Click the Exhibit button.
Click the Exhibit button.
A FortiGate with the default configuration is deployed between two IP phones. FortiGate receives
the INVITE request shown in the exhibit form Phone A (internal)to Phone B (external). Which two
actions are taken by the FortiGate after the packet is received? (Choose two.)
BC
Explanation:
Also, the FortiGate must translate the addresses contained in the SIP headers and SDP body of the
SIP
messages
The RTP port number as defined in the SIP message and an RTCP port number, which is the RTP port
number plus 1
Click the Exhibit button.
A customer has just finished their Azure deployment to secure a Web application behind a FortiGate
and a FortiWeb. Now they want to add components to protect against advanced threats (zero day
attacks), centrally manage the entire environment, and centrally monitor Fortinet and non-Fortinet
products.
Which Fortinet solutions will satisfy these requirements?
C
You configure an outgoing firewall policy with a web filter for accessing the internet. The access to
URL https// itacm.co and web belonging to the same category should be blocked. You notice that the
Web server presents a certificate with CN=www acme.com. The
www.it.acme
site is as '' information
Technology and the
www.acme.com
site is categorized as ''Business".
Which statements is correct in this scenario?
D
Explanation:
FortiOS parses TLS server name indication (SNI) from TSL Client Hello. When this value has been
retrieved, it will be used for non-deep web filtering inspection, in preference to the existing HTTPS
Server CN web filtering.
Refer to the Exhibit button.
You need to run a script in FortiManager against managed FortiGate devices in your organization to
install a configuration for a new static route. Which two scripts will successfully configure the static
route on the managed device? (Choose two.)
BC
You deploy a FortiGate device in a remote office based on the requirements shown below.
-- Due to company's security policy, management IP of your FortiGate is not allowed to access the
Internet.
-- Apply Web Filtering, Antivirus, IPS and Application control to the protected subnet.
-- Be managed by a central FortiManager in the head office.
Which action will help to achieve the requirements?
B
Click the Exhibit button.
config system ha
set mode a-a
set group-id 1
set group-name main
set hb_dev port2 100
set session-pickup enable
end
You have configured an HA cluster with two FortiGates. You want to make sure that you are able to
manage the individual cluster members directly using port3.
Referring to the exhibit, what are two ways to accomplish this task? (Choose two.)
BC
An old router has been replaced by a FortiWAN device. The FortiWAN has inherited the routers
management IP address and now the network administrator needs to remove the old router from
the FortiSIEM configuration.
Which two statements are true about this operation? (Choose two.)
AD
Explanation:
https://www.fortinetguru.com/2017/05/fortisiem-decommissioning-a-device/
Exhibit
An organization has a FortiGate cluster that is connected to two independent ISPs. You must
configure the FortiGate failover for a single ISP failure to occur without disruption.
Referring to the exhibit, which two FortiGate BGP features are enabled to accomplish this task?
(Choose two.)
BD
Refer to the exhibit.
You are working on FortiGate 61E operating in flow-based inspection mode with various settings
optimized for performance. The main Internet firewall policy is using the "default" antivirus profile.
You found that some executable virus samples files downloaded over HTTP are not being blocked by
the FortiGate.
Referring to the exhibit, how can this be fixed?
A
A company has just rolled out new remote sites and now you need to deploy a single firewall policy
to all of these sites to allow Internet access using FortiManager. For this particular firewall policy, the
source address object is called LAN, but its value will change according to the site the policy is being
installed.
Which statement about creating the object LAN is correct?
A
Click the Exhibit button.
Central NAT was configured on a FortiGate firewall. A sniffer shows ICMP packets out to a host on the
Internet egresses with the port1 IP address instead of the virtual IP(VIP) that was configured.
Referring to the exhibit, which configuration will ensure that ICMP traffic is also translated?
C
You configured a firewall policy with only a Web filter profile for accessing the Internet. Access to
websites belonging to the "Information Technology" category are blocked and to the "Business"
category are allowed. SSL deep inspection is not enabled on this policy.
A user wants to access the website
https://www.it-acme.com
which presents a certificate with
CN=www.acme.com. The it-acme.com domain is categorized as "Information Technology" and the
acme.com domain is categorized as "Business".
Which statement regarding this scenario is correct?
B
A FortOS devices is used for termination of VPNs for number of remote spoke VPN units (designated
group A spokes) using a phase 1 main mode dial-up tunnel using pre-shared. Your company recently
acquired another organization. You are asked establish VPN correctively for the newly acquired
organization's sites which new devices will be provisioned (designated Group B spokes). Both exiting
(Group A) and new (Group B) spoke units are dynamically addressed. You are asked to ensure that
spokes from the acquired organization (Group B) have different access permission than your existing
VPN spokes (Group A).
Which two solutions meet the represents for the new spoke group? (Choose two.)
CD
Click the Exhibit button.
Only users authenticated in FortiGate-B can reach the server. A customer wants to deploy a single
sign-on solution for IPsec VPN users. Once a user is connected and authenticated to the VPN in
FortiGate-A, the user does not need to authenticate again in FortiGate B to reach the server.
Which two actions satisfy this requirement? (Choose two.)
BC
Click the Exhibit button. An administrator implements a multi-chassis link aggregation (MCLAG)
solution using two FortiSwitch 448Ds and one FortiGate 3700D. As describes in the network topology
shown in the exhibit, two links are connected to each FortiSwitch. What is requires to implement this
solution? (Choose two.)
CD