NSE 4 7.2 Flashcards
(236 cards)
A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up.
Based on the phase 2 configuration shown in the exhibit, what configuration change will bring phase 2 up?
On HQ-FortiGate, sent Encryption to AES256.
The Encryption and authentication algorithm needs to match
Which three options are the remote log storage options you can configure on FortiGate? (Choose three.)
- FortiSIEM
- FortiCloud
- FortiAnalyzer
Fortisandbox is not a logging solution.
Fortigate Security 7.0 pf 279
Which two settings can be separately configured per VDOM on a FortiGate device? (Choose two.)
- Operating mode
- NGFW Mode
C: “Operating mode is per-VDOM setting. You can combine transparent mode VDOM’s with NAT mode VDOMs on the same physical Fortigate”.
D: “Inspection-mode selection has moved from VDOM to firewall policy, and the default inspection-mode is flow, so NGFW Mode can be changed from Profile-base (Default) to Policy-base directly in System > Settings from the VDOM”.
A and B are incorrect: “The firmware on your Fortigate and some settings, such as system time, apply to the entire device-they are not specific to each VDOM.
Review the Intrusion Prevention System (IPS) profile signature settings.
Which statement is correct in adding the FTP.Login.Failed signature to the IPS sensor profile?
Traffic matching the signature will be silently dropped and logged.
“pass” is only default action.
The Pass action on the specific signature would only be chosen, if the Action (on the top) was set to Default. But instead its set to Block, se the action is will be to block and drop.
Which two statements are correct regarding FortiGate FSSO agentless polling mode? (Choose two.)
- FortiGate uses the SMB protocol to retrieve the event viewer logs from the DCs.
- FortGate queries AD by using LDAP to retrieve user group information.
Fortigate Infrastructure 7.0 Study Guide P.257-258, 272-273
Which type of logs on FortiGate record information about traffic directly to and from the FortiGate management IP addresses?
Local traffic logs
FortiGate_Security 7.0 page 263
Fortigate Security 7.0 page 268
Which two inspection modes can you use to configure a firewall policy on a profile-based next-generation firewall (NGFW)? (Choose two.)
- Proxy-based inspection
- Flow-based inspection
Profile based - Flow or proxy based.
Policy based - flow only.
Fortigate Security 7.0 pg 368
An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel.
Which DPD mode on FortiGate will meet the above requirement?
On idle
Fortigate Infrastructure 7.0 Study Guide P.214
Fortigate Infrastructure 7.0 Study Guide P.228
The exhibit shows the IPS sensor configuration.
If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)
- The sensor will allow attackers matching the NTP.Spoofed.KoD.DoS signature.
- The sensor will block all attacks aimed at Windows servers.
An admin has configured an SLA, which failed to generate any traffic.
Why is FortiGate not sending probes to 4.2.2.2 and 4.2.2.1 servers? (Choose two.)
- Admin didn’t configure a gateway for the SD-WAN members, or configured gateway is not valid.
- The Enable probe packets setting is not enabled.
Which two statements about the debug flow output are correct? (Choose two.)
- The debug flow is of ICMP traffic.
- A new traffic session is created.
The client is pinging the GW in the same subnet, son firewall policy is needed to allow such communication.
Proto 1 is icmp.
Obviously a new session was created. The ping is being sent to the gateway from a local device so no policy is needed. “gw-10.0.1.250 via root”
Fortigate Infrastructure 7.0 pg 358-360
Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?
Intrusion prevention system engine
The Root and To_Internet VDOMs are configured in NAT mode. The DMZ and Local VDOMs are configured in transparent mode.
The Root VDOM is the management VDOM. The To_Internet VDOM allows LAN users to access the Internet. The To_Internet VDOM is the only VDOM with internet access and is directly connected to ISP modem.
Which two statements are true? (Choose two.)
- Inter-VDOM links are required to allow traffic between the Local and Root VDOMs.
- Inter-VDOM links are required on the To-Internet VDOM to allow LAN users to access the Internet.
An administrator does not want to report the logon events of service accounts to FortiGate.
What setting on the collector agent is required to achieve this?
Add user accounts to the Ignore User list.
FortiGate_Infrastructure_7.0 page 278
FortiGate_Infrastructure_7.0 page 290
FortiGuard categories can be overridden and defined in different categories. To create a web rating override for example.com home page, the override must be configured using a specific syntax.
Which two syntaxes are correct to configure web rating for the home page? (Choose two.)
www.example.com
example.com
When using FortiGuard category filtering to allow or block access to a website, one option is to make a web rating override and define the website in a different category. Web ratings are only for host names— “no URLs or wildcard characters are allowed”.
Fortigate Security 7.0 pg 384
Which statement about the policy ID number of a firewall policy is true?
It is required to modify a firewall policy using the CLI.
How does FortiGate act when using SSL VPN in web mode?
FortiGate acts as an HTTP reverse proxy.
Fortigate security 7.0 Page 583
The exhibits show the SSL, auth policy, and security policy for FB
Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other types of posts.
Which part of the policy configuration must you change to resolve the issue?
The SSL inspection needs to be a deep content inspection.
The lock logo behind Facebook_like.Button indicates that SSL Deep Inspection is Required.
Alle other Application Signatures Facebook and Facebook_Video. Play does not require SSL inspection. Hence that the users can play video content. If you look up the Application Signature for Facebook_like.Button it will say “Requires SSL Deep Inspection”.
Padlock = requires SSL Deep Inspection.
Which statement is correct regarding the inspection of some of the services available by web applications embedded in third-party websites?
FortiGate can inspect sub-application traffic regardless of where it was originated.
https://help.fortinet.com/fortiproxy/11/Content/Admin%20Guides/FPX-AdminGuide/300_System/303d_FortiGuard.htm
Which two statements about SSL VPN between two FortiGate devices are true? (Choose two.)
- The client FortiGate uses the SSL VPN tunnel interface type to connect SSL VPN.
- Server FortiGate requires a CA certificate to verify client FortiGate certificate.
A network administrator has enabled SSL certificate inspection and antivirus on FortiGate. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and the file can be downloaded.
What is the reason for the failed virus detection by FortiGate?
SSL/SSH Inspection profile is incorrect.
An administrator is configuring an Ipsec between site A and siteB. The Remotes Gateway setting in both sites has been configured as Static IP Address. For site
A, the local quick mode selector is 192.16.1.0/24 and the remote quick mode selector is 192.16.2.0/24.
How must the administrator configure the local quick mode selector for site B?
192.16.2.0/24
FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy.
Which two other security profiles can you apply to the security policy? (Choose two.)
- Antivirus scanning
- Intrusion prevention
Security policy: If the traffic is allowed as per the consolidated policy, FortiGate will then process it based on the security policy to analyze additional criteria, such as URL categories for web filtering and application control. Also, if enabled, the security policy further inspects traffic using security profiles such as IPS and AV.
Fortigate security 7.0 Page 451
Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)
- The subject field in the server certificate
- The server name indication (SNI) extension in the client hello message
- The Subject Alternative Name (SAN) field in the server certificate
Fortigate firtsly uses SNI, if there is no SNI it uses Subject or Subject Alternatives.
FortiGate_Security_7.0 Study Guide .pdf page 326