Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Refer to the exhibit.

You are troubleshooting a network connectivity issue between two VMs that are deployed in Azure.

One VM is a FortiGate that has one interface in the DMZ subnet, which is in the Production VNet. The other VM is a Windows Server in the Servers subnet, which is also in the Production VNet. You cannot ping the Windows Server from the FortiGate VM.

What is the reason for this?

A.

You have not created a VPN to allow traffic between those subnets

B.

By default, Azure does not allow ICMP traffic between subnets

C.

The firewall in the Windows VM is blocking the traffic

D.

You have not configured a user-defined route for this traffic

How are the configurations synchronized between two FortiGate VMs in an active-passive HA with SDN connector failover deployed from the Azure marketplace?

A.

Using unicast FGCP

B.

Using system autoscaling during a failover

C.

An Azure function distributes the configuration files

D.

By configuring FGSP on the primary

Refer to the exhibits.

A high availability (HA) active-active FortiGate with Elastic Load Balancing (ELB) and Internal Load Balancing (ILB) was deployed with a default setup to filter traffic to a Linux server running Apache server.

Ports 80 and 22 are open on the Linux server, and on FortiGate a VIP and firewall policy are configured to allow traffic through ports 80 and 22. Traffic on port 80 is successful, but traffic on port 22 is not detected by FortiGate.

What configuration changes could you perform to allow SSH traffic?

A.

Configure a customized port under the Frontend IP configuration

B.

Add a new Azure load balancing rule

C.

Include the Linux server in the back-end pool options

D.

Add a new Inbound NAT rule

How does Azure ExpressRoute contribute to achieving predictable latency for network traffic?

A.

By establishing dedicated private connections to Azure data centers

B.

By prioritizing Azure ExpressRoute traffic over other network traffic

C.

By using public internet connections for enhanced routing flexibility

D.

By relying on load balancing to dynamically optimize latency

A Linux server was deployed in a protected subnet with a dynamic IP address. A FortiGate VM in the internal subnet provides traffic filtering to it. and you must implement a firewall policy using the IP address of the Linux server.

Which feature could help integrate FortiGate using Linux server tags?

A.

Targets Management

B.

Microsoft Entra ID

C.

Software-defined network (SDN) connector

D.

Service Fabric Cluster

Which additional features does Azure Firewall Premium offer compared to Azure Firewall Standard?

A.

Content filtering and threat intelligence integration

B.

Antivirus detection and AI prevention capabilities

C.

Advanced DDoS protection and VPN diagnostics

D.

Enhanced URL filtering and web categories

What are two characteristics of Azure standard public IP addresses? (Choose two.)

A.

They support the use of availability zones

B.

They can be dynamic or static

C.

They can be used with load balancers of any SKU

D.

They require the configuration of NSGs for inbound traffic

Your organization is in the process of optimizing its Azure network architecture and wants to dynamically manage and exchange routing information between its virtual networks and on-premises networks.

Which Azure service would help to provide a centralized point for efficient route management and dynamic routing?

A.

Azure Virtual WAN

B.

Azure VPN Gateway

C.

Azure ExpressRoute

D.

Azure Route Server

Which output was taken on a VM running in Azure?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

Your company runs front-end web servers in Azure. You need to deploy a Linux VM to be used as a web server.

To protect your web servers with a web application firewall (WAF), you deploy FortiWeb to secure applications from web-based attacks.

Which FortiWeb operation mode can you implement for this scenario?

A.

Reverse proxy

B.

True transparent proxy

C.

Passive monitoring

D.

Transparent inspection