You need to deploy FortiGate VM devices in a highly available topology in the Microsoft Azure cloud.
The following are the requirements of your deployment:
Two FortiGate devices must be deployed; each in a different availability zone.
Each FortiGate requires two virtual network interfaces: one will connect to a public subnet
and the other will connect to a private subnet.
An external Microsoft Azure load balancer will distribute ingress traffic to both FortiGate
devices in an active- active topology.
An internal Microsoft Azure load balancer will distribute egress traffic from protected virtual
machines to both FortiGate devices in an active-active topology.
Traffic should be accepted or denied by a firewall policy in the same way by either FortiGate
device in this topology.
Which FortiOS CLI configuration can help reduce the administrative effort required to maintain the
FortiGate devices, by synchronizing firewall policy and object configuration between the FortiGate
devices?
B
Reference: https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/84777/using-standalone-
configuration- synchronization
Customer XYZ has an ExpressRoute connection from Microsoft Azure to a data center. They want to
secure communication over ExpressRoute, and to install an in-line FortiGate to perform intrusion
prevention system (IPS) and antivirus scanning.
Which three methods can the customer use to ensure that all traffic from the data center is sent
through FortiGate over ExpressRoute? (Choose three.)
CDE
Refer to the exhibit.
You are configuring an active-passive FortiGate clustering protocol (FGCP) HA configuration in a
single availability zone in Amazon Web Services (AWS), using a cloud formation template.
After deploying the template, you notice that the AWS console has IP information listed in the
FortiGate VM firewalls in the HA configuration. However, within the configuration of FortiOS, you
notice that port1 is using an IP of 10.0.0.13, and port2 is using an IP of 10.0.1.13.
What should you do to correct this issue?
C
Which statement about FortiSandbox in Amazon Web Services (AWS) is true?
C
You have been asked to develop an Azure Resource Manager infrastructure as a code template for
the FortiGate-VM, that can be reused for multiple deployments. The deployment fails, and errors
point to the storageAccount name.
Which two are restrictions for a storageAccount name in an Azure Resource Manager template?
(Choose two.)
AC
An organization deployed a FortiGate-VM in the Google Cloud Platform and initially configured it
with two vNICs. Now, the same organization wants to add additional vNICs to this existing FortiGate-
VM to support different workloads in their environment.
How can they do this?
D
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/62d32ecf-
687f-11ea- 9384-00505692583a/FortiOS-6.4-GCP_Cookbook.pdf
Refer to the exhibit.
Which two conditions will enable you to segregate and secure the traffic between the hub and the
spokes in Microsoft Azure? (Choose two.)
BD
Refer to the exhibit.
The exhibit shows a topology where multiple connections from clients to the same FortiGate-VM
instance, regardless of the protocol being used, are required.
Which two statements are correct? (Choose two.)
AB
An organization deploys a FortiGate-VM (VM04 / c4.xlarge) in Amazon Web Services (AWS) and
configures two elastic network interfaces (ENIs). Now, the same organization wants to add additional
ENIs to support different workloads in their environment.
Which action can you take to accomplish this?
B
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9e3b59dc-
ba0b-11e9- a989-00505692583a/FortiOS_6.2_AWS_Cookbook.pdf
Which two statements about Amazon Web Services (AWS) networking are correct? (Choose two.)
CD
Reference: https://docs.aws.amazon.com/sdkfornet/v3/apidocs/items/EC2/TIEC2.html
You have previously deployed an Amazon Web Services (AWS) transit virtual private cloud (VPC) with
a pair of FortiGate firewalls (VM04 / c4.xlarge) as your security perimeter. You are beginning to see
high CPU usage on the FortiGate instances.
Which action will fix this issue?
D
Which two Amazon Web Services (AWS) topologies support east-west traffic inspection within the
AWS cloud
by the FortiGate VM? (Choose two.)
BC
Reference: https://www.fortinet.com/content/dam/fortinet/assets/white-papers/wp-aws-reference-
architecture.pdf
Refer to the exhibit.
Consider an active-passive HA deployment in Microsoft Azure. The exhibit shows an excerpt from the
passive FortiGate-VM node.
If the active FortiGate-VM fails, what are the results of the API calls made by the FortiGate named
SSTENTAZFGT-0302? (Choose two.)
AB
Your company deploys FortiGate VM devices in high availability (HA) (active-active) mode with
Microsoft Azure load balancers using the Microsoft Azure ARM template. Your senior administrator
instructs you to connect to one of the FortiGate devices and configure the necessary firewall rules.
However, you are not sure now to obtain the correct public IP address of the deployed FortiGate VM
and identify the access ports.
How do you obtain the public IP address of the FortiGate VM and identify the correct ports to access
the device?
C
Reference: https://www.fortinet.com/content/dam/fortinet/assets/deployment-guides/dg-fortigate-
high- availability-azure.pdf
You have been asked to secure your organizations salesforce application that is running on Microsoft
Azure, and find an effective method for inspecting shadow IT activities in the organization. After an
initial investigation, you find that many users access the salesforce application remotely as well as
on-premises.
Your goal is to find a way to get more visibility, control over shadow IT-related activities, and identify
any data leaks in the salesforce application.
Which three steps should you take to achieve your goal? (Choose three.)
ABC