Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Refer to the exhibit, which shows a revision history window in the FortiManager device layer.

The IT team is trying to identify the administrator responsible for the most recent update in the FortiGate device database.

Which conclusion can you draw about this scenario?

A.

This retrieved process was automatically triggered by a Remote FortiGate Directly (via CLI) script.

B.

The user script_manager is an API user from the Fortinet Developer Network (FDN) retrieving a configuration.

C.

To identify the user who created the event, check it on the Configuration and Installation widget on FortiGate within the FortiManager device layer.

D.

Find the user in the FortiManager system logs and use the type=script command to find the administrator user in the user field.

Which two statements about IKEv2 are true if an administrator decides to implement IKEv2 in the VPN topology? (Choose two.)

A.

It includes stronger Diffie-Hellman (DH) groups, such as Elliptic Curve (ECP) groups.

B.

It supports interoperability with devices using IKEv1.

C.

It exchanges a minimum of two messages to establish a secure tunnel.

D.

It supports the extensible authentication protocol (EAP).

A user reports that their computer was infected with malware after accessing a secured HTTPS website. However, when the administrator checks the FortiGate logs, they do not see that the website was detected as insecure despite having an SSL certificate and correct profiles applied on the policy.

How can an administrator ensure that FortiGate can analyze encrypted HTTPS traffic on a website?

A.

The administrator must enable reputable websites to allow only SSL/TLS websites rated by FortiGuard web filter.

B.

The administrator must enable URL extraction from SNI on the SSL certificate inspection to ensure the TLS three-way handshake is correctly analyzed by FortiGate.

C.

The administrator must enable DNS over TLS to protect against fake Server Name Indication (SNI) that cannot be analyzed in common DNS requests on HTTPS websites.

D.

The administrator must enable full SSL inspection in the SSL/SSH Inspection Profile to decrypt packets and ensure they are analyzed as expected.

Refer to the exhibit, which shows a network diagram showing the addition of site 2 with an overlapping network segment to the existing VPN IPsec connection between the hub and site 1.

Which IPsec phase 2 configuration must an administrator make on the FortiGate hub to enable equal-cost multi-path (ECMP) routing when multiple remote sites connect with overlapping subnets?

A.

Set route-overlap to either use-new or use-old

B.

Set net-device to ecmp

C.

Set single-source to enable

D.

Set route-overlap to allow

How will configuring set tcp-mss-sender and set tcp-mss-receiver in a firewall policy affect the size and handling of TCP packets in the network?

A.

The maximum segment size permitted in the firewall policy determines whether TCP packets are allowed or denied.

B.

Applying commands in a firewall policy determines the largest payload a device can handle in a single TCP segment.

C.

The administrator must consider the payload size of the packet and the size of the IP header to configure a correct value in the firewall policy.

D.

The TCP packet modifies the packet size only if the size of the packet is less than the one the administrator configured in the firewall policy.

Refer to the exhibit, which shows a hub and spokes deployment.

An administrator is deploying several spokes, including the BGP configuration for the spokes to connect to the hub.

Which two commands allow the administrator to minimize the configuration? (Choose two.)

A.

neighbor-group

B.

route-reflector-client

C.

neighbor-range

D.

ibgp-enforce-multihop

Refer to the exhibit, which shows a partial enterprise network.

An administrator would like the area 0.0.0.0 to detect the external network.

What must the administrator configure?

A.

Enable RIP redistribution on FortiGate B.

B.

Configure a distribute-route-map-in on FortiGate B.

C.

Configure a virtual link between FortiGate A and B.

D.

Set the area 0.0.0.l type to stub on FortiGate A and B.