An administrator wants to configure dead peer detection (DPD) on IPsec VPN for detecting dead
tunnels. The requirement is that FortiGate sends DPD probes only when there is no inbound traffic.
Which DPD mode on FortiGate meets this requirement?
A
Explanation:
The "On Idle" DPD mode configures FortiGate to send DPD probes only when no inbound traffic is
detected, meeting the requirement to send probes only when the tunnel is idle.
Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true?
(Choose two.)
A, D
Explanation:
When SD-WAN is disabled, FortiGate supports volume-based ECMP mode via the v4-ecmp-mode
parameter.
When SD-WAN is enabled, the load balancing algorithm is controlled by the load-balance-mode
parameter within the SD-WAN configuration.
You have created a web filter profile named restrict_media-profile with a daily category usage quota.
When you are adding the profile to the firewall policy, the restrict_media-profile is not listed in the
available web profile drop down.
What could be the reason?
B
Explanation:
Web filter profiles with category usage quotas require the firewall policy to be in proxy-based (deep)
inspection mode; if the inspection mode does not match this requirement, the profile will not appear
in the drop-down list.
Refer to the exhibit.
As an administrator you have created an IPS profile, but it is not performing as expected. While
testing you got the output as shown in the exhibit.
What could be the possible reason of the diagnose output shown in the exhibit?
A
Explanation:
The output shows the IPS engine count as 0, indicating no active IPS engines are running. This
typically means no firewall policy is referencing the IPS security profile, so the IPS profile is not being
applied or triggered.
Refer to the exhibit.
The predefined deep-inspection and custom-deep-inspection profiles exclude some web categories
from SSL inspection, as shown in the exhibit.
For which two reasons are these web categories exempted? (Choose two.)
A, D
Explanation:
FortiGate's temporary SSL certificate may cause access denial to sites using HTTP Strict Transport
Security (HSTS), so such sites are exempted from deep SSL inspection.
Legal regulations require exemption of certain categories to protect user privacy and sensitive
information, so these web categories are excluded from SSL inspection.
Refer to the exhibit.
The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that
their GUI sessions do not disconnect too early during inactivity.
What must the administrator configure to answer this specific request from the NOC team?
D
Explanation:
The admintimeout setting in the admin access profile controls the inactivity timeout for GUI sessions.
Increasing this value will extend the session duration before automatic disconnection.
Refer to the exhibit.
Based on this partial configuration, what are the two possible outcomes when FortiGate enters
conserve mode? (Choose two.)
B, D
Explanation:
In fail-open mode, FortiGate skips quarantine actions to maintain traffic flow despite IPS or antivirus
failures.
FortiGate drops new sessions that require inspection when in conserve mode and fail-open is
enabled, to protect the network from potentially harmful traffic.
What is the primary FortiGate election process when the HA override setting is enabled?
A
Explanation:
When HA override is enabled, FortiGate uses the following election order: number of connected
monitored ports, then device priority, followed by HA uptime, and finally FortiGate serial number as
a tiebreaker.
An administrator wanted to configure an IPS sensor to block traffic that triggers a signature set
number of times during a specific time period.
How can the administrator achieve the objective?
C
Explanation:
The IPS filter with the rate-mode set to "periodical" allows the administrator to block traffic that
triggers a signature a specified number of times within a defined time period, meeting the
requirement.
A FortiGate firewall policy is configured with active authentication, however, the user cannot
authenticate when accessing a website.
Which protocol must FortiGate allow even though the user cannot authenticate?
D
Explanation:
DNS traffic must be allowed so the user can resolve domain names and reach the authentication
server or web resources, even if authentication initially fails.
Refer to the exhibit, which shows a partial configuration from the remote authentication server.
Why does the FortiGate administrator need this configuration?
D
Explanation:
The Fortinet-Group-Name attribute is used to restrict authentication to users who belong specifically
to the "Training" user group on the RADIUS server.
Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.
Based on the exhibit, which statement is true?
A
Explanation:
The Underlay zone is the default SD-WAN zone, typically representing the physical interfaces in the
SD-WAN configuration before overlay or virtual links are added.
Which three statements explain a flow-based antivirus profile? (Choose three.)
A, B, D
Explanation:
Flow-based antivirus buffers the entire file while simultaneously transmitting data to the client to
minimize latency.
Flow-based inspection combines multiple scanning techniques from proxy-based modes for efficient
detection.
Flow-based inspection provides better performance by processing traffic on the fly without full proxy
overhead.
Refer to the exhibit.
An administrator has configured an Application Overrides for the ABC.Com application signature and
set the Action to Allow. This application control profile is then applied to a firewall policy that is
scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the
administrator accessed the ABC.Com web site several times.
Why are there no logs generated under security logs for ABC.Com?
C
Explanation:
When the action is set to Allow in an application override, traffic matching this override is allowed
without generating security logs because it bypasses deeper inspection and blocking.
Which two statements describe characteristics of automation stitches? (Choose two.)
C, D
Explanation:
Automation stitches can execute multiple actions concurrently (in parallel).
Triggers for automation stitches can come from external connectors beyond just Fortinet devices.