Logo Passei Direto
Buscar
LiveAo vivo
Material
páginas com resultados encontrados.
páginas com resultados encontrados.
left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

Prévia do material em texto

<p>FCA - FortiGate 7.4 Operator Self-Paced</p><p>Started on Wednesday, October 9, 2024, 9:17 PM</p><p>State Finished</p><p>Completed on Wednesday, October 9, 2024, 9:50 PM</p><p>Time taken 32 mins 51 secs</p><p>Points 34/40</p><p>Grade 84 out of 100</p><p>Feedback Congratulations, you passed!</p><p>Question 1</p><p>Correct</p><p>1 points out of 1</p><p>Question 2</p><p>Correct</p><p>1 points out of 1</p><p>Question 3</p><p>Correct</p><p>1 points out of 1</p><p>Question 4</p><p>Correct</p><p>1 points out of 1</p><p>How do you configure an internet service as the destination in a firewall policy?</p><p>Select one:</p><p>Specify the MAC address of the service.</p><p>Choose the IP subnet of the service.</p><p>Select the service from the ISDB.</p><p>Configure the service with a virtual IP.</p><p>What is the main advantage of using Secure Socket Layer Virtual Private Network (SSL VPN) in web mode?</p><p>Select one:</p><p>Access to all network resources for remote users</p><p>Support for a wide range of applications and protocols</p><p>Ability to perform client integrity checks</p><p>No need to install client software</p><p>To avoid certificate errors, which field settings must be included in a Secure Sockets Layer (SSL) certificate issued by a certificate authority (CA)?</p><p>Select one:</p><p>basicConstraints: CA:TRUE and keyUsage: keyCertSign</p><p>signatureAlgorithm: SHA256withRSA and validityPeriod: 365 days</p><p>subjectAltName: DNS:*.example.com and extendedKeyUsage: serverAuth</p><p>issuer: C=US, O=Fortinet, CN=Verisign</p><p>What is the potential security risk associated with Hypertext Transfer Protocol Secure (HTTPS)?</p><p>Select one:</p><p>Question 5</p><p>Correct</p><p>1 points out of 1</p><p>Question 6</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 7</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 8</p><p>Correct</p><p>1 points out of 1</p><p>Select one:</p><p>Increased network latency</p><p>Incompatibility with certain web browsers</p><p>Encrypted malicious traffic</p><p>Certificate errors during SSL handshake</p><p>Which two options can you use for centralized logging when you configure the Fortinet Security Fabric? (Choose two.)</p><p>Select one or more:</p><p>FortiAnalyzer</p><p>Syslog server</p><p>FortiGate Cloud</p><p>FortiSOAR</p><p>What are the three key categories of services provided by FortiGuard Labs?</p><p>Select one:</p><p>Artificial intelligence, real-time threat protection, and outbreak alerts</p><p>Threat hunting, intrusion detection, and firewall management</p><p>Data encryption, network segmentation, and access control</p><p>Machine learning, antivirus, and network monitoring</p><p>How does FortiGate intrusion prevention system (IPS) detect anomalous traffic patterns that do not conform to established protocol</p><p>requirements and standards?</p><p>Select one:</p><p>By decrypting network packets</p><p>By using protocol decoders</p><p>By analyzing Secure Sockets Layer (SSL) certificates</p><p>By monitoring user behavior</p><p>What are two reasons why organizations and individuals use web filtering? (Choose two.)</p><p>Select one or more:</p><p>To preserve employee productivity</p><p>Question 9</p><p>Correct</p><p>1 points out of 1</p><p>Question 10</p><p>Correct</p><p>1 points out of 1</p><p>Question 11</p><p>Correct</p><p>1 points out of 1</p><p>Question 12</p><p>Correct</p><p>1 points out of 1</p><p>To prevent network congestion</p><p>To increase network bandwidth</p><p>To enhance their users’ experience</p><p>Why is it recommended that you use user groups instead of individual user accounts in a firewall policy?</p><p>Select one:</p><p>User groups simplify the firewall configuration.</p><p>User groups make it easier to monitor authenticated users.</p><p>User groups provide stronger encryption for authentication.</p><p>User groups contain all individual user accounts by default.</p><p>How are websites filtered using FortiGuard category filters?</p><p>Select one:</p><p>By blocking access based on the website content</p><p>By examining the HTTP headers from the website</p><p>By scanning the website for malware in real time</p><p>By denying access based on the website IP address</p><p>What functionality does FortiGate provide to establish secure connections between a main office and its remote branches, over the internet?</p><p>Select one:</p><p>Virtual private networks</p><p>Security scanning</p><p>Monitoring and logging</p><p>Firewall authentication</p><p>Why is it important to back up FortiGate system configurations regularly?</p><p>Select one:</p><p>To ensure optimal performance of FortiGate</p><p>To avoid errors while upgrading FortiOS</p><p>To prevent unexpected configuration changes</p><p>Question 13</p><p>Correct</p><p>1 points out of 1</p><p>Question 14</p><p>Partially correct</p><p>1 points out of 1</p><p>Question 15</p><p>Correct</p><p>1 points out of 1</p><p>Question 16</p><p>Correct</p><p>1 points out of 1</p><p>To save time and effort in case of a hardware failure</p><p>How does an IPS protect networks from threats?</p><p>Select one:</p><p>By analyzing traffic and identifying potential threats</p><p>By encrypting all network traffic from untrusted IP addresses</p><p>By blocking all incoming network traffic from new sources</p><p>By allowing only secure access to network resources</p><p>In addition to central processing unit (CPU) and memory usage, what are two other key performance parameters you should monitor on</p><p>FortiGate? (Choose two.)</p><p>Select one or more:</p><p>Number of local users and user groups</p><p>Number of SSL sessions</p><p>Number of active VPN tunnels</p><p>Number of days for licenses to expire</p><p>What is a characteristic of a firewall policy used to allow the traffic from Secure Socket Layer Virtual Private Network (SSL VPN) connections?</p><p>Select one:</p><p>It encapsulates the traffic using the VPN settings configured.</p><p>It uses a virtual tunnel interface in the source field.</p><p>It assigns SSL certificates to user groups trying to connect.</p><p>It defines the port number used for the SSL VPN portal.</p><p>What is the purpose of firewall policies on FortiGate?</p><p>Select one:</p><p>To encrypt network traffic</p><p>To block all incoming traffic</p><p>To control network traffic</p><p>To monitor network traffic</p><p>Question 17</p><p>Correct</p><p>1 points out of 1</p><p>Question 18</p><p>Correct</p><p>1 points out of 1</p><p>Question 19</p><p>Correct</p><p>1 points out of 1</p><p>Question 20</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 21</p><p>Which category of services does FortiGuard Labs provide as part of FortiGuard Security Services?</p><p>Select one:</p><p>Endpoint protection and vulnerability management</p><p>Advanced threat intelligence and prevention</p><p>Data encryption and secure communications</p><p>Network segmentation and access control</p><p>How can you modify the security settings of a VPN tunnel created from a template in FortiGate?</p><p>Select one:</p><p>Convert the template to a custom tunnel</p><p>Edit the template directly</p><p>Use the custom tunnel creation option</p><p>Choose a different template for the tunnel</p><p>Which actions can you apply to application categories in the Application Control profile?</p><p>Select one:</p><p>Allow, encrypt, compress, or redirect</p><p>Monitor, allow, block, or quarantine</p><p>Monitor, optimize, redirect, or shape</p><p>Authenticate, log, encrypt, or back up</p><p>Which scan technique detects known malware by matching signatures in the FortiGuard Labs database?</p><p>Select one:</p><p>Antivirus scan</p><p>Behavioral analysis scan</p><p>Grayware scan</p><p>Machine learning (ML)/artificial intelligence (AI) scan</p><p>Correct</p><p>1 points out of 1</p><p>Question 22</p><p>Correct</p><p>1 points out of 1</p><p>Question 23</p><p>Correct</p><p>1 points out of 1</p><p>Question 24</p><p>Correct</p><p>1 points out of 1</p><p>Question 25</p><p>Correct</p><p>1 points out of 1</p><p>Excluding the steps for tuning the sensors, what is the last step involved in configuring IPS on FortiGate?</p><p>Select one:</p><p>Enabling SSL inspection for the traffic of interest</p><p>Applying the sensor to a firewall policy</p><p>Editing the sensor's signature and filters</p><p>Blocking malicious URLs and botnet command-and-control (C&C) traffic</p><p>Why is Secure Socket Layer (SSL) inspection necessary for the intrusion prevention system (IPS) to detect threats in encrypted traffic?</p><p>Select one:</p><p>SSL inspection improves network performance by bypassing encrypted traffic.</p><p>Without SSL inspection, encrypted traffic is automatically blocked by the IPS.</p><p>The IPS engine can inspect only legacy encryption algorithms, by default.</p><p>SSL inspection allows the IPS to detect and analyze encrypted threats.</p><p>When upgrading the FortiGate firmware, why is it important to follow the recommended upgrade path?</p><p>Select one:</p><p>It ensures the compatibility and stability of the device.</p><p>It provides access to new major features.</p><p>It minimizes the need for configuration backups.</p><p>It guarantees a faster upgrade process.</p><p>What are two</p><p>benefits of performing regular maintenance on FortiGate firewalls? (Choose two.)</p><p>Select one or more:</p><p>Prevent security breaches in your organization.</p><p>Ensure you have the latest hardware.</p><p>Minimize costs during upgrades.</p><p>Meet compliance and legal requirements.</p><p>Question 26</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 27</p><p>Correct</p><p>1 points out of 1</p><p>Question 28</p><p>Correct</p><p>1 points out of 1</p><p>Question 29</p><p>Correct</p><p>1 points out of 1</p><p>What is the recommended process to configure FortiGate for remote authentication for user identification?</p><p>Select one:</p><p>Create a user account, configure a firewall policy with the user account as the source, and verify the configuration using logs.</p><p>Connect FortiGate to a remote authentication server and configure its IP addresses as the source.</p><p>Create a user group, map authenticated remote users to the group, and configure a firewall policy with the user group as the source.</p><p>Create a user group and configure a firewall policy with the group as the source.</p><p>How does the FortiGate intrusion prevention system (IPS) use signatures to detect malicious traffic?</p><p>Select one:</p><p>By monitoring user activity on websites</p><p>By blocking all network traffic</p><p>By decrypting Secure Sockets Layer (SSL)-encrypted traffic</p><p>By comparing network packets to known threats</p><p>Which two settings are included in a Dynamic Host Configuration Protocol (DHCP) server configuration on FortiGate? (Choose two.)</p><p>Select one or more:</p><p>Default gateway</p><p>Subnet object</p><p>Address range</p><p>Interface Alias</p><p>Which two additional features and settings can you apply to traffic after it is accepted by a firewall policy? (Choose two.)</p><p>Select one or more:</p><p>Antivirus scanning</p><p>User authentication</p><p>Application control</p><p>Packet filtering</p><p>What are two consequences of allowing a FortiGate license to expire? (Choose two.)</p><p>Question 30</p><p>Correct</p><p>1 points out of 1</p><p>Question 31</p><p>Correct</p><p>1 points out of 1</p><p>Question 32</p><p>Correct</p><p>1 points out of 1</p><p>Question 33</p><p>Correct</p><p>1 points out of 1</p><p>Select one or more:</p><p>Loss of access to software updates and technical support</p><p>Disruption of network services and potential legal issues</p><p>Inability to monitor system logs and generate network reports</p><p>Reduced FortiGate performance and increased vulnerability to security threats</p><p>How does FortiGate application control address evasion techniques used by peer-to-peer protocols?</p><p>Select one:</p><p>By monitoring traffic for known patterns</p><p>By analyzing flow-based inspection</p><p>By examining a URL block list</p><p>By allowing traffic from only well-known ports.</p><p>How does FortiGate handle blocked websites in web filtering using FortiGuard category filters?</p><p>Select one:</p><p>Users are redirected to a replacement message indicating the website is blocked.</p><p>Users are prompted to provide a valid username and password for access.</p><p>Users are allowed to access the website, but their activity is recorded in the FortiGate logs.</p><p>Users receive a warning message but can choose to continue accessing the website.</p><p>You need to examine the logs related to local users watching YouTube videos. Where can you find those logs?</p><p>Select one:</p><p>Log and Report > Security Events > Intrusion Prevention</p><p>Log and Report > Security Events > Antivirus</p><p>Log and Report > Security Events > Application Control</p><p>Log and Report > Security Events > WebFilter</p><p>What is the purpose of creating a firewall address object?</p><p>Select one:</p><p>To match the source or destination IP subnet</p><p>Question 34</p><p>Correct</p><p>1 points out of 1</p><p>Question 35</p><p>Correct</p><p>1 points out of 1</p><p>Question 36</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 37</p><p>Correct</p><p>1 points out of 1</p><p>To define the action for a firewall policy</p><p>To specify the source and destination interfaces</p><p>To enable web filtering for a specific address</p><p>What are two activities that cybercriminals can perform using malware? (Choose two.)</p><p>Select one or more:</p><p>Steal intellectual property</p><p>Damage physical ports</p><p>Trigger a high availability (HA) failover</p><p>Extort money</p><p>Which inspection mode processes and forwards each packet, without waiting for the complete file or web page?</p><p>Select one:</p><p>Application-level inspection</p><p>Proxy-based inspection</p><p>Stateful inspection</p><p>Flow-based inspection</p><p>What are two reasons why FortiGate Secure Socket Layer Virtual Private Network (SSL VPN) is considered cost-effective compared to other</p><p>vendors? (Choose two.)</p><p>Select one or more:</p><p>Because the number of remote users is determined by the model.</p><p>Because it supports a limited number of third-party applications.</p><p>Because it does not require an additional license.</p><p>Because it provides full network access to remote users.</p><p>How can administrators track successful authentication attempts in FortiGate?</p><p>Select one:</p><p>By monitoring security events in real-time</p><p>By analyzing network traffic patterns</p><p>By reviewing the logs and dashboards</p><p>Question 38</p><p>Incorrect</p><p>0 points out of 1</p><p>Question 39</p><p>Correct</p><p>1 points out of 1</p><p>Question 40</p><p>Correct</p><p>1 points out of 1</p><p>By reviewing the logs and dashboards</p><p>By utilizing advanced threat intelligence feeds</p><p>Which two criteria can be matched in the Source field of a firewall policy?</p><p>Select one:</p><p>IP address and user</p><p>Address group and hostname</p><p>MAC address and domain name</p><p>Interface and service type</p><p>Which protocol is used for the authentication and encryption of the data in an IPSec VPN implementation?</p><p>Select one:</p><p>Transport Layer Security (TLS)</p><p>Secure Hash Algorithm (SHA)</p><p>Advanced Encryption Standard (AES)</p><p>Encapsulation Security Payload (ESP)</p><p>Which action can you take to improve the security rating provided by the Fortinet Security Fabric?</p><p>Select one:</p><p>Upgrade FortiGate to the latest mature version available.</p><p>Apply one or more of the suggested best practices.</p><p>Run the integrity check on all end devices.</p><p>Create a configuration revision or back up the configuration.</p>

Mais conteúdos dessa disciplina