Free FCP_FGT_AD-7.4 Exam Braindumps (page: 5)

Page 4 of 23

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.
Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)

  1. Allow & Warning
  2. Trust & Allow
  3. Allow
  4. Block & Warning
  5. Block

Answer(s): A,D,E

Explanation:

When FortiGate performs SSL/SSH full inspection and detects an invalid certificate, there are three valid actions it can take:
Allow & Warning: This action allows the session but generates a warning. Block & Warning: This action blocks the session and generates a warning. Block: This action blocks the session without generating a warning. Actions such as "Trust & Allow" or just "Allow" without additional configurations are not applicable in the context of handling invalid certificates.


Reference:

FortiOS 7.4.1 Administration Guide: Configuring SSL/SSH inspection profile



Refer to the exhibit, which shows the IPS sensor configuration.



If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)

  1. The sensor will gather a packet log for all matched traffic.
  2. The sensor will reset all connections that match these signatures.
  3. The sensor will allow attackers matching the Microsoft.Windows.iSCSl.Target.DoS signature.
  4. The sensor will block all attacks aimed at Windows servers.

Answer(s): A,C

Explanation:

The IPS sensor configuration shows that:
The Microsoft.Windows.iSCSI.Target.DoS signature is set to "Monitor" with packet logging enabled, meaning that while traffic matching this signature will be allowed, it will also be logged for further analysis.
The generic Windows filter is set to "Block," meaning that all other attacks matching this filter will be blocked. However, the sensor will not reset connections or log packets unless specified. Therefore, the sensor will allow attackers matching the specific DoS signature while blocking other attacks against Windows.


Reference:

FortiOS 7.4.1 Administration Guide: IPS Configuration



Which statement is a characteristic of automation stitches?

  1. They can be run only on devices in the Security Fabric.
  2. They can be created only on downstream devices in the fabric.
  3. They can have one or more triggers.
  4. They can run multiple actions at the same time.

Answer(s): C

Explanation:

Automation stitches on FortiGate can have one or more triggers, which are conditions or events that activate the automation stitch. The trigger defines when the automation stitch should execute the defined actions. Actions within a stitch can be executed sequentially or in parallel, depending on the configuration.


Reference:

FortiOS 7.4.1 Administration Guide: Automation Stitches



What is the primary FortiGate election process when the HA override setting is disabled?

  1. Connected monitored ports > Priority > System uptime > FortiGate serial number
  2. Connected monitored ports > System uptime > Priority > FortiGate serial number
  3. Connected monitored ports > Priority > HA uptime > FortiGate serial number
  4. Connected monitored ports > HA uptime > Priority > FortiGate serial number

Answer(s): C

Explanation:

When the HA override setting is disabled, FortiGate uses the primary election process based on the following criteria:
Connected monitored ports: The unit with the most monitored ports up is preferred. Priority: The unit with the highest priority is preferred. System uptime: The unit with the longest uptime is preferred. FortiGate serial number: Used as the final criterion to break any remaining ties.


Reference:

FortiOS 7.4.1 Administration Guide: HA election process






Post your Comments and Discuss Fortinet FCP_FGT_AD-7.4 exam with other Community members:

FCP_FGT_AD-7.4 Discussions & Posts