Discount Offer
Go Back on NSE7_EFW-7.2 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

NSE7_EFW-7.2 Practice Test


Page 3 out of 13 Pages

You want to improve reliability over a lossy IPSec tunnel. Which combination of IPSec phase 1 parameters should you configure?


A. fec-ingress and fec-egress


B. Odpd and dpd-retryinterval


C. fragmentation and fragmentation-mtu


D. keepalive and keylive





C.
  fragmentation and fragmentation-mtu

Explanation:

For improving reliability over a lossy IPSec tunnel, the fragmentation and fragmentation-mtu parameters should be configured. In scenarios where there might be issues with packet size or an unreliable network, setting the IPsec phase 1 to allow for fragmentation will enable large packets to be broken down, preventing them from being dropped due to size or poor network quality. The fragmentation-mtu specifies the size of the fragments. This is aligned with Fortinet's recommendations for handling IPsec VPN over networks with potential packet loss or size limitations.

Which two statements about the Security fabric are true? (Choose two.)


A. FortiGate uses the FortiTelemetry protocol to communicate with FortiAnatyzer.


B. Only the root FortiGate sends logs to FortiAnalyzer


C. Only FortiGate devices with configuration-sync receive and synchronize global CMDB objects that the toot FortiGate sends


D. Only the root FortiGate collects network topology information and forwards it to FortiAnalyzer





B.
  Only the root FortiGate sends logs to FortiAnalyzer

C.
  Only FortiGate devices with configuration-sync receive and synchronize global CMDB objects that the toot FortiGate sends

Explanation:

In the Security Fabric, only the root FortiGate sends logs to FortiAnalyzer (B). Additionally, only FortiGate devices withconfiguration-syncenabled receive and synchronize global Central Management Database (CMDB) objects that the root FortiGate sends (C). FortiGate uses the FortiTelemetry protocol to communicate with other FortiGates, not FortiAnalyzer (A). The last option (D) is incorrect as all FortiGates can collect and forward network topology information to FortiAnalyzer.
References:

FortiOS Handbook - Security Fabric

Which two statements about metadata variables are true? (Choose two.)


A. You create them on FortiGate


B. They apply only to non-firewall objects.


C. The metadata format is $.


D. They can be used as variables in scripts





A.
  You create them on FortiGate

D.
  They can be used as variables in scripts

Explanation:

Metadata variables in FortiGate are created to store metadata associated with different FortiGate features. These variables can be used in various configurations and scripts to dynamically replace the variable with its actual value during processing. A: You create metadata variables on FortiGate. They are used to store metadata for FortiGate features and can be called upon in different configurations. D: They can be used as variables in scripts. Metadata variables are utilized within the scripts to dynamically insert values as per the context when the script runs.

Fortinet FortiOS Handbook: CLI Reference

You want to configure faster failure detection for BGP Which parameter should you enable on both connected FortiGate devices?


A. Ebgp-enforce-multihop


B. bfd


C. Distribute-list-in


D. Graceful-restart





B.
  bfd

Explanation:

BFD (Bidirectional Forwarding Detection) is a protocol that provides fast failure detection for BGP by sending periodic messages to verify the connectivity between two peers1. BFD can be enabled on both connected FortiGate devices by using the command set bfd enable under the BGP configuration2.

References: = Technical Tip : FortiGate BFD implementation and examples …, Configure BGP | FortiGate / FortiOS 7.0.2 - Fortinet Documentation

Winch two statements about ADVPN are true? (Choose two)


A. auto-discovery receiver must be set to enable on the Spokes.


B. Spoke to-spoke traffic never goes through the hub


C. lt supports NAI for on-demand tunnels


D. Routing is configured by enabling add-advpn-route





A.
  auto-discovery receiver must be set to enable on the Spokes.

C.
  lt supports NAI for on-demand tunnels


Page 3 out of 13 Pages
Previous