Month End Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

FCP_FGT_AD-7.4 Sample Questions Answers

Questions 4

Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?

Options:

A.

Internet Service Database (ISDB) engine

B.

Intrusion prevention system engine

C.

Antivirus engine

D.

Application control engine

Buy Now
Questions 5

Refer to the exhibit showing a debug flow output.

What two conclusions can you make from the debug flow output? (Choose two.)

Options:

A.

The debug flow is for ICMP traffic.

B.

A firewall policy allowed the connection.

C.

A new traffic session was created.

D.

The default route is required to receive a reply.

Buy Now
Questions 6

When FortiGate performs SSL/SSH full inspection, you can decide how it should react when it detects an invalid certificate.

Which three actions are valid actions that FortiGate can perform when it detects an invalid certificate? (Choose three.)

Options:

A.

Allow & Warning

B.

Trust & Allow

C.

Allow

D.

Block & Warning

E.

Block

Buy Now
Questions 7

What are two features of the NGFW profile-based mode? (Choose two.)

Options:

A.

NGFW profile-based mode can only be applied globally and not on individual VDOMs.

B.

NGFW profile-based mode must require the use of central source NAT policy

C.

NGFW profile-based mode policies support both flow inspection and proxy inspection.

D.

NGFW profile-based mode supports applying applications and web filtering profiles in a firewall policy.

Buy Now
Questions 8

A FortiGate administrator is required to reduce the attack surface on the SSL VPN portal.

Which SSL timer can you use to mitigate a denial of service (DoS) attack?

Options:

A.

SSL VPN dcls-hello-timeout

B.

SSL VPN http-request-header-timeout

C.

SSL VPN login-timeout

D.

SSL VPN idle-timeout

Buy Now
Questions 9

Refer to the exhibit.

Review the intrusion prevention system (IPS) profile signature settings shown in the exhibit.

What do you conclude when adding the FTP.Login.Failed signature to the IPS sensor profile?

Options:

A.

Traffic matching the signature will be allowed and logged.

B.

The signature setting uses a custom rating threshold.

C.

The signature setting includes a group of other signatures.

D.

Traffic matching the signature will be silently dropped and logged.

Buy Now
Questions 10

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, as well as the IP pool configuration and firewall policy objects.

The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IPaddress 10.0.1.254/24.

Which IP address will be used to source NAT (SNAT) the traffic, if the user on Local-Client (10.0.1.10) pings the IP address of Remote-FortiGate (10.200.3.1)?

Options:

A.

10.200.1.1

B.

10.200.1.149

C.

10.200.1.99

D.

10.200.1.49

Buy Now
Questions 11

Refer to the exhibit, which shows the IPS sensor configuration.

If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)

Options:

A.

The sensor will gather a packet log for all matched traffic.

B.

The sensor will reset all connections that match these signatures.

C.

The sensor will allow attackers matching the Microsoft.Windows.iSCSl.Target.DoS signature.

D.

The sensor will block all attacks aimed at Windows servers.

Buy Now
Questions 12

Refer to the exhibits.

An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).

What must the administrator do to synchronize the address object?

Options:

A.

Change the csf setting on Local-FortiGate (root) to sec fabric-object-unification default.

B.

Change the csf setting on both devices to sec downscream-access enable.

C.

Change the csf setting on ISFW (downstream) to sec auchorizacion-requesc-cype certificace.

D.

Change the csf setting on ISFW (downstream) to sec configuration-sync local.

Buy Now
Questions 13

FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively.

Which two statements are true about the requirements of connected physical interfaces on FortiGate? (Choose two.)

Options:

A.

Both interfaces must have the interface role assigned

B.

Both interfaces must have directly connected routes on the routing table

C.

Both interfaces must have DHCP enabled

D.

Both interfaces must have IP addresses assigned

Buy Now
Questions 14

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

Options:

A.

The NetSessionEnum function is used to track user logouts.

B.

NetAPI polling can increase bandwidth usage in large networks.

C.

The collector agent must search Windows application event logs.

D.

The collector agent uses a Windows API to query DCs for user logins.

Buy Now
Questions 15

An administrator wants to configure dead peer detection (DPD) on IPsec VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when there is outbound traffic but no response from the peer.

Which DPD mode on FortiGate meets this requirement?

Options:

A.

On Demand

B.

On Idle

C.

Disabled

D.

Enabled

Buy Now
Questions 16

Which two statements explain antivirus scanning modes? (Choose two.)

Options:

A.

In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.

B.

In flow-based inspection mode files bigger than the buffer size are scanned

C.

In proxy-based inspection mode files bigger than the buffer size are scanned

D.

In proxy-based inspection mode antivirus scanning buffers the whole file for scanning, before sending it to the client

Buy Now
Questions 17

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

Options:

A.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy

B.

Create an Interface Group that includes port1 and port2 to create a single firewall policy

C.

Select port1 and port2 subnets in a single firewall policy.

D.

Replace port1 and port2 with the any interface in a single firewall policy.

Buy Now
Questions 18

The HTTP inspection process in web filtering follows a specific order when multiple features are enabled in the web filter profile.

Which order must FortiGate use when the web filter profile has features such as safe search enabled?

Options:

A.

FortiGuard category filter and rating filter

B.

Static domain filter, SSL inspection filter, and external connectors filters

C.

DNS-based web filter and proxy-based web filter

D.

Static URL filter, FortiGuard category filter, and advanced filters

Buy Now
Questions 19

Which three CLI commands, can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.)

Options:

A.

execute ping

B.

execute traceroute

C.

diagnose sys top

D.

get system arp

E.

diagnose sniffer packet any

Buy Now
Questions 20

Refer to the exhibit, which shows a partial configuration from the remote authentication server.

Why does the FortiGate administrator need this configuration?

Options:

A.

To authenticate only the Training user group.

B.

To set up a RADIUS server Secret

C.

To authenticate and match the Training OU on the RADIUS server.

D.

To authenticate Any FortiGate user groups.

Buy Now
Questions 21

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall policies configuration VIP configuration and IP pool configuration on the FortiGate device

The WAN (port1) interface has the IP address 10.200. l. 1/24 The LAN (port3) interface has the IP address 10.0.1.254/24

The first firewall policy has NAT enabled using the IP pool The second firewall policy is configured with a VIP as the destination address.

Which IP address will be used to source NAT (SNAT) the internet traffic coming from a workstation with the IP address 10.0.1.10?

Options:

A.

10.200.1.1

B.

10.200.1.10

C.

10.0.1.254

D.

10.200.1.100

Buy Now
Questions 22

Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.)

Options:

A.

The client FortiGate requires the SSL VPN tunnel interface type to connect SSL VPN.

B.

The server FortiGate requires a CA certificate to verify the client FortiGate certificate.

C.

The client FortiGate requires a client certificate signed by the CA on the server FortiGate.

D.

The client FortiGate requires a manually added route to remote subnets.

Buy Now
Questions 23

Refer to the exhibit.

Which statement about this firewall policy list is true?

Options:

A.

The Implicit group can include more than one deny firewall policy.

B.

The firewall policies are listed by ID sequence view.

C.

The firewall policies are listed by ingress and egress interfaces pairing view.

D.

LAN to WAN. WAN to LAN. and Implicit are sequence grouping view lists.

Buy Now
Questions 24

Refer to exhibit.

An administrator configured the web filtering profile shown in the exhibit to block access to all social networking sites except Twitter. However, when users try to access twitter.com, they are redirected to a FortiGuard web filtering block page.

Based on the exhibit, which configuration change can the administrator make to allow Twitter while blocking all other social networking sites?

Options:

A.

On the Static URL Filter configuration set Type to Simple

B.

On the FortiGuard Category Based Filter configuration set Action to Warning for Social Networking

C.

On the Static URL Filter configuration set Action to Monitor

D.

On the Static URL Filter configuration set Action to Exempt

Buy Now
Questions 25

Refer to the exhibits, which show the firewall policy and the security profile for Facebook.

Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other types of posts.

Which part of the configuration must you change to resolve the issue?

Options:

A.

Make the SSL inspection a deep content inspection

B.

Add Facebook to the URL category in the security policy

C.

Disable HTTP redirect to HTTPS on the web browser

D.

Get the additional application signatures required to add to the security policy

Buy Now
Questions 26

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.

Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

Options:

A.

On HQ-FortiGate, disable Diffie-Helman group 2.

B.

On Remote-FortiGate, set port2 as Interface.

C.

On both FortiGate devices, set Dead Peer Detection to On Demand.

D.

On HQ-FortiGate, set IKE mode to Main (ID protection).

Buy Now
Exam Code: FCP_FGT_AD-7.4
Exam Name: FCP - FortiGate 7.4 Administrator
Last Update: Apr 28, 2025
Questions: 89
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now FCP_FGT_AD-7.4