Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Fortinet FCP_FGT_AD-7.4 Practice Exam with Questions & Answers

Questions 1

Refer to the exhibit showing a debug flow output.

FCP_FGT_AD-7.4 Question 1

What two conclusions can you make from the debug flow output? (Choose two.)

Options:
A.

The debug flow is for ICMP traffic.

B.

A firewall policy allowed the connection.

C.

A new traffic session was created.

D.

The default route is required to receive a reply.

Fortinet FCP_FGT_AD-7.4 Premium Access
Questions 2

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)

Options:
A.

Manual with load balancing

B.

Lowest Cost (SLA) with load balancing

C.

Best Quality with load balancing

D.

Lowest Quality (SLA) with load balancing

E.

Lowest Cost (SLA) without load balancing

Questions 3

An organization requires remote users to send external application data running on their PCs and access FTP resources through an SSUTLS connection.

Which FortiGate configuration can achieve this goal?

Options:
A.

SSL VPN quick connection

B.

SSL VPN tunnel

C.

SSL VPN bookmark

D.

Zero trust network access

Questions 4

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 4

FCP_FGT_AD-7.4 Question 4

FCP_FGT_AD-7.4 Question 4

FGT-1 and FGT-2 are updated with HA configuration commands shown in the exhibit.

What would be the expected outcome in the HA cluster?

Options:
A.

FGT-1 will remain the primary because FGT-2 has lower priority.

B.

FGT-2 will take over as the primary because it has the override enable setting and higher priority than FGT-1.

C.

FGT-1 will synchronize the override disable setting with FGT-2.

D.

The HA cluster will become out of sync because the override setting must match on all HA members.

Questions 5

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 5

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

Options:
A.

Enable the parameter Never Timeout in the admin profiles

B.

Increase the admintimeout value under config system accprofile super_admin.

C.

Increase the admintimeout value under config system global

D.

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Questions 6

Which three methods are used by the collector agent for AD polling? (Choose three.)

Options:
A.

WinSecLog

B.

WMI

C.

NetAPI

D.

FSSO REST API

E.

FortiGate polling

Questions 7

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

Options:
A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

B.

The browser does not trust the certificate used by FortiGate for SSL inspection

C.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

D.

The matching firewall policy is set to proxy inspection mode

Questions 8

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 8

FCP_FGT_AD-7.4 Question 8

FCP_FGT_AD-7.4 Question 8

The exhibits show a diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device.

Two PCs, PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.

Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

Options:
A.

In the firewall policy configuration, add 10. o. l. 3 as an address object in the source field.

B.

In the IP pool configuration, set endig to 192.2.0.12.

C.

Configure another firewall policy that matches only the address of PC3 as source, and then place the policy on top of the list.

D.

In the IP pool configuration, set cype to overload.

Questions 9

Which statement is correct regarding the use of application control for inspecting web applications?

Options:
A.

Application control can identify child and parent applications, and perform different actions on them

B.

Application control signatures are included in Fortinet Antivirus engine

C.

Application control does not display a replacement message for a blocked web application

D.

Application control does not require SSL Inspection to Identity web applications

Questions 10

Refer to the exhibit.

FCP_FGT_AD-7.4 Question 10

In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output shown in the exhibit.

What should the administrator do next, to troubleshoot the problem?

Options:
A.

Execute a debug flow.

B.

Capture the traffic using an external sniffer connected to part1.

C.

Execute another sniffer on FortiGate, this time with the filter "hose 10.o.1.10".

D.

Run a sniffer on the web server.