Month End Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

FCSS_EFW_AD-7.4 Sample Questions Answers

Questions 4

Refer to the exhibit, which shows a network diagram.

An administrator would like to modify the MED value advertised from FortiGate_1 to a BGP neighbor in the autonomous system 30.

What must the administrator configure on FortiGate_1 to implement this?

Options:

A.

route-map-out

B.

network-import-check

C.

prefix-list-out

D.

distribute-list-out

Buy Now
Questions 5

An administrator must standardize the deployment of FortiGate devices across branches with consistent interface roles and policy packages using FortiManager.

What is the recommended best practice for interface assignment in this scenario?

Options:

A.

Enable metadata variables to use dynamic configurations in the standard interfaces of FortiManager.

B.

Use the Install On feature in the policy package to automatically assign different interfaces based on the branch.

C.

Create interfaces using device database scripts to use them on the same policy package of FortiGate devices.

D.

Create normalized interface types per-platform to automatically recognize device layer interfaces based on the FortiGate model and interface name.

Buy Now
Questions 6

An administrator is setting up an ADVPN configuration and wants to ensure that peer IDs are not exposed during VPN establishment.

Which protocol can the administrator use to enhance security?

Options:

A.

Use IKEv2, which encrypts peer IDs and prevents exposure.

B.

Opt for SSL VPN web mode because it does not use peer IDs at all.

C.

Choose IKEv1 aggressive mode because it simplifies peer identification.

D.

Stick with IKEv1 main mode because it offers better performance.

Buy Now
Questions 7

Refer to the exhibit, which shows an ADVPN network.

The client behind Spoke-1 generates traffic to the device located behind Spoke-2.

What is the first message that the hub sends to Spoke-1 to bring up the dynamic tunnel?

Options:

A.

Shortcut query

B.

Shortcut offer

C.

Shortcut reply

D.

Shortcut forward

Buy Now
Questions 8

Refer to the exhibit, which shows a partial troubleshooting command output.

An administrator is extensively using IPsec on FortiGate. Many tunnels show information similar to the output shown in the exhibit.

What can the administrator conclude?

Options:

A.

IPsec SAs cannot be offloaded.

B.

The two IPsec SAs, inbound and outbound, are copied to the NPU.

C.

Only the outbound IPsec SA is copied to the NPU.

D.

Only the inbound IPsec SA is copied to the NPU.

Buy Now
Questions 9

A company's users on an IPsec VPN between FortiGate A and B have experienced intermittent issues since implementing VXLAN. The administrator suspects that packets exceeding the 1500-byte default MTU are causing the problems.

In which situation would adjusting the interface’s maximum MTU value help resolve issues caused by protocols that add extra headers to IP packets?

Options:

A.

Adjust the MTU on interfaces only if FortiGate has the FortiGuard enterprise bundle, which allows MTU modification.

B.

Adjust the MTU on interfaces in all FortiGate devices that support the latest family of Fortinet SPUs: NP7, CP9 and SP5.

C.

Adjust the MTU on interfaces in controlled environments where all devices along the path allow MTU interface changes.

D.

Adjust the MTU on interfaces only in wired connections like PPPoE, optic fiber, and ethernet cable.

Buy Now
Questions 10

How will configuring set tcp-mss-sender and set tcp-mss-receiver in a firewall policy affect the size and handling of TCP packets in the network?

Options:

A.

The maximum segment size permitted in the firewall policy determines whether TCP packets are allowed or denied.

B.

Applying commands in a firewall policy determines the largest payload a device can handle in a single TCP segment.

C.

The administrator must consider the payload size of the packet and the size of the IP header to configure a correct value in the firewall policy.

D.

The TCP packet modifies the packet size only if the size of the packet is less than the one the administrator configured in the firewall policy.

Buy Now
Questions 11

The IT department discovered during the last network migration that all zero phase selectors in phase 2 IPsec configurations impacted network operations.

What are two valid approaches to prevent this during future migrations? (Choose two.)

Options:

A.

Use routing protocols to specify allowed subnets over the tunnel.

B.

Configure an IPsec-aggregate to create redundancy between each firewall peer.

C.

Clearly indicate to the VPN which segments will be encrypted in the phase two selectors.

D.

Configure an IP address on the IPsec interface of each firewall to establish unique peer connections and avoid impacting network operations.

Buy Now
Questions 12

Refer to the exhibit.

The routing tables of FortiGate_A and FortiGate_B are shown. FortiGate_A and FortiGate_B are in the same autonomous system.

The administrator wants to dynamically add only route172.16.1.248/30on FortiGate_A.

What must the administrator configure?

Options:

A.

The prefix 172.16.1.248/30 in the BGP Networks section on FortiGate_B

B.

A BGP route map out for 172.16.1.248/30 on FortiGate_B

C.

Enable Redistribute Connected in the BGP section on FortiGate_B.

D.

A BGP route map in for 172.16.1.248/30 on FortiGate_A

Buy Now
Questions 13

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

Options:

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.

C.

Select flow mode in the IPS profile to accurately analyze application patterns.

D.

Set the IPS profile signature action to default to discard all possible false positives.

Buy Now
Questions 14

Refer to the exhibit, which contains the partial output of an OSPF command.

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

Which statement on this FortiGate device is correct?

Options:

A.

The FortiGate device can inject external routing information.

B.

The FortiGate device is in the area 0.0.0.5.

C.

The FortiGate device does not support OSPF ECMP.

D.

The FortiGate device is a backup designated router.

Buy Now
Questions 15

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

An administrator must configure a loopback as a BGP source to connect to the ISP.

Which two commands are required to establish the connection? (Choose two.)

Options:

A.

ebgp-enforce-multihop

B.

update-source

C.

ibgp-enforce-multihop

D.

recursive-next-hop

Buy Now
Questions 16

An administrator configured the FortiGate devices in an enterprise network to join the Fortinet Security Fabric. The administrator has a list of IP addresses that must be blocked by the data center firewall. This list is updated daily.

How can the administrator automate a firewall policy with the daily updated list?

Options:

A.

With FortiNAC

B.

With FortiAnalyzer

C.

With a Security Fabric automation

D.

With an external connector from Threat Feeds

Buy Now
Questions 17

An administrator must enable direct communication between multiple spokes in a company's network. Each spoke has more than one internet connection.

The requirement is for the spokes to connect directly without passing through the hub, and for the links to automatically switch to the best available connection.

How can this automatic detection and optimal link utilization between spokes be achieved?

Options:

A.

Set up OSPF routing over static VPN tunnels between spokes.

B.

Utilize ADVPN 2.0 to facilitate dynamic direct tunnels and automatic link optimization.

C.

Establish static VPN tunnels between spokes with predefined backup routes.

D.

Implement SD-WAN policies at the hub to manage spoke link quality.

Buy Now
Exam Code: FCSS_EFW_AD-7.4
Exam Name: FCSS - Enterprise Firewall 7.4 Administrator
Last Update: Apr 28, 2025
Questions: 57
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now FCSS_EFW_AD-7.4