Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Fortinet FCP_FGT_AD-7.4 Practice Exam with Questions & Answers | Set: 2

Questions 11

An administrator manages a FortiGate model that supports NTurbo.

How does NTurbo enhance performance for flow-based inspection?

Options:
A.

NTurbo offloads traffic to the content processor.

B.

NTurbo creates two inspection sessions on the FortiGate device.

C.

NTurbo buffers the whole file and then sends it to the antivirus engine.

D.

NTurbo creates a special data path to redirect traffic between the IPS engine its ingress and egress interfaces.

Fortinet FCP_FGT_AD-7.4 Premium Access
Questions 12

Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?

Options:
A.

Internet Service Database (ISDB) engine

B.

Intrusion prevention system engine

C.

Antivirus engine

D.

Application control engine

Questions 13

An administrator configured a FortiGate to act as a collector for agentless polling mode.

What must the administrator add to the FortiGate device to retrieve AD user group information?

Options:
A.

LDAP server

B.

RADIUS server

C.

DHCP server

D.

Windows server

Questions 14

An administrator must enable a DHCP server on one of the directly connected networks on FortiGate. However, the administrator is unable to complete the process on the GUI to enable the service on the interface.

In this scenario, what prevents the administrator from enabling DHCP service?

Options:
A.

The role of the interface prevents setting a DHCP server.

B.

The DHCP server setting is available only on the CLI.

C.

Another interface is configured as the only DHCP server on FortiGate.

D.

The FortiGate model does not support the DHCP server.

Questions 15

Refer to the exhibit, which shows the IPS sensor configuration.

FCP_FGT_AD-7.4 Question 15

If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)

Options:
A.

The sensor will gather a packet log for all matched traffic.

B.

The sensor will reset all connections that match these signatures.

C.

The sensor will allow attackers matching the Microsoft.Windows.iSCSl.Target.DoS signature.

D.

The sensor will block all attacks aimed at Windows servers.

Questions 16

Which two statements are true about the FGCP protocol? (Choose two.)

Options:
A.

FGCP is not used when FortiGate is in transparent mode

B.

FGCP elects the primary FortiGate device

C.

FGCP is used to discover FortiGate devices in different HA groups

D.

FGCP runs only over the heartbeat links

Questions 17

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 17

FCP_FGT_AD-7.4 Question 17

FCP_FGT_AD-7.4 Question 17

An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).

What must the administrator do to synchronize the address object?

Options:
A.

Change the csf setting on Local-FortiGate (root) to sec fabric-object-unification default.

B.

Change the csf setting on both devices to sec downscream-access enable.

C.

Change the csf setting on ISFW (downstream) to sec auchorizacion-requesc-cype certificace.

D.

Change the csf setting on ISFW (downstream) to sec configuration-sync local.

Questions 18

FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.

Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)

Options:
A.

www.example.com:443

B.

www.example.com

C.

www.example.com/index.hrml

D.

example.com

Questions 19

Refer to the exhibits.

FCP_FGT_AD-7.4 Question 19

FCP_FGT_AD-7.4 Question 19

FCP_FGT_AD-7.4 Question 19

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall policies configuration VIP configuration and IP pool configuration on the FortiGate device

The WAN (port1) interface has the IP address 10.200. l. 1/24 The LAN (port3) interface has the IP address 10.0.1.254/24

The first firewall policy has NAT enabled using the IP pool The second firewall policy is configured with a VIP as the destination address.

Which IP address will be used to source NAT (SNAT) the internet traffic coming from a workstation with the IP address 10.0.1.10?

Options:
A.

10.200.1.1

B.

10.200.1.10

C.

10.0.1.254

D.

10.200.1.100

Questions 20

Which statement is a characteristic of automation stitches?

Options:
A.

They can be run only on devices in the Security Fabric.

B.

They can be created only on downstream devices in the fabric.

C.

They can have one or more triggers.

D.

They can run multiple actions at the same time.