. Volume
C. Source IP
D. Sessions
عرض الإجابة
اجابة صحيحة: BD
السؤال #11
Which configuration objects can be selected for the Source field of a firewall policy? (Choose two.)
A. Firewall service
B. User or user group
C. IP Pool
D. FQDN address
عرض الإجابة
اجابة صحيحة: BC
السؤال #12
NGFW mode allows policy-based configuration for most inspection rules. Which security profile’s configuration does not change when you enable policy-based inspection?
A. Web filtering
B. Antivirus
C. Web proxy
D. Application control
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: