Knowledge Check Questions Flashcards
(174 cards)
Which is more accurate description of a modern firewall?
a. A device that inspects network traffic at an entry point to the internet and within a simple, easily defined network perimeter
b. A multifunctional device that inspects network from the perimeter or internally, within a network that has many different entry points
b. A multifunctional device that inspects network from the perimeter or internally, within a network that has many different entry points
Which solution, specific to Fortinet, enhances performance and reduces latency for specific features and traffic?
a. Acceleration hardware, call SPUs
b. Increased RAM and CPU power
a. Acceleration hardware, call SPUs
Which protocol does FortiGate use to download antivirus and IPS packages?
a. UDP
b. TCP
b. TCP
Larger packages to download = TCP
How does FortiGate check content for spam or malicious websites?
a. Live queries to FortiGate over UDP or HTTPS
b. Local verification using a downloaded web filter database locally on the FortiGate
a. Live queries to FortiGate over UDP or HTTPS
How do you restrict logins to FortiGate from only specific IP addresses?
a. Change FortiGate management interface IP address
b. Configure trusted host
b. Configure trusted host
As a best security practice when configuring administrative access to the FortiGate, which protocol should you disable?
a. Telnet
b. SSH
a. Telnet
When configuring FortiGate as a DHCP server, to restrict access by MAC address, what does the Assign IP option do?
a. Assigns a specific IP address to a MAC address
b. Dynamically assigns an IP to a MAC address
b. Dynamically assigns an IP to a MAC address
When configuring FortiGate as a DNS server which resolution method uses the FortiGate DNS database to try to resolve queries?
a. Non-recursive
b. Recursive
a. Non-recursive
When restoring an encrypted system configuration file, in addition to needing the FortiGate model and firmware version from the time the configuration was produced, what must you also provide?
a. The password to decrypt the file
b. The private decryption key to decrypt the file
a. The password to decrypt the file
Which document should you consult to increase the changes or success before upgrading or downgrading firmware?
a. Cookbook
b. Release Notes
b. Release Notes
What is the Fortinet Security Fabric?
a. A device that can manage all your firewalls
b. A Fortinet solution that enables communication and visibility among devices of your network
b. A Fortinet solution that enables communication and visibility among devices of your network
Which combination of devices must participate in the Security Fabric?
a. A FortiAnalyzer and two or more FortiGate devices
b. a FortiMail and two or more FortiGate devices
a. A FortiAnalyzer and two or more FortiGate devices
What are the two mandatory settings of the Security Fabric configuration?
a. Fabric name and Security Fabric role
b. Fabric name and FortiManager IP address
a. Fabric name and Security Fabric role
From where do you authorize a device to participate in the Security Fabric?
a. From the downstream FortiGate
b. From the root FortiGate
b. From the root FortiGate
Why should an administrator extend the Security Fabric to other devices?
a. To provide a single pane of glass for management and reporting purposes
b. To eliminate the need to purchase licenses for FortiGate devices in the Security Fabric
a. To provide a single pane of glass for management and reporting purposes
What is the purpose of Security Fabric external connectors?
a. External connectors allow you to integrate multi-cloud support with the Security Fabric
b. External connectors allow you to connect the FortiGate command line interface (CLI)
a. External connectors allow you to integrate multi-cloud support with the Security Fabric
Which one is a part of the Security Rating scorecard?
a. Firewall Policy
b. Optimization
b. Optimization
From which view can an administrator deauthorize a device from the Security Fabric?
a. From the physical topology view
b. From the Fortiview
a. From the physical topology view
What criteria does FortiGate use to match traffic to a firewall policy?
a. Source and destination interfaces
b. Security profiles
a. Source and destination interfaces
What must be selected in the Source field of a firewall policy?
a. At least one address object or ISDB
b. At least one source user and one source address object.
a. At least one address object or ISDB
To configure a firewall policy, you must include a firewall policy name when configuring using the ….
a. CLI
b. GUI
b. GUI
What is the purpose of applying security profiles to a firewall policy?
a. To allow access to specific subnets
b. To protect your network from threats, and control access to specific applications and URLs.
b. To protect your network from threats, and control access to specific applications and URLs.
If you configure a firewall policy with the any interface, you can view the firewall policy list only in which view?
a. The By Sequence View
b. The Interface Pair View
a. The By Sequence View
Which of the following naming formats is correct when configuring a name for a firewall address object?
a. Good_Training
b. Good(Training)
a. Good_Training