Refer to the exhibit showing FortiGate configurations

FortiManager VM high availability (HA) is not functioning as expected after being added to
an existing deployment.
The administrator finds that VRRP HA mode is selected, but primary and secondary roles
are greyed out in the GUI The managed devices never show online when FMG-B becomes
primary, but they will show online whenever the FMG-A becomes primary.
What change will correct HA functionality in this scenario?
A. Change the FortiManager IP address on the managed FortiGate to 10.3.106.65.
B. Make the monitored IP to match on both FortiManager devices.
C. Unset the primary and secondary roles in the FortiManager CLI configuration so VRRP will decide who is primary.
D. Change the priority of FMG-A to be numerically lower for higher preference
Explanation: B is correct because the monitored IP must match on both FortiManager devices for HA to function properly. This is explained in the FortiManager Administration Guide under High Availability > Configuring HA options > Configuring HA options using the GUI.
Refer to the exhibits.


A customer is trying to set up a VPN with a FortiGate, but they do not have a backup of the
configuration. Output during a troubleshooting session is shown in the exhibits A and B and
a baseline VPN configuration is shown in Exhibit C Referring to the exhibits, which
configuration will restore VPN connectivity?
A. Option A
B. Option B
C. Option C
D. Option D
Explanation: The output in Exhibit A shows that the VPN tunnel is not established
because the peer IP address is incorrect. The output in Exhibit B shows that the peer IP
address is 192.168.1.100, but the baseline VPN configuration in Exhibit C shows that the
peer IP address should be 192.168.1.101.
To restore VPN connectivity, you need to change the peer IP address in the VPN tunnel
configuration to 192.168.1.101. The correct configuration is shown below:
config vpn ipsec phase1-interface
edit "wan"
set peer-ip 192.168.1.101
set peer-id 192.168.1.101
set dhgrp 1
set auth-mode psk
set psk SECRET_PSK
next
end
Option A is incorrect because it does not change the peer IP address. Option B is incorrect
because it changes the peer IP address to 192.168.1.100, which is the incorrect IP
address. Option D is incorrect because it does not include the necessary configuration for
the VPN tunnel.
Refer to the exhibits.

A customer wants to deploy 12 FortiAP 431F devices on high density conference center,
but they do not currently have any PoE switches to connect them to. They want to be able
to run them at full power while having network redundancy
From the FortiSwitch models and sample retail prices shown in the exhibit, which build of
materials would have the lowest cost, while fulfilling the customer's requirements?
A. 1x FortiSwitch 248EFPOE
B. 2x FortiSwitch 224E-POE
C. 2x FortiSwitch 248E-FPOE
D. 2x FortiSwitch 124E-FPOE
Explanation: The customer wants to deploy 12 FortiAP 431F devices on a high density conference center, but they do not have any PoE switches to connect them to. They want to be able to run them at full power while having network redundancy. PoE switches are switches that can provide both data and power to connected devices over Ethernet cables, eliminating the need for separate power adapters or outlets. PoE switches are useful for deploying devices such as wireless access points, IP cameras, and VoIP phones in locations where power outlets are scarce or inconvenient. The FortiAP 431F is a wireless access point that supports PoE+ (IEEE 802.3at) standard, which can deliver up to 30W of power per port. The FortiAP 431F has a maximum power consumption of 25W when running at full power. Therefore, to run 12 FortiAP 431F devices at full power, the customer needs PoE switches that can provide at least 300W of total PoE power budget (25W x 12). The customer also needs network redundancy, which means that they need at least two PoE switches to connect the FortiAP devices in case one switch fails or loses power. From the FortiSwitch models and sample retail prices shown in the exhibit, the build of materials that has the lowest cost while fulfilling the customer’s requirements is 2x FortiSwitch 248EFPOE. The FortiSwitch 248E-FPOE is a PoE switch that has 48 GE ports with PoE+ capability and a total PoE power budget of 370W. It also has 4x 10 GE SFP+ uplink ports for high-speed connectivity. The sample retail price of the FortiSwitch 248E-FPOE is $1,995, which means that two units will cost $3,990. This is the lowest cost among the other options that can meet the customer’s requirements. Option A is incorrect because the FortiSwitch 248EFPOE is a non-PoE switch that has no PoE capability or power budget. It cannot provide power to the FortiAP devices over Ethernet cables. Option B is incorrect because the FortiSwitch 224E-POE is a PoE switch that has only 24 GE ports with PoE+ capability and a total PoE powerbudget of 185W. It cannot provide enough ports or power to run 12 FortiAP devices at full power. Option D is incorrect because the FortiSwitch 124EFPOE is a PoE switch that has only 24 GE ports with PoE+ capability and a total PoE power budget of 185W. It cannot provide enough ports or power to run 12 FortiAP devices at full power.
An administrator has configured a FortiGate device to authenticate SSL VPN users using
digital certificates. A FortiAuthenticator is the certificate authority (CA) and the Online
Certificate Status Protocol (OCSP) server.
Part of the FortiGate configuration is shown below:

Based on this configuration, which two statements are true? (Choose two.)
A. OCSP checks will always go to the configured FortiAuthenticator
B. The OCSP check of the certificate can be combined with a certificate revocation list.
C. OCSP certificate responses are never cached by the FortiGate.
D. If the OCSP server is unreachable, authentication will succeed if the certificate matches the CA.
Explanation:
B is correct because the OCSP check of the certificate can be combined with a
certificate revocation list (CRL). This means that the FortiGate will check the
OCSP server to see if the certificate has been revoked, and it will also check the
CRL to see if the certificate has been revoked.
D is correct because if the OCSP server is unreachable, authentication will
succeed if the certificate matches the CA. This is because the FortiGate will fall
back to using the CRL if the OCSP server is unreachable.
The other options are incorrect. Option A is incorrect because OCSP checks can go to
other OCSP servers, not just the FortiAuthenticator. Option C is incorrect because OCSP
certificate responses can be cached by the FortiGate.
Refer to the exhibit, which shows a Branch1 configuration and routing table.

In the SD-WAN implicit rule, you do not want the traffic load balance for the overlay
interface when all members are available.
In this scenario, which configuration change will meet this requirement?
A. Change the load-balance-mode to source-ip-based.
B. Create a new static route with the internet sdwan-zone only
C. Configure the cost in each overlay member to 10.
D. Configure the priority in each overlay member to 10.
Explanation: The default load balancing mode for the SD-WAN implicit rule is source IP
based. This means that traffic will be load balanced evenly between the overlay members,
regardless of the member's priority.
To prevent traffic from being load balanced, you can configure the priority of each overlay
member to 10. This will make the member ineligible for load balancing.
The other options are not correct. Changing the load balancing mode to source-IP based
will still result in traffic being load balanced. Creating a new static route with the internet
sdwan-zone only will not affect the load balancing of the overlay interface. Configuring the
cost in each overlay member to 10 will also not affect the load balancing, as the cost is only
used when the implicit rule cannot find a match for the destination IP address.
You want to use the MTA adapter feature on FortiSandbox in an HA-Cluster. Which statement about this solution is true?
A. The configuration of the MTA Adapter Local Interface is different than on port1.
B. The MTA adapter is only available in the primary node.
C. The MTA adapter mode is only detection mode.
D. The configuration is different than on a standalone device.
Explanation: The MTA adapter feature on FortiSandbox is a feature that allows
FortiSandbox to act as a mail transfer agent (MTA) that can receive, inspect, and forward
email messages from externalsources. The MTA adapter feature can be used to integrate
FortiSandbox with third-party email security solutions that do not support direct integration
with FortiSandbox, such as Microsoft Exchange Server or Cisco Email Security Appliance
(ESA). The MTA adapter feature can also be used to enhance email security by adding an
additional layer of inspection and filtering before delivering email messages to the final
destination. The MTA adapter feature can be enabled on FortiSandbox in an HA-Cluster,
which is a configuration that allows two FortiSandbox units to synchronize their settings
and data and provide high availability and load balancing for sandboxing services.
However, one statement about this solution that is true is that the MTA adapter is only
available in the primary node. This means that only one FortiSandbox unit in the HACluster
can act as an MTA and receive email messages from external sources, while the
other unit acts as a backup node that can take over the MTA role if the primary node fails
or loses connectivity. This also means that only one IP address or FQDN can be used to
configure the external sources to send email messages to the FortiSandbox MTA, which is
the IP address or FQDN of the primary node.
Refer to the exhibit.

A FortiWeb appliance is configured for load balancing web sessions to internal web
servers. The Server Pool is configured as shown in the exhibit.
How will the sessions be load balanced between server 1 and server 2 during normal
operation?
A. Server 1 will receive 25% of the sessions, Server 2 will receive 75% of the sessions
B. Server 1 will receive 20% of the sessions, Server 2 will receive 66.6% of the sessions
C. Server 1 will receive 33.3% of the sessions, Server 2 will receive 66 6% of the sessions
D. Server 1 will receive 0% of the sessions Server 2 will receive 100% of the sessions
Explanation: The Server Pool in the exhibit is configured with a weight of 20 for server 1
and a weight of 60 for server 2. This means that server 1 will receive 20% of the sessions
and server 2 will receive 75% of the sessions.
The following formula is used to calculate the load balancing between servers in a Server
Pool:
weight_of_server_1 / (weight_of_server_1 + weight_of_server_2)
In this case, the formula is:
20 / (20 + 60) = 20 / 80 = 0.25 = 25%
Therefore, server 1 will receive 25% of the sessions and server 2 will receive 75% of the
sessions.
A customer's cybersecurity department needs to implement security for the traffic between
two VPCs in AWS, but these belong to different departments within the company. The
company uses a single region for all their VPCs.
Which two actions will achieve this requirement while keeping separate management of
each department's VPC? (Choose two.)
A. Create a transit VPC with a FortiGate HA cluster, connect to the other two using VPC peering, and use routing tables to force traffic through the FortiGate cluster.
B. Create an 1AM account for the cybersecurity department to manage both existing VPC, create a FortiGate HA Cluster on each VPC and IPSEC VPN to force traffic between the VPCs through the FortiGate clusters
C. Migrate all the instances to the same VPC and create 1AM accounts for each department, then implement a new subnet for a FortiGate auto-scaling group and use routing tables to force the traffic through the FortiGate cluster.
D. Create a VPC with a FortiGate auto-scaling group with a Transit Gateway attached to the three VPC to force routing through the FortiGate cluster
Explanation: To implement security for the traffic between two VPCs in AWS, while
keeping separate management of each department’s VPC, two possible actions are:
Create a transit VPC with a FortiGate HA cluster, connect to the other two using
VPC peering, and use routing tables to force traffic through the FortiGate cluster.
This option allows the cybersecurity department to manage the transit VPC and
apply security policies on the FortiGate cluster, while the other departments can
manage their own VPCs and instances. The VPC peering connections enable
direct communication between the VPCs without using public IPs or gateways.
The routing tables can be configured to direct all inter-VPC traffic to the transit
VPC.
Create a VPC with a FortiGate auto-scaling group with a Transit Gateway attached
to the three VPCs to force routing through the FortiGate cluster. This option also
allows the cybersecurity department to manage the security VPC and apply
security policies on the FortiGate cluster, while the other departments can manage
their own VPCs and instances. The Transit Gateway acts as a network hub that
connects multiple VPCs and on-premises networks. The routing tables can be
configured to direct all inter-VPC traffic to the security VPC.
Which two statements are correct on a FortiGate using the FortiGuard Outbreak Protection Service (VOS)? (Choose two.)
A. The FortiGuard VOS can be used only with proxy-base policy inspections.
B. If third-party AV database returns a match the scanned file is deemed to be malicious.
C. The antivirus database queries FortiGuard with the hash of a scanned file
D. The AV engine scan must be enabled to use the FortiGuard VOS feature
E. The hash signatures are obtained from the FortiGuard Global Threat Intelligence database.
Explanation:
C. The antivirus database queries FortiGuard with the hash of a scanned file. This
is how the FortiGuard VOS service works. The FortiGate queries FortiGuard with
the hash of a scanned file, and FortiGuard returns a list of known malware
signatures that match the hash.
E. The hash signatures are obtained from the FortiGuard Global Threat
Intelligence database. This is where the FortiGuard VOS service gets its hash
signatures from. The FortiGuard Global Threat Intelligence database is updated
regularly with new malware signatures.
You must analyze an event that happened at 20:37 UTC. One log relevant to the event is
extracted from FortiGate logs:

The devices and the administrator are all located in different time zones Daylight savings
time (DST) is disabled
• The FortiGate is at GMT-1000.
• The FortiAnalyzer is at GMT-0800
• Your browser local time zone is at GMT-03.00
You want to review this log on FortiAnalyzer GUI, what time should you use as a filter?
A. 20:37:08
B. 10:37:08
C. 17:37:08
D. 12.37:08
Explanation: To review this log on FortiAnalyzer GUI, the administrator should use the time filter that matches the local time zone of FortiAnalyzer, which is GMT-0800. Since the log was generated at 20:37 UTC (GMT+0000), the corresponding time in GMT-0800 is 20:37 - 8 hours = 12:37. However, since DST is disabled on FortiAnalyzer, the administrator should add one hour to account for daylight saving time difference, resulting in 12:37 + 1 hour = 13:37. Therefore, the time filter to use is 13:37:08.
A customer wants to use the FortiAuthenticator REST API to retrieve an SSO group called
SalesGroup. The following API call is being made with the 'curl' utility:

Which two statements correctly describe the expected behavior of the FortiAuthenticator
REST API? (Choose two.)
A. Only users with the "Full permission" role can access the REST API
B. This API call will fail because it requires that API version 2
C. If the REST API web service access key is lost, it cannot be retrieved and must be changed.
D. The syntax is incorrect because the API calls needs the get method.
Explanation: To retrieve an SSO group called SalesGroup using the FortiAuthenticator
REST API, the following issues need to be fixed in the API call:
The API version should be v2, not v1, as SSO groups are only supported in
version 2 of the REST API.
The HTTP method should be GET, not POST, as GET is used to retrieve
information from the server, while POST is used to create or update information on
the server. Therefore, a correct API call would look like this: curl -X GET -H
“Authorization: Bearer
You must configure an environment with dual-homed servers connected to a pair of
FortiSwitch units using an MCLAG.
Multicast traffic is expected in this environment, and you should ensure unnecessary traffic
is pruned from links that do not have a multicast listener.
In which two ways must you configure the igmps-f lood-traffic and igmps-flood-report
settings? (Choose two.)
A. disable on ICL trunks
B. enable on ICL trunks
C. disable on the ISL and FortiLink trunks
D. enable on the ISL and FortiLink trunks
Explanation: To ensure that unnecessary multicast traffic is pruned from links that do not
have a multicast listener, you must disable IGMP flood traffic on the ICL trunks and enable
IGMP flood reports on the ISL and FortiLink trunks.
Disabling IGMP flood traffic will prevent the FortiSwitch units from flooding multicast traffic
to all ports on the ICL trunks. This will help to reduce unnecessary multicast traffic on the
network.
Enabling IGMP flood reports will allow the FortiSwitch units to learn which ports are
interested in receiving multicast traffic. This will help the FortiSwitch units to prune multicast
traffic from links that do not have a multicast listener.
| Page 3 out of 9 Pages |
| Previous |