Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

(Refer to the exhibit.

You configure SD-WAN on a standalone FortiGate device.

You want to create an SD-WAN rule that steers traffic related to Facebook and LinkedIn through the less costly internet link.

What must you do to set Facebook and LinkedIn applications as destinations from the GUI? Choose one answer.)

A.

Enable the visibility of the applications field as destinations of the SD-WAN rule.

B.

In the Internet service field, select Facebook and LinkedIn.

C.

You cannot configure applications as destinations of an SD-WAN rule on a standalone FortiGate device.

D.

Install a license to allow applications as destinations of SD-WAN rules.

Refer to the exhibits.

An administrator is testing application steering in SD-WAN. Before generating test traffic, the administrator collected the information shown in the first exhibit. After generating GoToMeeting test traffic, the administrator examined the corresponding traffic log on FortiAnalyzer, which is shown in the second exhibit.

The administrator noticed that the traffic matched the implicit SD-WAN rule, but they expected the traffic to match rule ID 1.

Which two reasons explain why some log messages show that the traffic matched the implicit SD-WAN rule? (Choose two.)

A.

Full SSL inspection is not enabled on the matching firewall policy.

B.

The session 3-tuple did not match any of the existing entries in the ISDB application cache.

C.

FortiGate could not refresh the routing information on the session after the application was detected.

D.

No configured SD-WAN rule matches the traffic related to the collaboration application GoToMeeting

Within the context of SD-WAN, what does SIA correspond to?

A.

Remote Breakout

B.

Local Breakout

C.

Software Internet Access

D.

Secure Internet Authorization

Refer to the exhibit.

Which two conclusions can you draw from the output shown? (Choose two.)

A.

One SD-WAN rule is defined with application categories as the destination.

B.

UDP traffic destined to the subnet 10.22.0.0/24 matches a manual SD-WAN rule.

C.

One SD-WAN rule allows traffic load balancing.

D.

UDP traffic destined to the subnet 10.22.0.0/24 matches a policy route.

(Refer to the exhibit.

You update the spokes configuration of an existing auto-discovery VPN (ADVPN) topology by adding the parameters shown in the exhibit.

Which is a valid objective of those settings? Choose one answer.)

A.

Enable the tunnels as overlay links.

B.

Convert the configuration from ADVPN to ADVPN 2.0.

C.

Prevent cross-overlay shortcuts.

D.

Prevent multiple shortcuts from being established over the same overlay.

Refer to the exhibit that shows an SD-WAN zone configuration on the FortiManager GUI.

Based on the exhibit, how will the FortiGate device behave after it receives this configuration?

A.

The configuration instructs FortiGate to choose an ADVPN shortcut based on SD-WAN information.

B.

The configuration instructs FortiGate to allow ADVPN shortcuts for the tunnels of this SD-WAN zone.

C.

The configuration instructs FortiGate to establish shortcuts only when at least two members meet the SLA target.

D.

The configuration instructs FortiGate to establish shortcuts only for overlay interfaces that meet the SLA target HUB1_HC.

Which statement describes FortiGate behavior when you reference a zone in a static route?

A.

FoftiGate installs ECMP static routes for the first two members of the zone.

B.

FortiGate ignores the static routes defined through members referenced in the zone.

C.

FortiGate routes the traffic through the best performing member of the zone.

D.

FortiGate installs a static route for each member in the zone.

When a customer delegate the installation and management of its SD-WAN infrastructure to an MSSP, the MSSP usually keeps the hub within its infrastructure for ease of management and to share costly resources.

In which two situations will the MSSP install the hub in customer premises? (Choose two.)

A.

The customer requires SIA with centralized breakout.

B.

The administrator expects a large volume of traffic between the branches.

C.

The customer expects a large amount of VoIP traffic.

D.

The majority of the branch traffic is directed to a corporate data center.