Fortinet NSE4_FGT-7.2 Exam Practice Questions (P. 4)
- Full Access (104 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.
All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.
Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)
All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.
Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)
- AConfigure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.
- BConfigure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.Most Voted
- CEnable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.
- DEnable Dead Peer Detection.Most Voted
Correct Answer:
AD
AD

To ensure high availability with IPsec VPN tunnels in FortiGate, configure a lower metric (distance) for the route associated with the primary tunnel to prioritize its use. The secondary tunnel should have a higher distance to serve as a backup, being utilized only when the primary fails. Additionally, enabling Dead Peer Detection is critical as it helps in promptly identifying any failures in the primary tunnel, thereby speeding up the switch to the secondary tunnel. This setup effectively manages traffic routing and enhances network resilience.
send
light_mode
delete
Question #17
What are two benefits of flow-based inspection compared to proxy-based inspection? (Choose two.)
- AFortiGate uses fewer resources.Most Voted
- BFortiGate performs a more exhaustive inspection on traffic.
- CFortiGate adds less latency to traffic.Most Voted
- DFortiGate allocates two sessions per connection.
Correct Answer:
AC
AC

Flow-based inspection is a streamlined approach utilized by FortiGate firewalls to manage network traffic more efficiently. Unlike proxy-based inspection, which analyzes traffic in depth and can be resource-intensive, flow-based inspection provides distinct benefits. One significant advantage is that it consumes fewer system resources, which helps in maintaining the firewall's performance without heavily taxing the system's overall capabilities. Another advantage is the reduction in latency it offers. Since this method processes traffic without the need to capture and analyze every packet in detail, it minimizes delay, facilitating smoother operation for real-time applications and services that are sensitive to delays. This method ensures effective monitoring while optimizing performance and responsiveness.
send
light_mode
delete
Question #18
FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page, the override must be configured using a specific syntax.
Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)
Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)
- Awww.example.comMost Voted
- Bwww.example.com/index.html
- Cwww.example.com:443
- Dexample.comMost Voted
Correct Answer:
AB
AB

When configuring a web rating override for the example.com home page, it's correct to use 'www.example.com' as well as 'www.example.com/index.html'. The former broadly applies to all the webpages under that specific subdomain, ensuring a web rating override at a broader scope, including the home page. The latter is more specific, targeting the exact URL that typically represents the home page. This precision can be particularly useful when you want to apply overrides to specific pages rather than a whole domain or subdomain. It is important to understand the scope and specificity of each syntax to effectively manage web content ratings.
send
light_mode
delete
Question #19
Refer to exhibit.
An administrator configured the web filtering profile shown in the exhibit to block access to all social networking sites except Twitter. However, when users try to access twitter.com, they are redirected to a FortiGuard web filtering block page.

Based on the exhibit, which configuration change can the administrator make to allow Twitter while blocking all other social networking sites?
An administrator configured the web filtering profile shown in the exhibit to block access to all social networking sites except Twitter. However, when users try to access twitter.com, they are redirected to a FortiGuard web filtering block page.

Based on the exhibit, which configuration change can the administrator make to allow Twitter while blocking all other social networking sites?
- AOn the FortiGuard Category Based Filter configuration, set Action to Warning for Social Networking.
- BOn the Static URL Filter configuration, set Type to Simple.
- COn the Static URL Filter configuration, set Action to Exempt.Most Voted
- DOn the Static URL Filter configuration, set Action to Monitor.
Correct Answer:
C
C
send
light_mode
delete
Question #20
Which three statements explain a flow-based antivirus profile? (Choose three.)
- AFlow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.Most Voted
- BIf a virus is detected, the last packet is delivered to the client.
- CThe IPS engine handles the process as a standalone.
- DFortiGate buffers the whole file but transmits to the client at the same time.Most Voted
- EFlow-based inspection optimizes performance compared to proxy-based inspection.Most Voted
Correct Answer:
ADE
ADE

The correct selections for this question are options A, D, and E. In flow-based antivirus profiles, letter A clarifies that this method is a hybrid of proxy-based methods, thus leveraging both scanning types. Despite confusion noted in user comments regarding D, the essence of flow-based inspection processes packets while caching and forwarding simultaneously, supporting the statement in the question. Lastly, E highlights the primary benefit of flow-based inspection: superior performance when compared to proxy-based inspection, which is often crucial for environments requiring high throughput and minimized latency.
send
light_mode
delete
All Pages