Prévia do material em texto
<p> FCA - FortiGate 7.4 Operator Self-Paced</p><p>Started on Wednesday, October 9, 2024, 3:31 PM</p><p>State Finished</p><p>Completed on Wednesday, October 9, 2024, 4:32 PM</p><p>Time taken 1 hour 1 min</p><p>Points 35/40</p><p>Grade 88 out of 100</p><p>Feedback Congratulations, you passed!</p><p>Question 1</p><p>Correct</p><p>1 points out of 1</p><p>Question 2</p><p>Correct</p><p>1 points out of 1</p><p>Question 3</p><p>Correct</p><p>1 points out of 1</p><p>You need to examine the logs related to local users watching YouTube videos. Where can you find those logs?</p><p>Select one:</p><p>Log and Report > Security Events > Antivirus</p><p>Log and Report > Security Events > Intrusion Prevention</p><p>Log and Report > Security Events > Application Control</p><p>Log and Report > Security Events > WebFilter</p><p>How does the FortiGate intrusion prevention system (IPS) use signatures to detect malicious traffic?</p><p>Select one:</p><p>By blocking all network traffic</p><p>By monitoring user activity on websites</p><p>By decrypting Secure Sockets Layer (SSL)-encrypted traffic</p><p>By comparing network packets to known threats</p><p>Which two protocols can you use for administrative access on a FortiGate interface?</p><p>Select one:</p><p>Remote Desktop Protocol (RDP) and Hypertext Transfer Protocol (HTTP)</p><p>Telnet and Simple Network Management Protocol (SNMP)</p><p>Hypertext Transfer Protocol Secure (HTTPS) and Secure Shell (SSH)</p><p>Simple Mail Transfer Protocol (SMTP) and Secure Sockets Layer (SSL)</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 1/11</p><p>https://training.fortinet.com/course/view.php?id=39326</p><p>https://training.fortinet.com/course/view.php?id=39326</p><p>Question 4</p><p>Correct</p><p>1 points out of 1</p><p>Question 5</p><p>Correct</p><p>1 points out of 1</p><p>Question 6</p><p>Correct</p><p>1 points out of 1</p><p>Question 7</p><p>Correct</p><p>1 points out of 1</p><p>What is the purpose of creating a firewall address object?</p><p>Select one:</p><p>To specify the source and destination interfaces</p><p>To match the source or destination IP subnet</p><p>To define the action for a firewall policy</p><p>To enable web filtering for a specific address</p><p>What functionality does FortiGate provide to establish secure connections between a main office and its remote branches, over the internet?</p><p>Select one:</p><p>Monitoring and logging</p><p>Security scanning</p><p>Virtual private networks</p><p>Firewall authentication</p><p>What is the purpose of the FortiGuard Labs signature database?</p><p>Select one:</p><p>To keep FortiGate firewalls protected against the latest malware variants</p><p>To provide secure configuration templates to FortiGate firewalls</p><p>To give FortiGate firewalls the ability to track network traffic and usage patterns</p><p>To identify and correct vulnerabilities in FortiGate firewalls</p><p>Why is the order of firewall policies important?</p><p>Select one:</p><p>To ensure more granular policies are checked and applied before more general policies</p><p>To avoid conflicts with other policies in the table with similar parameters</p><p>To allow for a faster processing of high priority traffic</p><p>To ensure that the security traffic is logged before the normal traffic</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 2/11</p><p>Question 8</p><p>Correct</p><p>1 points out of 1</p><p>Question 9</p><p>Correct</p><p>1 points out of 1</p><p>Question 10</p><p>Correct</p><p>1 points out of 1</p><p>Question 11</p><p>Correct</p><p>1 points out of 1</p><p>Which two criteria can be matched in the Source field of a firewall policy?</p><p>Select one:</p><p>Interface and service type</p><p>Address group and hostname</p><p>IP address and user</p><p>MAC address and domain name</p><p>How does an IPS protect networks from threats?</p><p>Select one:</p><p>By allowing only secure access to network resources</p><p>By encrypting all network traffic from untrusted IP addresses</p><p>By analyzing traffic and identifying potential threats</p><p>By blocking all incoming network traffic from new sources</p><p>Which action can you take to improve the security rating provided by the Fortinet Security Fabric?</p><p>Select one:</p><p>Run the integrity check on all end devices.</p><p>Apply one or more of the suggested best practices.</p><p>Create a configuration revision or back up the configuration.</p><p>Upgrade FortiGate to the latest mature version available.</p><p>What is a recommended best practice when configuring Secure Socket Layer Virtual Private Network (SSL VPN)?</p><p>Select one:</p><p>Use local users for authentication.</p><p>Import the self-signed SSL certificate.</p><p>Use the principle of least privilege.</p><p>Allow connections from all locations.</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 3/11</p><p>Question 12</p><p>Correct</p><p>1 points out of 1</p><p>Question 13</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 14</p><p>Correct</p><p>1 points out of 1</p><p>Question 15</p><p>Correct</p><p>1 points out of 1</p><p>What is the purpose of firewall policies on FortiGate?</p><p>Select one:</p><p>To control network traffic</p><p>To block all incoming traffic</p><p>To encrypt network traffic</p><p>To monitor network traffic</p><p>How do you configure an internet service as the destination in a firewall policy?</p><p>Select one:</p><p>Choose the IP subnet of the service.</p><p>Select the service from the ISDB.</p><p>Configure the service with a virtual IP.</p><p>Specify the MAC address of the service.</p><p>What is the main advantage of using Secure Socket Layer Virtual Private Network (SSL VPN) in web mode?</p><p>Select one:</p><p>Support for a wide range of applications and protocols</p><p>No need to install client software</p><p>Ability to perform client integrity checks</p><p>Access to all network resources for remote users</p><p>Which two options can you use for centralized logging when you configure the Fortinet Security Fabric? (Choose two.)</p><p>Select one or more:</p><p>Syslog server</p><p>FortiGate Cloud</p><p>FortiSOAR</p><p>FortiAnalyzer</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 4/11</p><p>Question 16</p><p>Correct</p><p>1 points out of 1</p><p>Question 17</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 18</p><p>Correct</p><p>1 points out of 1</p><p>Question 19</p><p>Correct</p><p>1 points out of 1</p><p>How does FortiGate handle blocked websites in web filtering using FortiGuard category filters?</p><p>Select one:</p><p>Users are prompted to provide a valid username and password for access.</p><p>Users are allowed to access the website, but their activity is recorded in the FortiGate logs.</p><p>Users receive a warning message but can choose to continue accessing the website.</p><p>Users are redirected to a replacement message indicating the website is blocked.</p><p>When configuring a static route on FortiGate, what does the destination represent?</p><p>Select one:</p><p>The network or host to which traffic will be forwarded</p><p>The local interface on FortiGate for the outgoing traffic</p><p>The IP address of the remote DNS server</p><p>The IP address of the next-hop router</p><p>What causes a web browser to display a certificate warning when using Secure Sockets Layer (SSL) deep inspection with the FortiGate CA</p><p>certificate?</p><p>Select one:</p><p>The temporary certificate makes FortiGate behave like a man-in-the-middle (MITM) attack.</p><p>The browser does not support SSL deep inspection.</p><p>FortiGate is unable to decrypt the SSL-encrypted traffic.</p><p>FortiGate is using a CA that is not trusted by the web browser.</p><p>How can administrators track successful authentication attempts in FortiGate?</p><p>Select one:</p><p>By utilizing advanced threat intelligence feeds</p><p>By monitoring security events in real-time</p><p>By analyzing network traffic patterns</p><p>By reviewing the logs and dashboards</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 5/11</p><p>Question 20</p><p>Correct</p><p>1 points out of 1</p><p>Question 21</p><p>Correct</p><p>1 points out of 1</p><p>Question 22</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 23</p><p>Incorrect</p><p>0 points out of 1</p><p>When configuring antivirus scanning on a firewall policy, which antivirus item should you select?</p><p>Select one:</p><p>Antivirus profile</p><p>Antivirus exclusion list</p><p>Antivirus schedule</p><p>Antivirus engine version</p><p>Which category of services does FortiGuard Labs provide as part of FortiGuard Security Services?</p><p>Select one:</p><p>Network segmentation and access control</p><p>Advanced threat intelligence and prevention</p><p>Endpoint protection and vulnerability management</p><p>Data encryption and secure communications</p><p>In which architecture is the need to control application traffic becoming increasingly relevant?</p><p>Select one:</p><p>Cloud-based architecture</p><p>Distributed architecture</p><p>Peer-to-peer architecture</p><p>Traditional client-server architecture</p><p>What are two consequences of allowing a FortiGate license to expire? (Choose two.)</p><p>Select one or more:</p><p>Inability to monitor system logs and generate network reports</p><p>Disruption of network services and potential legal issues</p><p>Reduced FortiGate performance and increased vulnerability to security threats</p><p>Loss of access to software updates and technical support</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 6/11</p><p>Question 24</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 25</p><p>Correct</p><p>1 points out of 1</p><p>Question 26</p><p>Correct</p><p>1 points out of 1</p><p>Question 27</p><p>Correct</p><p>1 points out of 1</p><p>Which protocol is used for the authentication and encryption of the data in an IPSec VPN implementation?</p><p>Select one:</p><p>Secure Hash Algorithm (SHA)</p><p>Encapsulation Security Payload (ESP)</p><p>Transport Layer Security (TLS)</p><p>Advanced Encryption Standard (AES)</p><p>What are some of the features provided by IPSec VPNs?</p><p>Select one:</p><p>Network segmentation and packet inspection</p><p>Data authentication and data integrity</p><p>Bandwidth optimization and antireplay protection</p><p>Data encryption and load balancing</p><p>Which inspection mode examines traffic as a whole before determining an action?</p><p>Select one:</p><p>Proxy-based inspection</p><p>Flow-based inspection</p><p>Stateful inspection</p><p>Application-level inspection</p><p>Which two additional features and settings can you apply to traffic after it is accepted by a firewall policy? (Choose two.)</p><p>Select one or more:</p><p>Application control</p><p>Antivirus scanning</p><p>Packet filtering</p><p>User authentication</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 7/11</p><p>Question 28</p><p>Correct</p><p>1 points out of 1</p><p>Question 29</p><p>Correct</p><p>1 points out of 1</p><p>Question 30</p><p>Correct</p><p>1 points out of 1</p><p>Question 31</p><p>Correct</p><p>1 points out of 1</p><p>What is a scenario where automation is used in the Fortinet Security Fabric?</p><p>Select one:</p><p>Monitoring disk space utilization on FortiAnalyzer</p><p>Automatically quarantining a computer with malicious activity</p><p>Assigning security ratings to newly added devices</p><p>Generating weekly reports for management review</p><p>To avoid certificate errors, which field settings must be included in a Secure Sockets Layer (SSL) certificate issued by a certificate authority (CA)?</p><p>Select one:</p><p>subjectAltName: DNS:*.example.com and extendedKeyUsage: serverAuth</p><p>issuer: C=US, O=Fortinet, CN=Verisign</p><p>basicConstraints: CA:TRUE and keyUsage: keyCertSign</p><p>signatureAlgorithm: SHA256withRSA and validityPeriod: 365 days</p><p>What is grayware?</p><p>Select one:</p><p>Unsolicited programs installed without user consent</p><p>Known malware with existing signatures</p><p>Malicious files sent to the sandbox for inspection</p><p>New and unknown malware variants</p><p>What are two activities that cybercriminals can perform using malware? (Choose two.)</p><p>Select one or more:</p><p>Extort money</p><p>Steal intellectual property</p><p>Damage physical ports</p><p>Trigger a high availability (HA) failover</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 8/11</p><p>Question 32</p><p>Correct</p><p>1 points out of 1</p><p>Question 33</p><p>Correct</p><p>1 points out of 1</p><p>Question 34</p><p>Correct</p><p>1 points out of 1</p><p>Question 35</p><p>Correct</p><p>1 points out of 1</p><p>What are two reasons why organizations and individuals use web filtering? (Choose two.)</p><p>Select one or more:</p><p>To increase network bandwidth</p><p>To prevent network congestion</p><p>To preserve employee productivity</p><p>To enhance their users’ experience</p><p>When upgrading the FortiGate firmware, why is it important to follow the recommended upgrade path?</p><p>Select one:</p><p>It guarantees a faster upgrade process.</p><p>It minimizes the need for configuration backups.</p><p>It ensures the compatibility and stability of the device.</p><p>It provides access to new major features.</p><p>What protocol is used to dynamically create IPSec VPN tunnels?</p><p>Select one:</p><p>Point-to-Point Tunneling Protocol (PPTP)</p><p>Internet Key Exchange Version 2 (IKEv2)</p><p>Generic Route Encapsulation (GRE)</p><p>Layer 2 Tunneling Protocol (L2TP)</p><p>What is the security rating in the Fortinet Security Fabric, and how is it calculated?</p><p>Select one:</p><p>It is a numerical value based on device settings and best practices.</p><p>It is calculated based on the number of security logs generated.</p><p>It represents the current level of network performance.</p><p>It indicates the level of compatibility with third-party devices.</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 9/11</p><p>Question 36</p><p>Correct</p><p>1 points out of 1</p><p>Question 37</p><p>Correct</p><p>1 points out of 1</p><p>Question 38</p><p>Correct</p><p>1 points out of 1</p><p>Question 39</p><p>Correct</p><p>1 points out of 1</p><p>Why is it recommended that you use user groups instead of individual user accounts in a firewall policy?</p><p>Select one:</p><p>User groups simplify the firewall configuration.</p><p>User groups contain all individual user accounts by default.</p><p>User groups provide stronger encryption for authentication.</p><p>User groups make it easier to monitor authenticated users.</p><p>What is the key difference between Secure Sockets Layer (SSL) certificate inspection and SSL deep inspection?</p><p>Select one:</p><p>SSL certificate inspection requires a trusted certificate authority (CA), while SSL deep inspection uses the FortiGate CA certificate.</p><p>SSL certificate inspection introduces certificate errors, while SSL deep inspection prevents certificate warnings.</p><p>SSL certificate inspection decrypts and inspects encrypted content, while SSL deep inspection verifies the identity of the web server.</p><p>SSL certificate inspection applies to only HTTPS traffic, while SSL deep inspection applies to multiple SSL-encrypted protocols.</p><p>Which scan technique detects known malware by matching signatures in the FortiGuard Labs database?</p><p>Select one:</p><p>Machine learning (ML)/artificial intelligence (AI) scan</p><p>Antivirus scan</p><p>Grayware scan</p><p>Behavioral analysis scan</p><p>Why is Secure Socket Layer (SSL) inspection necessary for the intrusion prevention system (IPS) to detect threats in encrypted traffic?</p><p>Select one:</p><p>Without SSL inspection, encrypted traffic is automatically blocked by the IPS.</p><p>SSL inspection allows the IPS to detect and analyze encrypted threats.</p><p>The IPS engine can inspect only legacy encryption algorithms, by default.</p><p>SSL inspection improves network performance by bypassing encrypted traffic.</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 10/11</p><p>Question 40</p><p>Correct</p><p>1 points out of 1</p><p>Why is it important to back up FortiGate system configurations regularly?</p><p>Select one:</p><p>To save time and effort in case of a hardware failure</p><p>To avoid errors while upgrading FortiOS</p><p>To ensure optimal performance of FortiGate</p><p>To prevent unexpected configuration changes</p><p>09/10/2024, 12:32 FortiGate 7.4 Operator Exam: Attempt review</p><p>https://training.fortinet.com/mod/quiz/review.php?attempt=20262253&cmid=485066 11/11</p>