Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet Certified Professional Network Security FCSS_EFW_AD-7.6 Questions and answers with Dumpstech

Exam FCSS_EFW_AD-7.6 Premium Access

View all detail and faqs for the FCSS_EFW_AD-7.6 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit, which contains the partial output of an OSPF command.

Question # 1

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

What two conclusions can the administrator draw? (Choose two.)

Options:

A.

The FortiGate device is a backup designated router

B.

The FortiGate device is connected to multiple areas

C.

The FortiGate device injects external routing information

D.

The FortiGate device has OSPF ECMP enabled

Questions # 2:

What is the initial step performed by FortiGate when handling the first packets of a session?

Options:

A.

Installation of the session key in the network processor (NP)

B.

Data encryption and decryption

C.

Security inspections such as ACL, HPE, and IP integrity header checking

D.

Offloading the packets directly to the content processor (CP)

Questions # 3:

Refer to the exhibit.

A pre-run CLI template that is used in zero-touch provisioning (ZTP) and low-touch provisioning (LTP) with FortiManager is shown.

Question # 3

The template is not assigned even though the configuration has already been installed on FortiGate.

What is true about this scenario?

Options:

A.

The administrator did not assign the template correctly when adding the model device because pre-CLI templates remain permanently assigned to the firewall

B.

Pre-run CLI templates are automatically unassigned after their initial installation

C.

Pre-run CLI templates for ZTP and LTP must be unassigned manually after the first installation to avoid conflicting error objects when importing a policy package

D.

The administrator must use post-run CLI templates that are designed for ZTP and LTP

Questions # 4:

Refer to the exhibit, which shows a corporate network and a new remote office network.

Question # 4

An administrator must integrate the new remote office network with the corporate enterprise network.

What must the administrator do to allow routing between the two networks?

Options:

A.

The administrator must implement BGP to inject the new remote office network into the corporate FortiGate device

B.

The administrator must configure a static route to the subnet 192.168.l.0/24 on the corporate FortiGate device.

C.

The administrator must configure virtual links on both FortiGate devices.

D.

The administrator must implement OSPF over IPsec on both FortiGate devices.

Questions # 5:

Refer to the exhibit.

Question # 5

The partial output of an OSPF command is shown. You are checking the OSPF status of a FortiGate device when you receive the output shown in the exhibit. Based on the output, which two statements about FortiGate are correct? (Choose two answers)

Options:

A.

FortiGate is a backup designated router.

B.

FortiGate supports OSPF ECMP.

C.

FortiGate is in the area 0.0.0.5.

D.

FortiGate can inject external routing information.

Questions # 6:

Refer to the exhibits.

Question # 6

A policy package conflict status and information from the import device wizard in the Core1 VDOM are shown. When you import a policy package, the following message appears for the Web_restrictions web filter profile and the deep-inspection SSL-SSH profile: "The following objects were found having conflicts. Please confirm your settings, then continue." The Web_restrictions and deep-inspection profiles are used by other FortiGate devices within FortiManager. Which step must you take to resolve the issue? (Choose one answer)

Options:

A.

Retrieve the FortiGate configuration to automatically export correct objects and policies.

B.

Create uniquely named objects on FortiGate and reimport them into the policy package.

C.

Select the FortiManager configuration that accepts changes on FortiManager and preserves existing configurations on FortiGate devices.

D.

Use non-default object values because FortiManager is unable to alter default values.

Questions # 7:

Refer to the exhibit, which shows an ADVPN network.

Question # 7

The client behind Spoke-1 generates traffic to the device located behind Spoke-2.

What is the first message that the hub sends to Spoke-1 to bring up the dynamic tunnel?

Options:

A.

Shortcut query

B.

Shortcut offer

C.

Shortcut reply

D.

Shortcut forward

Questions # 8:

Refer to the exhibit, which shows the VDOM section of a FortiGate device.

Question # 8

An administrator discovers that webfilter stopped working in Core1 and Core2 after a maintenance window.

Which two reasons could explain why webfilter stopped working? (Choose two.)

Options:

A.

The root VDOM does not have access to FortiManager in a closed network.

B.

The root VDOM does not have a VDOM link to connect with the Corel and Core2 VDOMs.

C.

The Core1 and Core2 VDOMs must also be enabled as Management VDOMs to receive FortiGuard updates

D.

The root VDOM does not have access to any valid public FDN.

Questions # 9:

Refer to the exhibit, which shows an OSPF network.

Question # 9

Which configuration must the administrator apply to optimize the OSPF database?

Options:

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

Questions # 10:

An administrator configured the FortiGate devices in an enterprise network to join the Fortinet Security Fabric. The administrator has a list of IP addresses that must be blocked by the data center firewall. This list is updated daily.

How can the administrator automate a firewall policy with the daily updated list?

Options:

A.

With FortiNAC

B.

With FortiAnalyzer

C.

With a Security Fabric automation

D.

With an external connector from Threat Feeds

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions