لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two statements about IPsec authentication on FortiGate are correct? (Choose two.)
A. For a stronger authentication, you can also enable extended authentication (XAuth) to request the remote peer to provide a username and password
B. FortiGate supports pre-shared key and signature as authentication methods
C. Enabling XAuth results in a faster authentication because fewer packets are exchanged
D. A certificate is not required on the remote peer when you set the signature as the authentication method
عرض الإجابة
اجابة صحيحة: BD
السؤال #2
When a firewall policy is created, which attribute is added to the policy to support recording logs to a FortiAnalyzer or a FortiManager and improves functionality when a FortiGate is integrated with these devices?
A. Log ID
B. Universally Unique Identifier
C. Policy ID
D. Sequence ID
عرض الإجابة
اجابة صحيحة: B
السؤال #3
FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy. Which two other security profiles can you apply to the security policy? (Choose two.)
A. Antivirus scanning
B. File filter
C. DNS filter
D. Intrusion prevention
عرض الإجابة
اجابة صحيحة: AC
السؤال #4
A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up. Based on the phase 2 configuration shown in the exhibit, what configuration change will bring phase 2 up?
A. On HQ-FortiGate, enable Diffie-Hellman Group 2
B. On HQ-FortiGate, enable Auto-negotiate
C. On Remote-FortiGate, set Seconds to 43200
D. On HQ-FortiGate, set Encryption to AES256
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)
A. SSH
B. HTTPS
C. FTM
D. FortiTelemetry
عرض الإجابة
اجابة صحيحة: AB
السؤال #6
Which two statements are true about collector agent standard access mode? (Choose two.)
A. Standard mode uses Windows convention-NetBios: Domain\Username
B. Standard mode security profiles apply to organizational units (OU)
C. Standard mode security profiles apply to user groups
D. Standard access mode supports nested groups
عرض الإجابة
اجابة صحيحة: BC
السؤال #7
FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy. Which two other security profiles can you apply to the security policy? (Choose two.)
A. Antivirus scanning
B. File filterC
D. Intrusion prevention
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 fails to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match. Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes will bring phase 1 up? (Choose two.)
A. On HQ-FortiGate, set IKE mode to Main (ID protection)
B. On both FortiGate devices, set Dead Peer Detection to On Demand
C. On HQ-FortiGate, disable Diffie-Helman group 2
D. On Remote-FortiGate, set port2 as Interface
عرض الإجابة
اجابة صحيحة: BC
السؤال #9
What is the effect of enabling auto-negotiate on the phase 2 configuration of an IPsec tunnel?
A. FortiGate automatically negotiates different local and remote addresses with the remote peer
B. FortiGate automatically negotiates a new security association after the existing security association expires
C. FortiGate automatically negotiates different encryption and authentication algorithms with the remote peer
D. FortiGate automatically brings up the IPsec tunnel and keeps it up, regardless of activity on the IPsec tunnel
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which two types of traffic are managed only by the management VDOM? (Choose two.)
A. FortiGuard web filter queries
B. PKI
C. Traffic shaping
D. DNS
عرض الإجابة
اجابة صحيحة: AB
السؤال #11
Which two policies must be configured to allow traffic on a policy-based next-generation firewall (NGFW) FortiGate? (Choose two.)
A. Firewall policy
B. Policy rule
C. Security policy
D. SSL inspection and authentication policy
عرض الإجابة
اجابة صحيحة: AB
السؤال #12
Which statement correctly describes NetAPI polling mode for the FSSO collector agent?
A. NetAPI polling can increase bandwidth usage in large networks
B. The NetSessionEnum function is used to track user logouts
C. The collector agent uses a Windows API to query DCs for user logins
D. The collector agent must search security event logs
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Refer to the exhibits to view the firewall policy (Exhibit A) and the antivirus profile (Exhibit B). Exhibit A Exhibit B Which statement is correct if a user is unable to receive a block replacement message when downloading an infected file for the first time?
A. The volume of traffic being inspected is too high for this model of FortiGate
B. The intrusion prevention security profile needs to be enabled when using flow-based inspection mode
C. The firewall policy performs the full content inspection on the file
D. The flow-based inspection is used, which resets the last packet to the user
عرض الإجابة
اجابة صحيحة: C
السؤال #14
What devices form the core of the security fabric?
A. Two FortiGate devices and one FortiManager device
B. One FortiGate device and one FortiManager device
C. Two FortiGate devices and one FortiAnalyzer device
D. One FortiGate device and one FortiAnalyzer device
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Which two VDOMs are the default VDOMs created when FortiGate is set up in split VDOM mode? (Choose two.)
A. FG-traffic
B. Mgmt
C. FG-Mgmt
D. Root
عرض الإجابة
اجابة صحيحة: AD
السؤال #16
An administrator must disable RPF check to investigate an issue. Which method is best suited to disable RPF without affecting features like antivirus and intrusion prevention system?
A. Enable asymmetric routing, so the RPF check will be bypassed
B. Disable the RPF check at the FortiGate interface level for the source check
C. Disable the RPF check at the FortiGate interface level for the reply check
D. Enable asymmetric routing at the interface level
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Which three methods are used by the collector agent for AD polling? (Choose three.)
A. FortiGate polling
B. NetAPI
C. Novell API
D. WMI
E. WinSecLog
عرض الإجابة
اجابة صحيحة: BDE
السؤال #18
Which two statements are true when FortiGate is in transparent mode? (Choose two.)
A. By default, all interfaces are part of the same broadcast domain
B. The existing network IP schema must be changed when installing a transparent mode
C. Static routes are required to allow traffic to the next hop
D. FortiGate forwards frames without changing the MAC address
عرض الإجابة
اجابة صحيحة: AD
السؤال #19
Which two statements are true about the RPF check? (Choose two.)
A. The RPF check is run on the first sent packet of any new session
B. The RPF check is run on the first reply packet of any new session
C. The RPF check is run on the first sent and reply packet of any new session
D. RPF is a mechanism that protects FortiGuard and your network from IP spoofing attacks
عرض الإجابة
اجابة صحيحة: AD
السؤال #20
The exhibit shows proxy policies and proxy addresses, the authentication rule and authentication scheme, users, and firewall address. An explicit web proxy is configured for subnet range 10.0.1.0/24 with three explicit web proxy policies. The authentication rule is configured to authenticate HTTP requests for subnet range 10.0.1.0/24 with a form-based authentication scheme for the FortiGate local user database. Users will be prompted for authentication. How will FortiGate process the traffic when the HTTP r
A. If a Mozilla Firefox browser is used with User-B credentials, the HTTP request will be allowed
B. If a Google Chrome browser is used with User-B credentials, the HTTP request will be allowed
C. If a Mozilla Firefox browser is used with User-A credentials, the HTTP request will be allowed
D. If a Microsoft Internet Explorer browser is used with User-B credentials, the HTTP request will be allowed
عرض الإجابة
اجابة صحيحة: BC
السؤال #21
Which three criteria can a FortiGate use to look for a matching firewall policy to process traffic? (Choose three.)
A. Source defined as Internet Services in the firewall policy
B. Destination defined as Internet Services in the firewall policy
C. Highest to lowest priority defined in the firewall policy
D. Services defined in the firewall policy
E. Lowest to highest policy ID number
عرض الإجابة
اجابة صحيحة: ABD
السؤال #22
Refer to the web filter raw logs. Based on the raw logs shown in the exhibit, which statement is correct?
A. Access to the social networking web filter category was explicitly blocked to all users
B. The action on firewall policy ID 1 is set to warning
C. Social networking web filter category is configured with the action set to authenticate
D. The name of the firewall policy is all_users_web
عرض الإجابة
اجابة صحيحة: B
السؤال #23
Which three CLI commands can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.)
A. diagnose sys top
B. execute ping
C. execute traceroute
D. diagnose sniffer packet any
E. get system arp
عرض الإجابة
اجابة صحيحة: ABC
السؤال #24
Refer to the exhibit, which contains a session diagnostic output. Which statement is true about the session diagnostic output?
A. The session is a UDP unidirectional state
B. The session is in TCP ESTABLISHED state
C. The session is a bidirectional UDP connection
D. The session is a bidirectional TCP connection
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Which security feature does FortiGate provide to protect servers located in the internal networks from attacks such as SQL injections?
A. Denial of Service
B. Web application firewall
C. Antivirus
D. Application control
عرض الإجابة
اجابة صحيحة: A
السؤال #26
A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes. All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover. Which two key configuration changes are needed on FortiGate to meet the design requirements? (Choose two.)
A. Configure a high distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel
B. Enable Dead Peer Detection
C. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel
D. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels
عرض الإجابة
اجابة صحيحة: BD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: