New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

FCSS_EFW_AD-7.6 Exam Dumps - Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator

Searching for workable clues to ace the Fortinet FCSS_EFW_AD-7.6 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s FCSS_EFW_AD-7.6 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

An administrator received a FortiAnalyzer alert that a 1 ТВ disk filled up in a day. Upon investigation, they found thousands of unusual DNS log requests, such as JHCMQK.website.com, with no answers. They later discovered that DNS exfiltration was occurring through both UDP and TLS.

How can the administrator prevent this data theft technique?

A.

Create an inline-CASB to protect against DNS exfiltration.

B.

Configure a File Filter profile to prevent DNS exfiltration.

C.

Enable DNS Filter to protect against DNS exfiltration.

D.

Use an IPS profile and DNS exfiltration-related signatures.

Full Access
Question # 10

A user reports that their computer was infected with malware after accessing a secured HTTPS website. However, when the administrator checks the FortiGate logs, they do not see that the website was detected as insecure despite having an SSL certificate and correct profiles applied on the policy.

How can an administrator ensure that FortiGate can analyze encrypted HTTPS traffic on a website?

A.

The administrator must enable reputable websites to allow only SSL/TLS websites rated by FortiGuard web filter.

B.

The administrator must enable URL extraction from SNI on the SSL certificate inspection to ensure the TLS three-way handshake is correctly analyzed by FortiGate.

C.

The administrator must enable DNS over TLS to protect against fake Server Name Indication (SNI) that cannot be analyzed in common DNS requests on HTTPS websites.

D.

The administrator must enable full SSL inspection in the SSL/SSH Inspection Profile to decrypt packets and ensure they are analyzed as expected.

Full Access
Question # 11

Refer to the exhibit, which contains a partial command output.

The administrator has configured BGP on FortiGate. The status of this new BGP configuration is shown in the exhibit.

What configuration must the administrator consider next?

A.

Configure a static route to 100.65.4.1.

B.

Configure the local AS to 65300.

C.

Contact the remote peer administrator to enable BGP

D.

Enable ebgp-enforce-multihop.

Full Access
Question # 12

An administrator configured the FortiGate devices in an enterprise network to join the Fortinet Security Fabric. The administrator has a list of IP addresses that must be blocked by the data center firewall. This list is updated daily.

How can the administrator automate a firewall policy with the daily updated list?

A.

With FortiNAC

B.

With FortiAnalyzer

C.

With a Security Fabric automation

D.

With an external connector from Threat Feeds

Full Access
Question # 13

Refer to the exhibit, which shows an ADVPN network.

The client behind Spoke-1 generates traffic to the device located behind Spoke-2.

What is the first message that the hub sends to Spoke-1 to bring up the dynamic tunnel?

A.

Shortcut query

B.

Shortcut offer

C.

Shortcut reply

D.

Shortcut forward

Full Access
Question # 14

Refer to the exhibit.

An HA configuration of an active-active (A-A) cluster with the same HA uptime is shown. You want HQ-NGFW-2 to handle the Core2 VDOM traffic. Which modification must you make to achieve this outcome? (Choose one answer)

A.

Reboot HQ-NGFW-2.

B.

Change the priority from 100 to 160 for HQ-NGFW-2.

C.

Change the priority from 120 to 200 for HQ-NGFW-2.

D.

Enable override in virtual cluster 2 for HQ-NGFW-2.

Full Access
Question # 15

An administrator is extensively using VXLAN on FortiGate.

Which specialized acceleration hardware does FortiGate need to improve its performance?

A.

NP7

B.

SP5

C.

СР9

D.

NTurbo

Full Access
Question # 16

An administrator applied a block-all IPS profile for client and server targets to secure the server, but the database team reported the application stopped working immediately after.

How can an administrator apply IPS in a way that ensures it does not disrupt existing applications in the network?

A.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

B.

Limit the IPS profile to server targets only to avoid blocking connections from the server to clients.

C.

Select flow mode in the IPS profile to accurately analyze application patterns.

D.

Set the IPS profile signature action to default to discard all possible false positives.

Full Access
Go to page: