Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

FCP_FGT_AD-7.4 Practice Test


Page 1 out of 6 Pages

Which inspection mode does FortiGate use for application profiles if it is configured as a profile-based nextgeneration firewall (NGFW)?


A. Full content inspection


B. Proxy-based inspection


C. Certificate inspection


D. Flow-based inspection





D.
  Flow-based inspection

Explanation:
When FortiGate is configured in NGFW profile-based mode, it primarily uses flow-based inspection for application profiles. Flow-based inspection provides faster processing and lower latency by inspecting traffic in real-time without buffering, making it suitable for scenarios where performance is a priority.

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.)


A. If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.


B. If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.


C. If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP


D. If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.





A.
  If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.

D.
  If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.

Explanation:

When SD-WAN is enabled on FortiGate, the load balancing algorithm for Equal-Cost Multi-Path (ECMP) is configured using the load-balance-mode parameter under SD-WAN settings. However, if SD-WAN is disabled, the ECMP load balancing algorithm can be configured under config system settings. This flexibility allows FortiGate to control traffic routing behavior based on the network configuration and requirements.

Which statement is a characteristic of automation stitches?


A. They can be run only on devices in the Security Fabric.


B. They can be created only on downstream devices in the fabric.


C. They can have one or more triggers.


D. They can run multiple actions at the same time.





C.
  They can have one or more triggers.

Explanation:
Automation stitches on FortiGate can have one or more triggers, which are conditions or events that activate the automation stitch. The trigger defines when the automation stitch should execute the defined actions. Actions within a stitch can be executed sequentially or in parallel, depending on the configuration.

A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad. Which IPsec Wizard template must the administrator apply?


A. Remote Access


B. Site to Site


C. Dial up User


D. iHub-and-Spoke





A.
  Remote Access

Explanation:
For configuring an IPsec VPN tunnel for a sales employee traveling abroad, the "Remote Access" template is the most appropriate choice. This template is designed to allow remote users to securely connect to the internal network of an organization from any location using FortiClient or a compatible client. The other options, such as "Site to Site," "Dial up User," and "iHub-and-Spoke," are used for connecting different networks or sites, not individual remote users.

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)


A. The host field in the HTTP header.


B. The server name indication (SNI) extension in the client hello message.


C. The subject alternative name (SAN) field in the server certificate.


D. The subject field in the server certificate.


E. The serial number in the server certificate.





B.
  The server name indication (SNI) extension in the client hello message.

C.
  The subject alternative name (SAN) field in the server certificate.

D.
  The subject field in the server certificate.

Explanation:
When SSL certificate inspection is enabled on a FortiGate device, the system uses the following three pieces of information to identify the hostname of the SSL server:

Server Name Indication (SNI) extension in the client hello message (B): The SNI is an extension in the client hello message of the SSL/TLS protocol. It indicates the hostname the client is attempting to connect to. This allows FortiGate to identify the server's hostname during the SSL handshake.

Subject Alternative Name (SAN) field in the server certificate (C): The SAN field in the server certificate lists additional hostnames or IP addresses that the certificate is valid for. FortiGate inspects this field to confirm the identity of the server.

Subject field in the server certificate (D): The Subject field contains the primary hostname or domain name for which the certificate was issued. FortiGate uses this information to match and validate the server’s identity during SSL certificate inspection.

The other options are not used in SSL certificate inspection for hostname identification: Host field in the HTTP header (A): This is part of the HTTP request, not the SSL handshake, and is not used for SSL certificate inspection.

Serial number in the server certificate (E): The serial number is used for certificate management and revocation, not for hostname identification.


Page 1 out of 6 Pages