Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Fortinet NSE7_SDW-7.0 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which diagnostic command can you use to show the configured SD-WAN zones and their assigned members?

Options:
A.

diagnose sys sdwan zone

B.

diagnose sys sdwan service

C.

diagnose sys sdwan member

D.

diagnose sys sdwan interface

Fortinet NSE7_SDW-7.0 Premium Access
Questions 12

NSE7_SDW-7.0 Question 12

Which two conclusions for traffic that matches the traffic shaper are true? (Choose two.)

Options:
A.

The traffic shaper drops packets if the bandwidth is less than 2500 KBps.

B.

The measured bandwidth is less than 100 KBps.

C.

The traffic shaper drops packets if the bandwidth exceeds 6250 KBps.

D.

The traffic shaper limits the bandwidth of each source IP to a maximum of 6250 KBps.

Questions 13

NSE7_SDW-7.0 Question 13

Two hub-and-spoke groups are connected through a site-to-site IPsec VPN between Hub 1 and Hub 2. The administrator configured ADVPN on both hub-and-spoke groups.

Which two outcomes are expected if a user in Toronto sends traffic to London? (Choose two.)

Options:
A.

London generates an IKE information message that contains the Toronto public IP address.

B.

Traffic from Toronto to London triggers the dynamic negotiation of a direct site-to-site VPN.

C.

Toronto needs to establish a site-to-site tunnel with Hub 2 to bypass Hub 1.

D.

The first packets from Toronto to London are routed through Hub 1 then to Hub 2.

Questions 14

Refer to the exhibit.

NSE7_SDW-7.0 Question 14

Which are two expected behaviors of the traffic that matches the traffic shaper? (Choose two.)

Options:
A.

The number of simultaneous connections among all source IP addresses cannot exceed five connections.

B.

The traffic shaper limits the combined bandwidth of all connections to a maximum of 5 MB/sec.

C.

The number of simultaneous connections allowed for each source IP address cannot exceed five connections.

D.

The traffic shaper limits the bandwidth of each source IP address to a maximum of 625 KB/sec.

Questions 15

Which two statements about SLA targets and SD-WAN rules are true? (Choose two.)

Options:
A.

When configuring an SD-WAN rule, you can select multiple SLA targets of the same performance SLA.

B.

SD-WAN rules use SLA targets to check if the preferred members meet the SLA requirements.

C.

SLA targets are used only by SD-WAN rules that are configured with Lowest Cost (SLA) or Maximize Bandwidth (SLA) as strategy.

D.

Member metrics are measured only if an SLA target is configured.

Questions 16

What are two benefits of using forward error correction (FEC) in IPsec VPNs? (Choose two.)

Options:
A.

FEC supports hardware offloading.

B.

FEC improves reliability of noisy links.

C.

FEC transmits parity packets that can be used to reconstruct packet loss.

D.

FEC can leverage multiple IPsec tunnels for parity packets transmission.

Questions 17

Refer to the exhibit.

NSE7_SDW-7.0 Question 17

Which statement about the role of the ADVPN device in handling traffic is true?

Options:
A.

This is a spoke that has received a query from a remote hub and has forwarded the response to its hub.

B.

Two hubs, 10.0.1.101 and 10.0.2.101, are receiving and forwarding queries between each other.

C.

This is a hub that has received a query from a spoke and has forwarded it to another spoke.

D.

Two spokes, 192.2.0.1 and 10.0.2.101, forward their queries to their hubs.

Questions 18

Which are two benefits of using CLI templates in FortiManager? (Choose two.)

Options:
A.

You can reference meta fields.

B.

You can configure interfaces as SD-WAN members without having to remove references first.

C.

You can configure FortiManager to sync local configuration changes made on the managed device, to the CLI template.

D.

You can configure advanced CLI settings.

Questions 19

Which three matching traffic criteria are available in SD-WAN rules? (Choose three.)

Options:
A.

Type of physical link connection

B.

Internet service database (ISDB) address object

C.

Source and destination IP address

D.

URL categories

E.

Application signatures

Questions 20

Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)

Options:
A.

Encapsulating Security Payload (ESP)

B.

Secure Shell (SSH)

C.

Internet Key Exchange (IKE)

D.

Security Association (SA)

Exam Code: NSE7_SDW-7.0
Certification Provider: Fortinet
Exam Name: Fortinet NSE 7 - SD-WAN 7.0
Last Update: Jul 19, 2025
Questions: 70

Fortinet Free Exams

Fortinet Free Exams
Access free Fortinet exam study guides and practice tests at Examstrack. Ensure your success with top-notch preparation resources at Examstrack.