Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

FCP_FGT_AD-7.4 FCP - FortiGate 7.4 Administrator Questions and Answers

Questions 4

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 4

FCP_FGT_AD-7.4 Question 4

FCP_FGT_AD-7.4 Question 4

The exhibits show a diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device.

Two PCs, PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.

Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

Options:

A.

In the firewall policy configuration, add 10. o. l. 3 as an address object in the source field.

B.

In the IP pool configuration, set endig to 192.2.0.12.

C.

Configure another firewall policy that matches only the address of PC3 as source, and then place the policy on top of the list.

D.

In the IP pool configuration, set cype to overload.

Buy Now
Questions 5

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy.

When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the

and does not block the file allowing it to be downloaded.

The administrator confirms that the traffic matches the configured firewall policy.

What are two reasons for the failed virus detection by FortiGate? (Choose two.)

Options:

A.

The selected SSL inspection profile has certificate inspection enabled

B.

The browser does not trust the FortiGate self-siqned CA certificate

C.

The EICAR test file exceeds the protocol options oversize limit

D.

The website is exempted from SSL inspection

Buy Now
Questions 6

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 6

Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?

Options:

A.

All traffic from a source IP to a destination IP is sent to the same interface.

B.

Traffic is sent to the link with the lowest latency.

C.

Traffic is distributed based on the number of sessions through each interface.

D.

All traffic from a source IP is sent to the same interface

Buy Now
Questions 7

An administrator has configured the following settings:

FCP_FGT_AD-7.4 Question 7

What are the two results of this configuration? (Choose two.)

Options:

A.

Denied users are blocked for 30 minutes.

B.

A session for denied traffic is created.

C.

The number of logs generated by denied traffic is reduced.

D.

Device detection on all interfaces is enforced for 30 minutes.

Buy Now
Questions 8

FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively.

Which two statements are true about the requirements of connected physical interfaces on FortiGate? (Choose two.)

Options:

A.

Both interfaces must have the interface role assigned

B.

Both interfaces must have directly connected routes on the routing table

C.

Both interfaces must have DHCP enabled

D.

Both interfaces must have IP addresses assigned

Buy Now
Questions 9

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 9

FCP_FGT_AD-7.4 Question 9

FCP_FGT_AD-7.4 Question 9

The exhibits show a diagram of a FortiGate device connected to the network, as well as the IP pool configuration and firewall policy objects.

The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IPaddress 10.0.1.254/24.

Which IP address will be used to source NAT (SNAT) the traffic, if the user on Local-Client (10.0.1.10) pings the IP address of Remote-FortiGate (10.200.3.1)?

Options:

A.

10.200.1.1

B.

10.200.1.149

C.

10.200.1.99

D.

10.200.1.49

Buy Now
Questions 10

Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.)

Options:

A.

The client FortiGate requires the SSL VPN tunnel interface type to connect SSL VPN.

B.

The server FortiGate requires a CA certificate to verify the client FortiGate certificate.

C.

The client FortiGate requires a client certificate signed by the CA on the server FortiGate.

D.

The client FortiGate requires a manually added route to remote subnets.

Buy Now
Questions 11

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 11

FortiGate is configured for firewall authentication. When attempting to access an external website, the user is not presented with a login prompt.

What is the most likely reason for this situation?

Options:

A.

The Service DNS is required in the firewall policy.

B.

The user is using an incorrect user name.

C.

The Remote-users group is not added to the Destination.

D.

No matching user account exists for this user.

Buy Now
Questions 12

How can you disable RPF checking?

Options:

A.

Disable src-check on the interface level settings

B.

Unset fail-alert-interfaces on the interface level settings.

C.

Disable fail-detect on the interface level settings.

D.

Disable strict-src-check under system settings.

Buy Now
Questions 13

A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.

All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.

Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)

Options:

A.

Enable Dead Peer Detection

B.

Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.

C.

Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.

D.

Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.

Buy Now
Questions 14

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

Options:

A.

Strict RPF checks the best route back to the source using the incoming interface.

B.

Strict RPF allows packets back to sources with all active routes.

C.

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

D.

Strict RPF check is run on the first sent and reply packet of any new session.

Buy Now
Questions 15

Refer to exhibit.

FCP_FGT_AD-7.4 Question 15

An administrator configured the web filtering profile shown in the exhibit to block access to all social networking sites except Twitter. However, when users try to access twitter.com, they are redirected to a FortiGuard web filtering block page.

Based on the exhibit, which configuration change can the administrator make to allow Twitter while blocking all other social networking sites?

Options:

A.

On the Static URL Filter configuration set Type to Simple

B.

On the FortiGuard Category Based Filter configuration set Action to Warning for Social Networking

C.

On the Static URL Filter configuration set Action to Monitor

D.

On the Static URL Filter configuration set Action to Exempt

Buy Now
Questions 16

An employee needs to connect to the office through a high-latency internet connection.

Which SSL VPN setting should the administrator adjust to prevent SSL VPN negotiation failure?

Options:

A.

SSL VPN idle-timeout

B.

SSL VPN login-timeout

C.

SSL VPN dtls-hello-timeout

D.

SSL VPN session-ttl

Buy Now
Questions 17

Refer to the exhibits, which show the firewall policy and an antivirus profile configuration.

FCP_FGT_AD-7.4 Question 17

Why is the user unable to receive a block replacement message when downloading an infected file for the first time?

Options:

A.

The intrusion prevention security profile must be enabled when using flow-based inspection mode.

B.

The option to send files to FortiSandbox for inspection is enabled.

C.

The firewall policy performs a full content inspection on the file.

D.

Flow-based inspection is used, which resets the last packet to the user.

Buy Now
Questions 18

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 18

Which two statements are true about the routing entries in this database table? (Choose two.)

Options:

A.

All of the entries in the routing database table are installed in the FortiGate routing table.

B.

The port2 interface is marked as inactive.

C.

Both default routes have different administrative distances.

D.

The default route on porc2 is marked as the standby route.

Buy Now
Questions 19

FortiGate is integrated with FortiAnalyzer and FortiManager.

When a firewall policy is created, which attribute is added to the policy to improve functionality and to support recording logs to FortiAnalyzer or FortiManager?

Options:

A.

Log ID

B.

Policy ID

C.

Sequence ID

D.

Universally Unique Identifier

Buy Now
Questions 20

Which three statements explain a flow-based antivirus profile? (Choose three.)

Options:

A.

Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection

B.

Flow-based inspection optimizes performance compared to proxy-based inspection

C.

FortiGate buffers the whole file but transmits to the client at the same time.

D.

If a virus is detected, the last packet is delivered to the client.

E.

The IPS engine handles the process as a standalone.

Buy Now
Questions 21

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 21

FCP_FGT_AD-7.4 Question 21

The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details.

Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?

Options:

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.

B.

Apple FaceTime will be allowed, based on the Apple filter configuration.

C.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.

D.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.

Buy Now
Questions 22

FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.

Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)

Options:

A.

www.example.com:443

B.

www.example.com

C.

www.example.com/index.hrml

D.

example.com

Buy Now
Questions 23

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 23

Why did FortiGate drop the packet?

Options:

A.

11 matched an explicitly configured firewall policy with the action DENY

B.

It failed the RPF check.

C.

The next-hop IP address is unreachable.

D.

It matched the default implicit firewall policy

Buy Now
Questions 24

Which statement is correct regarding the use of application control for inspecting web applications?

Options:

A.

Application control can identify child and parent applications, and perform different actions on them

B.

Application control signatures are included in Fortinet Antivirus engine

C.

Application control does not display a replacement message for a blocked web application

D.

Application control does not require SSL Inspection to Identity web applications

Buy Now
Questions 25

An administrator configures FortiGuard servers as DNS servers on FortiGate using default settings.

What is true about the DNS connection to a FortiGuard server?

Options:

A.

It uses UDP 8888.

B.

It uses DNS over HTTPS.

C.

It uses DNS over TLS.

D.

It uses UDP 53.

Buy Now
Questions 26

What is the primary FortiGate election process when the HA override setting is disabled?

Options:

A.

Connected monitored ports > Priority > System uptime > FortiGate serial number

B.

Connected monitored ports > System uptime > Priority > FortiGate serial number

C.

Connected monitored ports > Priority > HA uptime > FortiGate serial number

D.

Connected monitored ports > HA uptime > Priority > FortiGate serial number

Buy Now
Exam Code: FCP_FGT_AD-7.4
Exam Name: FCP - FortiGate 7.4 Administrator
Last Update: Jan 15, 2025
Questions: 88

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now FCP_FGT_AD-7.4 testing engine

PDF (Q&A)

$36.75  $104.99
buy now FCP_FGT_AD-7.4 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 18 Jan 2025