Free NSE7_PBC-7.2 Exam Braindumps (page: 2)

Page 1 of 8

When configuring the FortiCASB policy, which three configuration options are available? (Choose three.)

  1. Intrusion prevention policies
  2. Threat protection policies
  3. Data loss prevention policies
  4. Compliance policies
  5. Antivirus policies

Answer(s): B,C,D

Explanation:

Policy setting allows you to configure each policy to fit the need of your usage. You can select any type of Policy (Data Analysis, Threat Protection or Compliance) https://docs.fortinet.com/document/forticasb/20.1.0/online-help/482958/policy-configuration



You have been tasked with deploying FortiGate VMs in a highly available topology on the Amazon Web Services (AWS) cloud. The requirements for your deployment are as follows:

- You must deploy two FortiGate VMs in a single virtual private cloud (VPC), with an external elastic load balancer which will distribute ingress traffic from the internet to both FortiGate VMs in an active-active topology.

- Each FortiGate VM must have two elastic network interfaces: one will connect to a public subnet and other will connect to a private subnet.
- To maintain high availability, you must deploy the FortiGate VMs in two different availability zones.

How many public and private subnets will you need to configure within the VPC?

  1. One public subnet and two private subnets
  2. Two public subnets and one private subnet
  3. Two public subnets and two private subnets
  4. One public subnet and one private subnet

Answer(s): C

Explanation:

https://github.com/fortinet/aws-cloudformation-templates/blob/master/LambdaAA- RouteFailover/6.0/README.md https://github.com/fortinet/aws-cloudformation-templates/tree/master/LambdaAA- RouteFailover/6.0



You are deploying Amazon Web Services (AWS) GuardDuty to monitor malicious or unauthorized behaviors related to AWS resources. You will also use the Fortinet aws-lambda-guardduty script to translate feeds from AWS GuardDuty findings into a list of malicious IP addresses. FortiGate can then consume this list as an external threat feed.

Which Amazon AWS services must you subscribe to in order to use this feature?

  1. GuardDuty, CloudWatch, S3, Inspector, WAF, and Shield.
  2. GuardDuty, CloudWatch, S3, and DynamoD
  3. Inspector, Shield, GuardDuty, S3, and DynamoDB.
  4. WAF, Shield, GuardDuty, S3, and DynamoDB.

Answer(s): B

Explanation:

You must subscribe to GuardDuty, CloudWatch, S3, and DynamoDB. https://docs.fortinet.com/document/fortigate-public-cloud/6.4.0/aws-administration- guide/908646/populating-threat-feeds-with-guardduty



Refer to the exhibit.



A customer has deployed an environment in Amazon Web Services (AWS) and is now trying to send outbound traffic from the Web servers to the Internet. The FortiGate policies are configured to allow all outbound traffic; however, the traffic is not reaching the FortiGate internal interface.

What are two possible reasons for this behavior? (Choose two.)

  1. The web servers are not configured with the default gateway.
  2. The Internet gateway (IGW) is not added to VPC (virtual private cloud).
  3. AWS source and destination checks are enabled on the FortiGate interfaces.
  4. AWS security groups may be blocking the traffic.

Answer(s): C,D

Explanation:

You need to check if source/destination are enabled. Public_Cloud_6.4_Study_Guide Page 67






Post your Comments and Discuss Fortinet NSE7_PBC-7.2 exam with other Community members:

NSE7_PBC-7.2 Discussions & Posts