Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You have configured the performance SLA with the probe mode as Prefer Passive.

What are two observable impacts of this configuration? (Choose two.)

A.

FortiGate can offload the traffic that is subject to passive monitoring to hardware.

B.

FortiGate passively monitors the member if ICMP traffic is passing through the member.

C.

During passive monitoring, the SLA performance rule cannot detect dead members.

D.

After FortiGate switches to active mode, the SLA performance rule falls back to passive monitoring after 3 minutes.

E.

FortiGate passively monitors the member if TCP traffic is passing through the member.

Which two statements correctly describe what happens when traffic matches the implicit SD-WAN rule? (Choose two answers)

A.

Traffic is load balanced using the algorithm set for the v4-ecmp-mode setting.

B.

Traffic does not match any of the entries in the policy route table.

C.

FortiGate flags the session with may_dirty and vwl_default.

D.

The traffic is distributed, regardless of weight, through all available static routes.

E.

The session information output displays no SD-WAN service id.

How does the FortiSASE security dashboard facilitate vulnerability management for FortiClient endpoints? (Choose one answer)

A.

It automatically patches all vulnerabilities without user intervention and does not categorize vulnerabilities by severity.

B.

It shows vulnerabilities only for applications and requires endpoint users to manually check for affected endpoints.

C.

It displays only critical vulnerabilities, requires manual patching for all endpoints, and does not allow viewing of affected endpoints.

D.

It provides a vulnerability summary, identifies affected endpoints, and supports automatic patching for eligible vulnerabilities.

Refer to the exhibit.

The exhibit shows output of the command diagnose sys sdwan service collected on a FortiGate device.

The administrator wants to know through which interface FortiGate will steer traffic from local users on subnet 10.0.1.0/255.255.255.192 and with a destination of the social media application Facebook.

Based on the exhibits, which two statements are correct? (Choose two.)

A.

FortiGate steers traffic for social media applications according to the service rule 2 and steers traffic through port2.

B.

There is no service defined for the Facebook application, so FortiGate applies service rule 3 and directs the traffic to headquarters.

C.

When FortiGate cannot recognize the application of the flow, it load balances the traffic through the tunnels HQ_T1, HQ_T2, HQ_T3.

D.

When FortiGate cannot recognize the application of the flow, it steers the traffic through the preferred member of rule 3, HQ_T1.

Refer to the exhibits.

Two SD-WAN event logs, the member status, the SD-WAN rule configuration, and the health-check configuration for a FortiGate device are shown. Immediately after the log messages are displayed, how will the FortiGate steer the traffic based on the information shown in the exhibits? (Choose one answer)

A.

FortiGate uses port1 or port2 to steer the traffic for SD-WAN rule ID 1.

B.

FortiGate uses port1 to steer the traffic for SD-WAN rule ID 1.

C.

FortiGate uses port2 to steer the traffic for SD-WAN rule ID 1.

D.

FortiGate skips SD-WAN rule ID 1.

An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network. The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over HUB1-VPN1. However, the traffic is routed over HUB1-VPN3.

Based on the output shown in the exhibit, which two reasons, individually or together, could explain the observed behavior? (Choose two.)

A.

HUB1-VPN1 does not have a valid route to the destination.

B.

HUB1-VPN3 has a higher member configuration priority than HUB1-VPN1.

C.

HUB1-VPN3 has a lower route priority value (higher priority) than HUB1-VPN1.

D.

The traffic matches a regular policy route configured with HUB1-VPN3 as the outgoing device.

SD-WAN interacts with many other FortiGate features. Some of them are required to allow SD-WAN to steer the traffic.

Which three configuration elements must you configure before FortiGate can steer traffic according to SD-WAN rules? (Choose three.)

A.

Firewall policies

B.

Security profiles

C.

Interfaces

D.

Routing

E.

Traffic shaping

An existing Fortinet SD-WAN customer who has recently deployed FortiSASE wants to have a comprehensive view of, and combined reports for, both SD-WAN branches and remote users. How can the customer achieve this?

A.

Forward the logs from FortiSASE to Fortinet SOCaaS.

B.

Forward the logs from FortiGate to FortiSASE.

C.

Forward the logs from FortiSASE to the external FortiAnalyzer.

D.

Forward the logs from the external SD-WAN FortiAnalyzer to FortiSASE.

Which two statements about configuring a steering bypass destination in FortiSASE are correct? (Choose two.)

A.

Subnet is the only destination type that supports the Apply condition

B.

Apply condition allows split tunneling destinations to ae applied to On-net. off-net. or both types of endpoints

C.

You can select from four destination types: Infrastructure, FQDN, Local Application, or Subnet

D.

Apply condition can be set only to On-net or Off-net. but not both

Which statement about security posture tags in FortiSASE is correct?

A.

Multiple tags can be assigned to an endpoint, but only one is used for evaluation.

B.

Multiple tags can be assigned to an endpoint and used for evaluation.

C.

Tags are static and do not change with endpoint status.

D.

Only one tag can be assigned to an endpoint.