Nse4.0 v7.0_4

Nse4.0 v7.0_4

Professional Development

10 Qs

quiz-placeholder

Similar activities

BLDG. LAWS Q3 - PD 1096

BLDG. LAWS Q3 - PD 1096

Professional Development

15 Qs

BLDG.LAWS Q1 - PD1096

BLDG.LAWS Q1 - PD1096

Professional Development

15 Qs

Connections Q5

Connections Q5

Professional Development

11 Qs

Data Analytics and Knowledge

Data Analytics and Knowledge

Professional Development

13 Qs

Monuments of India

Monuments of India

KG - Professional Development

10 Qs

UNESCO World Heritage Sites (Prehistoric)

UNESCO World Heritage Sites (Prehistoric)

University - Professional Development

15 Qs

Just about Trains

Just about Trains

3rd Grade - Professional Development

10 Qs

BEST PROGRAM 2024 (SDPB)

BEST PROGRAM 2024 (SDPB)

Professional Development

10 Qs

Nse4.0 v7.0_4

Nse4.0 v7.0_4

Assessment

Quiz

Architecture

Professional Development

Medium

Created by

Alvaro Ortiz Coca

Used 14+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

111. Which of the following SD-WAN load –balancing method use interface weight value to distribute traffic? (Choose two.)

A. Source IP

B. Spillover

C. Volume

D. Session

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

112.Examine the network diagram shown in the exhibit, then answer the following question:

Which one of the following routes is the best candidate route for FGT1 to route traffic from the Workstation to the Web server?

A. 172.16.0.0/16 [50/0] via 10.4.200.2, port2 [5/0]

B. 0.0.0.0/0 [20/0] via 10.4.200.2, port2

C. 10.4.200.0/30 is directly connected, port2

D. 172.16.32.0/24 is directly connected, port1

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

113.Refer to the exhibit.

In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output as shown in the exhibit.

What should the administrator do next to troubleshoot the problem?

A. Run a sniffer on the web server.

B. Capture the traffic using an external sniffer connected to port1.

C. Execute another sniffer in the FortiGate, this time with the filter “host 10.0.1.10”

D. Execute a debug flow.

4.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Media Image

114.Examine this PAC file configuration

Which of the following statements are true? (Choose two.)

A. Browsers can be configured to retrieve this PAC file from the FortiGate.

B. Any web request to the 172.25.120.0/24 subnet is allowed to bypass the proxy.

C. All requests not made to Fortinet.com or the 172.25.120.0/24 subnet, have to go through altproxy.corp.com: 8060.

D. Any web request fortinet.com is allowed to bypass the proxy.

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

115.A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added to the physical interface.

Which statements about the VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different subnets.

A. The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different subnets.

B. The two VLAN sub interfaces must have different VLAN IDs.

C. The two VLAN sub interfaces can have the same VLAN ID, only if they belong to different VDOMs

D. The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in the same subnet.

6.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Media Image

116.View the exhibit.

Which of the following statements are correct? (Choose two.)

A. This setup requires at least two firewall policies with the action set to IPsec.

B. Dead peer detection must be disabled to support this type of IPsec setup.

C. The Tunnel B route is the primary route for reaching the remote site. The Tunnel A route is used only if the Tunnel B VPN is down

D. This is a redundant IPsec setup.

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

117.Why does FortiGate keep TCP sessions in the session table for some seconds even after both sides (client and server) have terminated the session?

A. To remove the NAT operation.

B. To generate logs

C. To finish any inspection operations

D. To allow for out-of-order packets that could arrive after the FIN/ACK packets.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?