Fortinet FCP_FGT_AD-7.4 - FCP - FortiGate 7.4 Administrator Exam

Question #6 (Topic: Exam A)
Refer to the exhibits.



The exhibits show a diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device.
Two PCs, PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.
Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)
A. In the firewall policy configuration, add 10.0.1.3 as an address object in the source field. B. In the IP pool configuration, set endip to 192.2.0.12. C. Configure another firewall policy that matches only the address of PC3 as source, and then place the policy on top of the list. D. In the IP pool configuration, set type to overload.
Answer: BD
Question #7 (Topic: Exam A)
Which method allows management access to the FortiGate CLI without network connectivity?
A. CLI console widget B. Serial console C. Telnet console D. SSH console
Answer: B
Question #8 (Topic: Exam A)
Refer to the exhibit.

In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output shown in the exhibit.
What should the administrator do next, to troubleshoot the problem?
A. Execute a debug flow. B. Capture the traffic using an external sniffer connected to port1. C. Execute another sniffer on FortiGate, this time with the filter "host 10.0.1.10". D. Run a sniffer on the web server.
Answer: A
Question #9 (Topic: Exam A)
Refer to the exhibit.

The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile.
An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category.
What are two solutions for satisfying the requirement? (Choose two.)
A. Configure a separate firewall policy with action Deny and an FQDN address object for *.download.com as destination address. B. Set the Freeware and Software Downloads category Action to Warning. C. Configure a web override rating for download.com and select Malicious Websites as the subcategory. D. Configure a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively.
Answer: CD
Question #10 (Topic: Exam A)
A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.
All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.
Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)
A. Enable Dead Peer Detection. B. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels. C. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel. D. Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.
Answer: AC
Download Exam
Page: 2 / 18
Total 89 questions