Knowledge Check Questions Flashcards
Which is more accurate description of a modern firewall?
a. A device that inspects network traffic at an entry point to the internet and within a simple, easily defined network perimeter
b. A multifunctional device that inspects network from the perimeter or internally, within a network that has many different entry points
b. A multifunctional device that inspects network from the perimeter or internally, within a network that has many different entry points
Which solution, specific to Fortinet, enhances performance and reduces latency for specific features and traffic?
a. Acceleration hardware, call SPUs
b. Increased RAM and CPU power
a. Acceleration hardware, call SPUs
Which protocol does FortiGate use to download antivirus and IPS packages?
a. UDP
b. TCP
b. TCP
Larger packages to download = TCP
How does FortiGate check content for spam or malicious websites?
a. Live queries to FortiGate over UDP or HTTPS
b. Local verification using a downloaded web filter database locally on the FortiGate
a. Live queries to FortiGate over UDP or HTTPS
How do you restrict logins to FortiGate from only specific IP addresses?
a. Change FortiGate management interface IP address
b. Configure trusted host
b. Configure trusted host
As a best security practice when configuring administrative access to the FortiGate, which protocol should you disable?
a. Telnet
b. SSH
a. Telnet
When configuring FortiGate as a DHCP server, to restrict access by MAC address, what does the Assign IP option do?
a. Assigns a specific IP address to a MAC address
b. Dynamically assigns an IP to a MAC address
b. Dynamically assigns an IP to a MAC address
When configuring FortiGate as a DNS server which resolution method uses the FortiGate DNS database to try to resolve queries?
a. Non-recursive
b. Recursive
a. Non-recursive
When restoring an encrypted system configuration file, in addition to needing the FortiGate model and firmware version from the time the configuration was produced, what must you also provide?
a. The password to decrypt the file
b. The private decryption key to decrypt the file
a. The password to decrypt the file
Which document should you consult to increase the changes or success before upgrading or downgrading firmware?
a. Cookbook
b. Release Notes
b. Release Notes
What is the Fortinet Security Fabric?
a. A device that can manage all your firewalls
b. A Fortinet solution that enables communication and visibility among devices of your network
b. A Fortinet solution that enables communication and visibility among devices of your network
Which combination of devices must participate in the Security Fabric?
a. A FortiAnalyzer and two or more FortiGate devices
b. a FortiMail and two or more FortiGate devices
a. A FortiAnalyzer and two or more FortiGate devices
What are the two mandatory settings of the Security Fabric configuration?
a. Fabric name and Security Fabric role
b. Fabric name and FortiManager IP address
a. Fabric name and Security Fabric role
From where do you authorize a device to participate in the Security Fabric?
a. From the downstream FortiGate
b. From the root FortiGate
b. From the root FortiGate
Why should an administrator extend the Security Fabric to other devices?
a. To provide a single pane of glass for management and reporting purposes
b. To eliminate the need to purchase licenses for FortiGate devices in the Security Fabric
a. To provide a single pane of glass for management and reporting purposes
What is the purpose of Security Fabric external connectors?
a. External connectors allow you to integrate multi-cloud support with the Security Fabric
b. External connectors allow you to connect the FortiGate command line interface (CLI)
a. External connectors allow you to integrate multi-cloud support with the Security Fabric
Which one is a part of the Security Rating scorecard?
a. Firewall Policy
b. Optimization
b. Optimization
From which view can an administrator deauthorize a device from the Security Fabric?
a. From the physical topology view
b. From the Fortiview
a. From the physical topology view
What criteria does FortiGate use to match traffic to a firewall policy?
a. Source and destination interfaces
b. Security profiles
a. Source and destination interfaces
What must be selected in the Source field of a firewall policy?
a. At least one address object or ISDB
b. At least one source user and one source address object.
a. At least one address object or ISDB
To configure a firewall policy, you must include a firewall policy name when configuring using the ….
a. CLI
b. GUI
b. GUI
What is the purpose of applying security profiles to a firewall policy?
a. To allow access to specific subnets
b. To protect your network from threats, and control access to specific applications and URLs.
b. To protect your network from threats, and control access to specific applications and URLs.
If you configure a firewall policy with the any interface, you can view the firewall policy list only in which view?
a. The By Sequence View
b. The Interface Pair View
a. The By Sequence View
Which of the following naming formats is correct when configuring a name for a firewall address object?
a. Good_Training
b. Good(Training)
a. Good_Training
What is the purpose of the policy lookup feature on the FortiGate?
a. To find a matching policy based on input criteria
b. To block traffic based on input criteria
a. To find a matching policy based on input criteria
What is NAT used for?
a. Preserving IP addresses
b. Traffic shaping
a. Preserving IP addresses
What statement about NAT66 is true?
a. It is NAT between two IPv6 networks?
b. It is NAT between two IPv4 networks?
a. It is NAT between two IPv6 networks?
What is the default IP pool type?
a. One-to-one
b. Overload
b. Overload
Which of the following is the default VIP type?
a. static-nat
b. load-balance
a. static-nat
Which statement is true?
a. Central NAT is not enabled by default
b. Both central NAT and firewall policy NAT can be enabled together
a. Central NAT is not enabled by default
What happens if there is no matching central SNAT policy or no central SNAT policy configured?
a. The egress interface IP will be used
b. NAT will not be applied to the firewall session
b. NAT will not be applied to the firewall session
Which method would you use for advanced application tracking and control?
a. session helper
b. Application Layer Gateway
b. Application Layer Gateway
Which profile is an example of application layer gateway?
a. WAF Profile
b. VOIP Profile
b. VOIP Profile
If session diagnostic output indicates that a TCP protocol state is in proto_state=01, which is true?
a. The session is established
b. The session is not established
a. The session is established
An administrator wants to check the total number of TCP session for an IP pool named INTERNAL. Which CLI command should the administrator use?
a. diagnose firewall ippool-all stats INTERNAL
b. diagnose firewall ippool-all list INTERNAL
a. diagnose firewall ippool-all stats INTERNAL
Which firewall authentication method does FortiGate support?
a. Local password authentication
b. Biometric authentication
a. Local password authentication
Which type of token can generate OTPs to provide two-factor authentication to users in your network?
a. FortiToken Mobile
b. USB FortiToken
a. FortiToken Mobile
When FortiGate uses a RADIUS server for remote authentication, which statement about RADIUS is true?
a. FortiGate must query the remote RADIUS server using the distinguished name (dn)
b. RADIUS group memberships are provided by vendor-specific attributes (VSAs) configured on the RADIUS server.
b. RADIUS group memberships are provided by vendor-specific attributes (VSAs) configured on the RADIUS server.
Which is a valid reply from a RADIUS server to an ACCESS-REQUEST packet from FortiGate?
a. ACCESS-PENDING
b. ACCESS-REJECT
b. ACCESS-REJECT
A remote LDAP user is trying to authenticate with a username and password. How does FortiGate verify the login credentials?
a. FortiGate queries its own database for user credentials
b. FortiGate sends the user-entered credential to the remote server for verification
b. FortiGate sends the user-entered credential to the remote server for verification
Which statement about guest user groups is true?
a. Guest user group accounts are temporary
b. Guest user group account passwords are temporary?
a. Guest user group accounts are temporary
Guest accounts are most commonly user for which purposes?
a. To provide temporary visitor access to corporate network resources
b. To provide temporary visitor access to wireless networks
b. To provide temporary visitor access to wireless networks
Firewall policies dictate whether a user or device can or cannot authenticate on a network. Which statement about firewall authentication is true?
a. Firewall policies can be configured to authenticate certificate users
b. The order of the firewall policies always determines whether a user’s credentials are determined actively or passively.
a. Firewall policies can be configured to authenticate certificate users
Which statement about active authentication is true?
a. Active authentication is always used before passive authentication
b. The firewall policy must allow HTTP, HTTPS, FTP and/or Telnet protocols in order for the user to be prompted for credentials
b. The firewall policy must allow HTTP, HTTPS, FTP and/or Telnet protocols in order for the user to be prompted for credentials
Which statement about captive portal is true?
a. Captive portal must be hosted on a FortiGate device?
b. Captive portal can exempt specific devices from authenticating
b. Captive portal can exempt specific devices from authenticating
Which statement best describes the authentication idle timeout feature on FortiGate?
a. The length of time FortiGate waits for the user to enter their authentication credentials
b. The length of time an authenticated user is allowed to remain authenticated without any packets being generated by the host device.
b. The length of time an authenticated user is allowed to remain authenticated without any packets being generated by the host device.
Which command would you use to identify the IP addresses of all authenticated users?
a. diagnose firewall auth clear
b. diagnose firewall auth list
b. diagnose firewall auth list
Which type of logs are application control, web filter, antivirus, and DLP?
a. Event
b. Security
b. Security
The log ____ contains fields that are common to all log types, such as originating date and time, log identifier, log category and VDOM
a. header
b. body
a. header
Which storage type is preferred for logging?
a. Remote logging
b. Hard drive
a. Remote logging
Which protocol does FortiGate use to send encrypted logs to FortiAnalyzer?
a. OFTPS
b. SSL
a. OFTPS
If you enable reliable logging, which transport protocol will FortiGate use?
a. UDP
b. TCP
b. TCP
In your firewall policy, which setting must you enable to generate logs on traffic sent through that firewall policy?
a. Log Allowed Traffic
b. Event Logging
a. Log Allowed Traffic
With email alerts, you can trigger alert emails based on _____ or log severity level.
a. event
b. threat weight
a. event
What happens when logs roll?
a. It lowers the space requirements needed to contain those logs.
b. They are uploaded to a TFP server?
a. It lowers the space requirements needed to contain those logs.
When you download logs on the GUI, ___
a. all logs in the SQL database are downloaded
b. only your current view, including any filters set are downloaded
b. only your current view, including any filters set are downloaded
Which attribute or extension identifies the owner of a certificate?
a. The subject name in the certificate
b. The unique serial number in the certificate
a. The subject name in the certificate
How does FortiGate determine if a certificate has been revoked?
a. It checked the CRL that resides on the FortiGate
b. It retrieves the CRL from a directory server
a. It checked the CRL that resides on the FortiGate
Which certificate extension and value is required in the FortiGate CA certificate in order to enable full SSL inspection?
a. CRL DP=ca_arl.arl
b. cA=True
b. cA=True
Which configuration requires FortiGate to act as a CA for full SSL inspection?
a. Multiple clients connecting to multiple servers
b. Protecting the SSL server
a. Multiple clients connecting to multiple servers
Which is the default inspection mode on a firewall policy?
a. Proxy based
b. Flow based
b. Flow based
How does NGFW policy-based mode differ from profile-based mode?
a. Policy-based flow inspection supports web profile overrides.
b. Policy-based flow inspection defines URL filters directly in the firewall policy
b. Policy-based flow inspection defines URL filters directly in the firewall policy
Which statement about proxy-based web filtering is true?
a. It requires more resources than flow-based
b. It transparently analyzes the TCP flow of the traffic
a. It requires more resources than flow-based
Which is a valid action for FortiGuard web category filtering?
a. Allow
b. Deny
a. Allow
Which is a valid action for static URL filtering?
a. Exempt
b. Warning
a. Exempt
Which action can be used with the FortiGuard quota feature?
a. Monitor
b. Shape
a. Monitor
Which statement about web profile overrides is true?
a. It is used to change the website category
b. Configured users can activate this setting through an override link on the FortiGuard block page.
b. Configured users can activate this setting through an override link on the FortiGuard block page.
Which is required to configure YouTube video filtering?
a. YouTube API key
b. Username
a. YouTube API key
Which action can be used with the video FortiGuard categories?
a. Authenticate
b. Monitor
b. Monitor