Logo Passei Direto

pdfcoffee com_fortigate-74-operator-exam-attempt-review-3-pdf-free

User badge image
Juan Carlos

en

Herramientas de estudio

Preguntas resueltas

Material
¡Estudia con miles de materiales!

Preguntas resueltas

Vista previa del material en texto

FCA - FortiGate 7.4 Operator Self-Paced
Question 1
Incorrect
0 points out of 1
Question 2
Incorrect
0 points out of 1
Started on Friday, October 6, 2023, 11:49 AM
State Finished
Completed on Friday, October 6, 2023, 1:40 PM
Time taken 1 hour 50 mins
Points 31/40
Grade 78 out of 100
Feedback Congratulations, you passed!
Which two steps are involved in configuring web filtering based on FortiGuard category filters? (Choose two.)
Select one or more:
Apply the web filter security profile to the appropriate firewall policy.
Identify the specific websites to be blocked or allowed.
Upgrade FortiOS to obtain the latest database from FortiGuard.
Create a web filtering security profile using FortiGuard category-based filters.
How can you modify the security settings of a VPN tunnel created from a template in FortiGate?
Select one:
Convert the template to a custom tunnel
Choose a different template for the tunnel
Use the custom tunnel creation option
Edit the template directly
https://training.fortinet.com/course/view.php?id=39326
https://training.fortinet.com/course/view.php?id=39326
Question 3
Correct
1 points out of 1
Question 4
Incorrect
0 points out of 1
Question 5
Incorrect
0 points out of 1
How are websites filtered using FortiGuard category filters?
Select one:
By scanning the website for malware in real time
By blocking access based on the website content
By examining the HTTP headers from the website
By denying access based on the website IP address
To avoid certificate errors, which field settings must be included in a Secure Sockets Layer (SSL) certificate issued by a certificate
authority (CA)?
Select one:
issuer: C=US, O=Fortinet, CN=Verisign
signatureAlgorithm: SHA256withRSA and validityPeriod: 365 days
subjectAltName: DNS:*.example.com and extendedKeyUsage: serverAuth
basicConstraints: CA:TRUE and keyUsage: keyCertSign
Why is it recommended that you use user groups instead of individual user accounts in a firewall policy?
Select one:
User groups simplify the firewall configuration.
User groups contain all individual user accounts by default.
User groups make it easier to monitor authenticated users.
User groups provide stronger encryption for authentication.
Question 6
Correct
1 points out of 1
Question 7
Correct
1 points out of 1
Question 8
Correct
1 points out of 1
Which inspection mode examines traffic as a whole before determining an action?
Select one:
Proxy-based inspection
Flow-based inspection
Application-level inspection
Stateful inspection
What is the recommended process to configure FortiGate for remote authentication for user identification?
Select one:
Create a user account, configure a firewall policy with the user account as the source, and verify the configuration using
logs.
Create a user group and configure a firewall policy with the group as the source.
Connect FortiGate to a remote authentication server and configure its IP addresses as the source.
Create a user group, map authenticated remote users to the group, and configure a firewall policy with the user group
as the source.
What are two reasons why FortiGate Secure Socket Layer Virtual Private Network (SSL VPN) is considered cost-effective
compared to other vendors? (Choose two.)
Select one or more:
Because it provides full network access to remote users.
Because it supports a limited number of third-party applications.
Because it does not require an additional license.
Because the number of remote users is determined by the model.
Question 9
Correct
1 points out of 1
Question 10
Correct
1 points out of 1
Question 11
Correct
1 points out of 1
In addition to central processing unit (CPU) and memory usage, what are two other key performance parameters you should
monitor on FortiGate? (Choose two.)
Select one or more:
Number of days for licenses to expire
Number of SSL sessions
Number of active VPN tunnels
Number of local users and user groups
Which two additional features and settings can you apply to traffic after it is accepted by a firewall policy? (Choose two.)
Select one or more:
Antivirus scanning
User authentication
Application control
Packet filtering
How does FortiGate handle blocked websites in web filtering using FortiGuard category filters?
Select one:
Users receive a warning message but can choose to continue accessing the website.
Users are redirected to a replacement message indicating the website is blocked.
Users are allowed to access the website, but their activity is recorded in the FortiGate logs.
Users are prompted to provide a valid username and password for access.
Question 12
Correct
1 points out of 1
Question 13
Correct
1 points out of 1
Question 14
Incorrect
0 points out of 1
How do you configure an internet service as the destination in a firewall policy?
Select one:
Choose the IP subnet of the service.
Configure the service with a virtual IP.
Select the service from the ISDB.
Specify the MAC address of the service.
What causes a web browser to display a certificate warning when using Secure Sockets Layer (SSL) deep inspection with the
FortiGate CA certificate?
Select one:
The browser does not support SSL deep inspection.
FortiGate is using a CA that is not trusted by the web browser.
The temporary certificate makes FortiGate behave like a man-in-the-middle (MITM) attack.
FortiGate is unable to decrypt the SSL-encrypted traffic.
What is the potential security risk associated with Hypertext Transfer Protocol Secure (HTTPS)?
Select one:
Incompatibility with certain web browsers
Increased network latency
Encrypted malicious traffic
Certificate errors during SSL handshake
Question 15
Correct
1 points out of 1
Question 16
Correct
1 points out of 1
Question 17
Correct
1 points out of 1
Which two protocols can you use for administrative access on a FortiGate interface?
Select one:
Hypertext Transfer Protocol Secure (HTTPS) and Secure Shell (SSH)
Telnet and Simple Network Management Protocol (SNMP)
Simple Mail Transfer Protocol (SMTP) and Secure Sockets Layer (SSL)
Remote Desktop Protocol (RDP) and Hypertext Transfer Protocol (HTTP)
What are some of the features provided by IPSec VPNs?
Select one:
Data authentication and data integrity
Bandwidth optimization and antireplay protection
Data encryption and load balancing
Network segmentation and packet inspection
Which two items should you configure as the source of a firewall policy, to allow all internal users in a small office to access the
internet? (Choose two.)
Select one or more:
The IP subnet of the LAN
Users or user groups
Application signatures
Security profiles
Question 18
Correct
1 points out of 1
Question 19
Correct
1 points out of 1
Question 20
Incorrect
0 points out of 1
What are two benefits of performing regular maintenance on FortiGate firewalls? (Choose two.)
Select one or more:
Minimize costs during upgrades.
Meet compliance and legal requirements.
Prevent security breaches in your organization.
Ensure you have the latest hardware.
What is a scenario where automation is used in the Fortinet Security Fabric?
Select one:
Automatically quarantining a computer with malicious activity
Assigning security ratings to newly added devices
Generating weekly reports for management review
Monitoring disk space utilization on FortiAnalyzer
How does the FortiGate intrusion prevention system (IPS) use signatures to detect malicious traffic?
Select one:
By decrypting Secure Sockets Layer (SSL)-encrypted traffic
By blocking all network traffic
By comparing network packets to known threats
By monitoring user activity on websites
Question 21
Correct
1 points out of 1
Question 22
Correct
1 points out of 1
Question 23
Correct
1 points out of 1
You need to examine the logs related to local users watching YouTube videos. Where can you find those logs?
Select one:
Log and Report > Security Events > WebFilter
Log and Report > Security Events > Antivirus
Log and Report > Security Events > Intrusion Prevention
Log and Report> Security Events > Application Control
What is a characteristic of a firewall policy used to allow the traffic from Secure Socket Layer Virtual Private Network (SSL VPN)
connections?
Select one:
It assigns SSL certificates to user groups trying to connect.
It defines the port number used for the SSL VPN portal.
It uses a virtual tunnel interface in the source field.
It encapsulates the traffic using the VPN settings configured.
What is the security rating in the Fortinet Security Fabric, and how is it calculated?
Select one:
It indicates the level of compatibility with third-party devices.
It represents the current level of network performance.
It is calculated based on the number of security logs generated.
It is a numerical value based on device settings and best practices.
Question 24
Correct
1 points out of 1
Question 25
Correct
1 points out of 1
Question 26
Incorrect
0 points out of 1
What protocol is used to dynamically create IPSec VPN tunnels?
Select one:
Generic Route Encapsulation (GRE)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Internet Key Exchange Version 2 (IKEv2)
What is the key difference between Secure Sockets Layer (SSL) certificate inspection and SSL deep inspection?
Select one:
SSL certificate inspection requires a trusted certificate authority (CA), while SSL deep inspection uses the FortiGate CA
certificate.
SSL certificate inspection decrypts and inspects encrypted content, while SSL deep inspection verifies the identity of the
web server.
SSL certificate inspection applies to only HTTPS traffic, while SSL deep inspection applies to multiple SSL-encrypted
protocols.
SSL certificate inspection introduces certificate errors, while SSL deep inspection prevents certificate warnings.
Which scan technique detects known malware by matching signatures in the FortiGuard Labs database?
Select one:
Behavioral analysis scan
Machine learning (ML)/artificial intelligence (AI) scan
Grayware scan
Antivirus scan
Question 27
Incorrect
0 points out of 1
Question 28
Incorrect
0 points out of 1
Question 29
Correct
1 points out of 1
Which two criteria can be matched in the Source field of a firewall policy?
Select one:
Interface and service type
Address group and hostname
IP address and user
MAC address and domain name
What are two consequences of allowing a FortiGate license to expire? (Choose two.)
Select one or more:
Inability to monitor system logs and generate network reports
Disruption of network services and potential legal issues
Reduced FortiGate performance and increased vulnerability to security threats
Loss of access to software updates and technical support
How does FortiGate intrusion prevention system (IPS) detect anomalous traffic patterns that do not conform to established
protocol requirements and standards?
Select one:
By decrypting network packets
By using protocol decoders
By monitoring user behavior
By analyzing Secure Sockets Layer (SSL) certificates
Question 30
Correct
1 points out of 1
Question 31
Correct
1 points out of 1
Question 32
Correct
1 points out of 1
Which two options can you use for centralized logging when you configure the Fortinet Security Fabric? (Choose two.)
Select one or more:
FortiAnalyzer
Syslog server
FortiSOAR
FortiGate Cloud
Which piece of information does FortiGate know about the user without firewall authentication?
Select one:
The originating domain name
The source IP address
The user login name
The application being used
Which condition could prevent a configured route from being added to the FortiGate routing table?
Select one:
The DHCP server associated with the route being disabled
The presence of a better route for the same destination
The incorrect distance being set for the default gateway IP address
The absence of administrative access protocols on the interface
Question 33
Correct
1 points out of 1
Question 34
Correct
1 points out of 1
Question 35
Correct
1 points out of 1
What are the three key categories of services provided by FortiGuard Labs?
Select one:
Artificial intelligence, real-time threat protection, and outbreak alerts
Data encryption, network segmentation, and access control
Machine learning, antivirus, and network monitoring
Threat hunting, intrusion detection, and firewall management
How does an IPS protect networks from threats?
Select one:
By blocking all incoming network traffic from new sources
By analyzing traffic and identifying potential threats
By allowing only secure access to network resources
By encrypting all network traffic from untrusted IP addresses
What are two activities that cybercriminals can perform using malware? (Choose two.)
Select one or more:
Steal intellectual property
Extort money
Trigger a high availability (HA) failover
Damage physical ports
Question 36
Correct
1 points out of 1
Question 37
Correct
1 points out of 1
Question 38
Correct
1 points out of 1
Which actions can you apply to application categories in the Application Control profile?
Select one:
Monitor, allow, block, or quarantine
Monitor, optimize, redirect, or shape
Allow, encrypt, compress, or redirect
Authenticate, log, encrypt, or back up
Which two settings are included in a Dynamic Host Configuration Protocol (DHCP) server configuration on FortiGate? (Choose
two.)
Select one or more:
Address range
Default gateway
Interface Alias
Subnet object
Which inspection mode processes and forwards each packet, without waiting for the complete file or web page?
Select one:
Stateful inspection
Application-level inspection
Proxy-based inspection
Flow-based inspection
Question 39
Correct
1 points out of 1
Question 40
Correct
1 points out of 1
What is grayware?
Select one:
Known malware with existing signatures
Malicious files sent to the sandbox for inspection
Unsolicited programs installed without user consent
New and unknown malware variants
Which category of services does FortiGuard Labs provide as part of FortiGuard Security Services?
Select one:
Data encryption and secure communications
Network segmentation and access control
Advanced threat intelligence and prevention
Endpoint protection and vulnerability management