Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An administrator must enable direct communication between multiple spokes in a company ' s network. Each spoke has more than one internet connection.

The requirement is for the spokes to connect directly without passing through the hub, and for the links to automatically switch to the best available connection.

How can this automatic detection and optimal link utilization between spokes be achieved?

A.

Set up OSPF routing over static VPN tunnels between spokes.

B.

Utilize ADVPN 2.0 to facilitate dynamic direct tunnels and automatic link optimization.

C.

Establish static VPN tunnels between spokes with predefined backup routes.

D.

Implement SD-WAN policies at the hub to manage spoke link quality.

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

An administrator must configure a loopback as a BGP source to connect to the ISP.

Which two commands are required to establish the connection? (Choose two.)

A.

ebgp-enforce-multihop

B.

update-source

C.

ibgp-enforce-multihop

D.

recursive-next-hop

A FortiGate device using unified threat management (UTM) profiles is reaching resource limits, and you expect traffic in your enterprise network to increase. You received an additional FortiGate of the same model.

Which two options should you consider using to integrate the additional FortiGate into your enterprise network? (Choose two.)

A.

FortiGate Session Life Support Protocol (FGSP) with external load balancers

B.

FortiGate Clustering Protocol (FGCP) in active-active (A-A) mode with switches

C.

Virtual Router Redundancy Protocol (VRRP) with switches

D.

FortiGate Clustering Protocol (FGCP) in active-passive (A-P) mode with VDOM disabled

Refer to the exhibit.

An HA configuration of an active-active (A-A) cluster with the same HA uptime is shown. You want HQ-NGFW-2 to handle the Core2 VDOM traffic. Which modification must you make to achieve this outcome? (Choose one answer)

A.

Reboot HQ-NGFW-2.

B.

Change the priority from 100 to 160 for HQ-NGFW-2.

C.

Change the priority from 120 to 200 for HQ-NGFW-2.

D.

Enable override in virtual cluster 2 for HQ-NGFW-2.

What should be configured to provide hardware-accelerated inter-VDOM traffic?

A.

VDOM link

B.

NPU vlinks

C.

VLAN

D.

Physical link

Refer to the exhibit, which shows the packet capture output of a three-way handshake between FortiGate and FortiManager Cloud.

What two conclusions can you draw from the exhibit? (Choose two.)

A.

FortiGate will receive a certificate that supports multiple domains because FortiManager operates in a cloud computing environment.

B.

FortiGate is connecting to the same IP server and will receive an independent certificate for its connection between FortiGate and FortiManager Cloud.

C.

If the TLS handshake contains 17 cipher suites it means the TLS version must be 1.0 on this three-way handshake.

D.

The wildcard for the domain *.fortinet-ca2.support.fortinet.com must be supported by FortiManager Cloud.

Which two statements about the LAN interface connection are correct?

A.

802.3ad

B.

SD-WAN

C.

FortiLink

D.

Enable STP

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

The administrator must configure the BGP section of FortiGate A to give internet access to the enterprise network.

Which command must the administrator use to establish a connection with the internet service provider?

A.

config neighbor

B.

config redistribute bgp

C.

config router route-map

D.

config redistribute ospf

Refer to the exhibit.

The packet capture output of a client hello message is shown.

You are updating a firewall policy that includes SSL certificate inspection. You are capturing packets from the traffic passing through this firewall policy.

Which two statements about the packet capture are correct? (Choose two.)

A.

You can effectively apply an antivirus security profile to this traffic.

B.

You can effectively apply a web filtering profile to this traffic.

C.

The subject alternative name (SAN) is necessary to apply security profiles.

D.

The client supports only TLS versions 1.2 and 1.3.

Refer to the exhibit.

An administrator is deploying a hub and spokes network and using OSPF as dynamic protocol.

Which configuration is mandatory for neighbor adjacency?

A.

Set bfd enable in the router configuration

B.

Set network-type point-to-multipoint in the hub interface

C.

Set rfc1583-compatible enable in the router configuration

D.

Set virtual-link enable in the hub interface