Black Friday Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Hot Vendors

FCP_FGT_AD-7.4 FCP - FortiGate 7.4 Administrator Questions and Answers

Questions 4

Which statement about the deployment of the Security Fabric in a multi-VDOM environment is true?

Options:

A.

Downstream devices can connect to the upstream device from any of their VDOMs

B.

Each VDOM in the environment can be part of a different Security Fabric

C.

VDOMs without ports with connected devices are not displayed in the topology

D.

Security rating reports can be run individually for each configured VDOM

Buy Now
Questions 5

Refer to the exhibit which contains a RADIUS server configuration.

FCP_FGT_AD-7.4 Question 5

An administrator added a configuration for a new RADIUS server. While configuring, the administrator selected the Include in every user group option.

What is the impact of using the Include in every user group option in a RADIUS configuration?

Options:

A.

This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group

B.

This option places all users into even/ RADIUS user group, including groups that are used for the LDAP server on FortiGate

C.

This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case is FortiAuthenticator

D.

This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group

Buy Now
Questions 6

An administrator has configured the following settings:

FCP_FGT_AD-7.4 Question 6

What are the two results of this configuration? (Choose two.)

Options:

A.

Denied users are blocked for 30 minutes.

B.

A session for denied traffic is created.

C.

The number of logs generated by denied traffic is reduced.

D.

Device detection on all interfaces is enforced for 30 minutes.

Buy Now
Questions 7

Refer to the exhibits, which show the firewall policy and the security profile for Facebook.

FCP_FGT_AD-7.4 Question 7

FCP_FGT_AD-7.4 Question 7

Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other types of posts.

Which part of the configuration must you change to resolve the issue?

Options:

A.

Make the SSL inspection a deep content inspection

B.

Add Facebook to the URL category in the security policy

C.

Disable HTTP redirect to HTTPS on the web browser

D.

Get the additional application signatures required to add to the security policy

Buy Now
Questions 8

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 8

FCP_FGT_AD-7.4 Question 8

FCP_FGT_AD-7.4 Question 8

FGT-1 and FGT-2 are updated with HA configuration commands shown in the exhibit.

What would be the expected outcome in the HA cluster?

Options:

A.

FGT-1 will remain the primary because FGT-2 has lower priority.

B.

FGT-2 will take over as the primary because it has the override enable setting and higher priority than FGT-1.

C.

FGT-1 will synchronize the override disable setting with FGT-2.

D.

The HA cluster will become out of sync because the override setting must match on all HA members.

Buy Now
Questions 9

FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.

Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)

Options:

A.

www.example.com:443

B.

www.example.com

C.

www.example.com/index.hrml

D.

example.com

Buy Now
Questions 10

Refer to the exhibit showing a debug flow output.

FCP_FGT_AD-7.4 Question 10

What two conclusions can you make from the debug flow output? (Choose two.)

Options:

A.

The debug flow is for ICMP traffic.

B.

A firewall policy allowed the connection.

C.

A new traffic session was created.

D.

The default route is required to receive a reply.

Buy Now
Questions 11

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 11

FCP_FGT_AD-7.4 Question 11

FCP_FGT_AD-7.4 Question 11

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration.

An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2.

The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver.

Which two configuration changes can the administrator make to the policy to deny Webserver access for Remote-User2? (Choose two.)

Options:

A.

Enable match-vip in the Deny policy.

B.

Set the Destination address as Webserver in the Deny policy.

C.

Disable match-vip in the Deny policy.

D.

Set the Destination address as Deny_IP in the Allow_access policy.

Buy Now
Questions 12

FortiGate is integrated with FortiAnalyzer and FortiManager.

When a firewall policy is created, which attribute is added to the policy to improve functionality and to support recording logs to FortiAnalyzer or FortiManager?

Options:

A.

Log ID

B.

Policy ID

C.

Sequence ID

D.

Universally Unique Identifier

Buy Now
Questions 13

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 13

FCP_FGT_AD-7.4 Question 13

The SSL VPN connection fails when a user attempts to connect to it.

What should the user do to successfully connect to the SSL VPN?

Options:

A.

Change the SSL VPN portal to the tunnel.

B.

Change the idle timeout.

C.

Change the server IP address.

D.

Change the SSL VPN port on the client.

Buy Now
Questions 14

Which two statements explain antivirus scanning modes? (Choose two.)

Options:

A.

In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.

B.

In flow-based inspection mode files bigger than the buffer size are scanned

C.

In proxy-based inspection mode files bigger than the buffer size are scanned

D.

In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client

Buy Now
Questions 15

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.)

Options:

A.

If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.

B.

If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.

C.

If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP

D.

If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.

Buy Now
Questions 16

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 16

Which statement about this firewall policy list is true?

Options:

A.

The Implicit group can include more than one deny firewall policy.

B.

The firewall policies are listed by ID sequence view.

C.

The firewall policies are listed by ingress and egress interfaces pairing view.

D.

LAN to WAN. WAN to LAN. and Implicit are sequence grouping view lists.

Buy Now
Questions 17

Which two statements are true regarding FortiGate HA configuration synchronization? (Choose two.)

Options:

A.

Checksums of devices are compared against each other to ensure configurations are the same.

B.

Incremental configuration synchronization can occur only from changes made on the primary FortiGate device.

C.

Incremental configuration synchronization can occur from changes made on any FortiGate device within the HA cluster

D.

Checksums of devices will be different from each other because some configuration items are not synced to other HA members.

Buy Now
Questions 18

An administrator is configuring an IPsec VPN between site A and site В. The Remote Gateway setting in both sites has been configured as Static IP Address.

For site A, the local quick mode selector is 192.168.1.0/24 and the remote quick mode selector is 192.168.2.0/24.

Which subnet must the administrator configure for the local quick mode selector for site B?

Options:

A.

192.168.3.0/24

B.

192.168.0.0/8

C.

192.168.2.0/24

D.

192.168.1.0/24

Buy Now
Questions 19

Which two pieces of information are synchronized between FortiGate HA members? (Choose two.)

Options:

A.

OSPF adjacencies

B.

IPsec security associations

C.

BGP peerings

D.

DHCP leases

Buy Now
Questions 20

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 20

FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt.

What is the most likely reason for this situation?

Options:

A.

The Service DNS is required in the firewall policy.

B.

The user is using an incorrect user name.

C.

The Remote-users group is not added to the Destination.

D.

No matching user account exists for this user.

Buy Now
Questions 21

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

Options:

A.

Strict RPF checks the best route back to the source using the incoming interface.

B.

Strict RPF allows packets back to sources with all active routes.

C.

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

D.

Strict RPF check is run on the first sent and reply packet of any new session.

Buy Now
Questions 22

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

Options:

A.

The host field in the HTTP header.

B.

The server name indication (SNI) extension in the client hello message.

C.

The subject alternative name (SAN) field in the server certificate.

D.

The subject field in the server certificate.

E.

The serial number in the server certificate.

Buy Now
Questions 23

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 23

In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output shown in the exhibit.

What should the administrator do next, to troubleshoot the problem?

Options:

A.

Execute a debug flow.

B.

Capture the traffic using an external sniffer connected to part1.

C.

Execute another sniffer on FortiGate, this time with the filter "hose 10.o.1.10".

D.

Run a sniffer on the web server.

Buy Now
Questions 24

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 24

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

Options:

A.

Enable the parameter Never Timeout in the admin profiles

B.

Increase the admintimeout value under config system accprofile super_admin.

C.

Increase the admintimeout value under config system global

D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Buy Now
Questions 25

Which three methods are used by the collector agent for AD polling? (Choose three.)

Options:

A.

WinSecLog

B.

WMI

C.

NetAPI

D.

FSSO REST API

E.

FortiGate polling

Buy Now
Exam Code: FCP_FGT_AD-7.4
Exam Name: FCP - FortiGate 7.4 Administrator
Last Update: Nov 22, 2024
Questions: 86

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now FCP_FGT_AD-7.4 testing engine

PDF (Q&A)

$31.5  $104.99
buy now FCP_FGT_AD-7.4 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 23 Nov 2024