Free Fortinet NSE4_FGT-7.2 Exam Questions (page: 5)

Refer to the exhibits to view the firewall policy (Exhibit A) and the antivirus profile (Exhibit B).





Which statement is correct if a user is unable to receive a block replacement message when downloading an infected file for the first time?

  1. The firewall policy performs the full content inspection on the file.
  2. The flow-based inspection is used, which resets the last packet to the user.
  3. The volume of traffic being inspected is too high for this model of FortiGate.
  4. The intrusion prevention security profile needs to be enabled when using flow-based inspection mode.

Answer(s): B

Explanation:

· "ONLY" If the virus is detected at the "START" of the connection, the IPS engine sends the block replacement message immediately
· When a virus is detected on a TCP session (FIRST TIME), but where "SOME PACKETS" have been already forwarded to the receiver, FortiGate "resets the connection" and does not send the last piece of the file. Although the receiver got most of the file content, the file has been truncated and therefore, can't be opened. The IPS engine also caches the URL of the infected file, so that if a "SECOND ATTEMPT" to transmit the file is made, the IPS engine will then send a block replacement message to the client instead of scanning the file again. In flow mode, the FortiGate drops the last packet killing the file. But because of that the block replacement message cannot be displayed. If the file is attempted to download again the block message will be shown.



A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.
* All traffic must be routed through the primary tunnel when both tunnels are up
* The secondary tunnel must be used only if the primary tunnel goes down
* In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover Which two key configuration changes are needed on FortiGate to meet the design requirements? (Choose two,)

  1. Configure a high distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.
  2. Enable Dead Peer Detection.
  3. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.
  4. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.

Answer(s): B,C

Explanation:

Study Guide ­ IPsec VPN ­ IPsec configuration ­ Phase 1 Network.

When Dead Peer Detection (DPD) is enabled, DPD probes are sent to detect a failed tunnel and bring it down before its IPsec SAs expire. This failure detection mechanism is very useful when you have redundant paths to the same destination, and you want to failover to a backup connection when the primary connection fails to keep the connectivity between the sites up. There are three DPD modes. On demand is the default mode.

Study Guide ­ IPsec VPN ­ Redundant VPNs.

Add one phase 1 configuration for each tunnel. DPD should be enabled on both ends.

Add at least one phase 2 definition for each phase 1.

Add one static route for each path. Use distance or priority to select primary routes over backup routes (routes for the primary VPN must have a lower distance or lower priority than the backup).
Alternatively, use dynamic routing.

Configure FW policies for each IPsec interface.



Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?

  1. Antivirus engine
  2. Intrusion prevention system engine
  3. Flow engine
  4. Detection engine

Answer(s): B

Explanation:

http://docs.fortinet.com/document/fortigate/6.0.0/handbook/240599/application-control


Reference:

http://docs.fortinet.com/document/fortigate/6.0.0/handbook/240599/application- control



Refer to the exhibit.



Given the interfaces shown in the exhibit. which two statements are true? (Choose two.)

  1. Traffic between port2 and port2-vlan1 is allowed by default.
  2. port1-vlan10 and port2-vlan10 are part of the same broadcast domain.
  3. port1 is a native VLAN.
  4. port1-vlan and port2-vlan1 can be assigned in the same VDOM or to different VDOMs.

Answer(s): C,D

Explanation:

https://community.fortinet.com/t5/FortiGate/Technical-Tip-rules-about-VLAN-configuration-and- VDOM-interf https://kb.fortinet.com/kb/viewContent.do?externalId=FD30883



Viewing page 5 of 45



Post your Comments and Discuss Fortinet NSE4_FGT-7.2 exam prep with other Community members:

NSE4_FGT-7.2 Exam Discussions & Posts