Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibits.

Examine the FortiGate configuration, FortiAnalyzer logs, and FortiGate widget shown in the exhibits.

Security Fabhc quarantine automation has been configured to isolate compromised devices automatically. FortiAnalyzer has been added to the Security Fabric, and an automation stitch has been configured to quarantine compromised devices.

To test the setup, a device with the IP address 10.0.2.1 that is connected through a managed FortiSwitch attempts to access a malicious website. The logs on FortiAnalyzer confirm that the event was recorded, but the device does not appear in the FortiGate quarantine widget.

Which two reasons could explain why FortiGate is not quarantining the device? (Choose two.)

A.

The IOC action should include only the FortiSwitch in the quarantine.

B.

The SSL inspection should be set to deep-Inspection

C.

The malicious website is not recognized as an indicator of compromise (IOC) by FortiAnalyzer.

D.

The threat detection services license is missing or invalid under FortiAnalyzer.

In addition to requiring a FortiAnalyzer device to configure the Security Fabric, which license must be added to FortiAnalyzer to use Indicators of Compromise (IOC) rules?

A.

loT Security Add-on license

B.

IOC Subscription license

C.

IOC detection is included on FAZ-Basic license

D.

Threat Detection Service license

Refer to the exhibit.

Which shows the WTP profile configuration.

The AP profile is assigned to two FAP-231F APs that are installed in an open plan area.

The first AP has 32 clients associated with the 5 GHz radios and 22 clients associated with the 2.4 GHz radio. The second AP has 12 clients associated with the 5 GHz radios and 20 clients associated with the 2.4 GHz radio.

A dual-band-capable client enters the area near the first AP and the first AP measures the new client at - 3 3 dBm signal strength. The second AP measures the new client at -43 dBm signal strength.

If the new client attempts to conned to the student 01 wireless network, which AP radio will the client be associated with?

A.

The first AP 2.4 GHz interface provides a stronger signal, which clients often prioritize.

B.

The first AP 5 GHz interface because it has a stronger signal.

C.

The second AP 5 GHz interface has fewer clients, which ensures better performance despite the weaker signal.

D.

The second AP 2.4 GHz interface is preferred over 5 GHz for better speed and lower interference.

A conference center wireless network provides guest access through a captive portal, allowing unregistered users to self-register and connect to the network. The IT team has been tasked with updating the existing configuration to enforce captive portal authentication over a secure HTTPS connection. Which two steps should the administrator take to implement this change? (Choose two.)

A.

Enable HTTP redirect in the user authentication settings.

B.

Create a new SSID with the HTTPS captive portal URL.

C.

Disable HTTP administrative access on the guest SSID to enforce HTTPS connection.

D.

Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator.

A network administrator connects a new FortiGate to the network, allowing it to automatically discover andI register with FortiManager.

What occurs after FortiGate retrieves the FortiManager address?

A.

FortiGate establishes a secure tunnel to FortiManager over TCP port 541.

B.

The device needs to be manually authorized on FortiManager.

C.

FortiGate configures its interface settings based on a DHCP response from FortiManager.

D.

FortiGate sends a discovery request to all devices on the local network using UDP port 1068.

How can FortiAIOps help optimize network performance in an SD-Branch deployment with FortiGate, FortiSwitch, and FortiAP?

A.

It disables low-performing APs and switches automatically.

B.

It uses Al-driven analytics to identify network issues and provide optimization recommendations.

C.

It removes the need for SD-WAN configuration by automating all routing decisions.

D.

It predicts and resolves all network issues without any human intervention.

FortiGate has been added to FortiAIOps for management.

Which step must be performed on FortiAIOps to add a FortiSwitch device connected to the recently added FortiGate?

A.

Add the FortiSwitch device by submitting its serial number.

B.

FortiAIOps requires that the FortiSwitch IP address is submitted.

C.

FortiSwitch is added automatically.

D.

Configure the FortiSwitch IP address, user ID, and password

In each user certificate, you can define the subject field, expiration date. User Principal Name (UPN), URL for CRL download, and the OCSP URL. How does the detailed configuration of these attributes impact the certificate?

A.

It makes the certificate easier to revoke manually because it reduces the need for automatic checks.

B.

It limits the validity of the certificate to specific devices and applications, reducing its general usability.

C.

It enables precise identification of the user and ensures timely certificate revocation checks.

D.

It makes the certificate compatible with a wide range of applications and services by ensuring universal validity

Refer to the exhibit.

A RADIUS server has been successfully configured on FortiGate, which sends RADIUS authentication requests to FortiAuthenticator. FortiAuthenticator, in turn, relays the authentication using LDAP to a Windows Active Directory server.

It was reported that wireless users are unable to authenticate successfully.

The FortiGate configuration confirms that it can connect to the RADIUS server without issues.

While testing authentication on FortiGate using the command diagnose test authserver radius, it was observed that authentication succeeds with PAP but fails with MSCHAPv2.

Additionally, the Remote LDAP Server configuration on FortiAuthenticator was reviewed.

Which configuration change might resolve this issue?

A.

Change the RADIUS authentication protocol to CHAP

B.

Enable Windows Active Directory Domain Authentication.

C.

Manually add user credentials to the FortiAuthenticator local database

D.

Use RADIUS attributes under the FortiGate configuration.

Connectivity tests are being performed on a newly configured VLAN. The VLAN is configured on a FortiSwitch device that is managed by FortiGate. During testing, it is observed that devices

within the VLAN can successfully ping FortiGate. and FortiGate can also ping these devices.

Inter-VLAN communication is working as expected. However, devices within the same VLAN are unable to communicate with each other.

What could be causing this issue?

A.

Access VLAN is enabled on the VLAN.

B.

The FortiSwitch MAC address table is missing entries.

C.

The FortiGate ARP table is missing entries.

D.

The native VLAN configured on the ports is incorrect.