Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.

C.

Select flow mode in the IPS profile to accurately analyze application patterns.

D.

Set the IPS profile signature action to default to discard all possible false positives.

An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.

What two conclusions can the administrator draw? (Choose two.)

A.

The suspicious packet is related to a cluster that has VDOMs enabled.

B.

The network includes FortiGate devices configured with the FGSP protocol.

C.

The suspicious packet is related to a cluster with a group-id value lower than 255.

D.

The suspicious packet corresponds to port 7 on a FortiGate device.

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

A.

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.

The ISDB limits access by URL and domain.

An administrator must enable direct communication between multiple spokes in a company's network. Each spoke has more than one internet connection.

The requirement is for the spokes to connect directly without passing through the hub, and for the links to automatically switch to the best available connection.

How can this automatic detection and optimal link utilization between spokes be achieved?

A.

Set up OSPF routing over static VPN tunnels between spokes.

B.

Utilize ADVPN 2.0 to facilitate dynamic direct tunnels and automatic link optimization.

C.

Establish static VPN tunnels between spokes with predefined backup routes.

D.

Implement SD-WAN policies at the hub to manage spoke link quality.

Refer to the exhibit, which shows a partial enterprise network.

An administrator would like the area 0.0.0.0 to detect the external network.

What must the administrator configure?

A.

Enable RIP redistribution on FortiGate B.

B.

Configure a distribute-route-map-in on FortiGate B.

C.

Configure a virtual link between FortiGate A and B.

D.

Set the area 0.0.0.l type to stub on FortiGate A and B.

A company's guest internet policy, operating in proxy mode, blocks access to Artificial Intelligence Technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.

Which configuration changes are required for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443 when full SSL inspection is active in the guest policy?

A.

Add a URL wildcard domain to the website CA certificate and use it in the SSL/SSH Inspection Profile.

B.

In the Protocol Port Mapping section of the SSL/SSH Inspection Profile, enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports.

C.

To analyze nonstandard ports in web filter profiles, use TLSv1.3 in the SSL/SSH Inspection Profile.

D.

Administrators can block traffic on nonstandard ports by enabling the SNI check in the SSL/SSH Inspection Profile.

Refer to the exhibit, which shows the HA status of an active-passive cluster.

An administrator wants FortiGate_B to handle the Core2 VDOM traffic.

Which modification must the administrator apply to achieve this?

A.

The administrator must disable override on FortiGate_A.

B.

The administrator must change the priority from 100 to 160 for FortiGate_B.

C.

The administrator must change the load balancing method on FortiGate_B.

D.

The administrator must change the priority from 128 to 200 for FortiGate_B.

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

An administrator received a FortiAnalyzer alert that a 1 ТВ disk filled up in a day. Upon investigation, they found thousands of unusual DNS log requests, such as JHCMQK.website.com, with no answers. They later discovered that DNS exfiltration was occurring through both UDP and TLS.

How can the administrator prevent this data theft technique?

A.

Create an inline-CASB to protect against DNS exfiltration.

B.

Configure a File Filter profile to prevent DNS exfiltration.

C.

Enable DNS Filter to protect against DNS exfiltration.

D.

Use an IPS profile and DNS exfiltration-related signatures.

A FortiGate device with UTM profiles is reaching the resource limits, and the administrator expects the traffic in the enterprise network to increase.

The administrator has received an additional FortiGate of the same model.

Which two protocols should the administrator use to integrate the additional FortiGate device into this enterprise network? (Choose two.)

A.

FGSP with external load balancers

B.

FGCP in active-active mode and with switches

C.

FGCP in active-passive mode and with VDOM disabled

D.

VRRP with switches