New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit.

By default FortiOS creates the following DHCP server scope for the FortiLink interface as shown in the exhibit

What is the objective of the vci-string setting?

A.

To ignore DHCP requests coming from FortiSwitch and FortiExtender devices

B.

To reserve IP addresses for FortiSwitch and FortiExtender devices

C.

To restrict the IP address assignment to FortiSwitch and FortiExtender devices

D.

To restrict the IP address assignment to devices that have FortiSwitch or FortiExtender as their hostname

You are investigating a report of poor wireless performance in a network that you manage. The issue is related to an AP interface in the 5 GHz range You are monitoring the channel utilization over time.

What is the recommended maximum utilization value that an interface should not exceed?

A.

85%

B.

95%

C.

75%

D.

65%

Refer to the exhibits showing AP monitoring information.

The exhibits show the status of an AP in a small office building. The building is located at the edge of a campus, and users are reporting issues with wireless network performance.

Which configuration change would best improve the wireless network performance?

A.

Select an alternative channel for the 5 GHz interface.

B.

Disable lower data rates on the 5 GHz interface.

C.

Enable band steering on the AP.

D.

Relocate the AP to be closer to the clients.

Which CLI command should an administrator use to view the certificate verification process in real time?

A.

diagnose debug application foauthd -1

B.

diagnose debug application radiusd -1

C.

diagnose debug application authd -1

D.

diagnose debug application fnbamd -1

Which CLI command should an administrator use on FortiGate to view the RSSO authentication process in real time?

A.

diagnose debug application fnbamd -1

B.

diagnose debug application authd -1

C.

diagnose debug application radiusd -1

D.

diagnose debug application foauthd -1

Which two statements about the use of digital certificates are true? (Choose two.)

A.

A chain of trust may include one or more intermediate CAs.

B.

In a chain of trust, the root CA is signed by another certificate.

C.

To validate the signature on a certificate, an endpoint does not need to know the CA of that certificate.

D.

An intermediate CA can sign other certificates.

Which two statements about FortiSwitch trunks are true? (Choose two.)

A.

A trunk is a link aggregation group interface.

B.

By default, when connecting two FortiSwitch devices to each other, a trunk is automatically created between the switches.

C.

Trunks do not support tagged Ethernet frames.

D.

LACP is not supported.

Refer to the exhibit.

Examine the FortiGate configuration FortiAnalyzer logs and FortiGate widget shown in the exhibit

An administrator is testing the Security Fabric quarantine automation The administrator added FortiAnalyzer to the Security Fabric and configured an automation stitch to automatically quarantine compromised devices The test device (::.:.:.!) s connected to a managed Fort Switch dev :e

After trying to access a malicious website from the test device, the administrator verifies that FortiAnalyzer has a log (or the test connection However the device is not getting quarantined by FortiGate as shown in the quarantine widget

Which two scenarios are likely to cause this issue? (Choose two)

A.

The web filtering rating service is not working

B.

FortiAnalyzer does not have a valid threat detection services license

C.

The device does not have FortiClient installed

D.

FortiAnalyzer does not consider the malicious website an indicator of compromise (IOC)