Examfgba E20
Examfgba E20
Fortinet
FCP_FGT_AD-7.4
FCP - FortiGate 7.4 Administrator
https://www.examsboost.com/
Product Version
Up to Date products, reliable and verified.
Questions and Answers in PDF Format.
Which two statements are true about the routing entries in this database table? (Choose two.)
A. All of the entries in the routing database table are installed in the FortiGate routing table.
B. The port2 interface is marked as inactive.
C. Both default routes have different administrative distances.
D. The default route on porc2 is marked as the standby route.
Answer: C, D
Explanation:
The routing table in the exhibit shows two default routes (0.0.0.0/0) with different administrative
distances:
The default route through port2 has an administrative distance of 20.
The default route through port1 has an administrative distance of 10.
Administrative distance determines the priority of the route; a lower value is preferred. Here, the route
through port1 with an administrative distance of 10 is the preferred route. The route through port2 with
an administrative distance of 20 acts as a standby or backup route. If the primary route (port1) fails or is
unavailable, traffic will then be routed through port2.
Regarding the statement that the port2 interface is marked as inactive, there is no indication in the
Question: 2
Which three pieces of information does FortiGate use to identify the hostname of the SSL server when
SSL certificate inspection is enabled? (Choose three.)
Answer: B, C, D
Explanation:
When SSL certificate inspection is enabled on a FortiGate device, the system uses the following three
pieces of information to identify the hostname of the SSL server:
Server Name Indication (SNI) extension in the client hello message (B): The SNI is an extension in the
client hello message of the SSL/TLS protocol. It indicates the hostname the client is attempting to
connect to. This allows FortiGate to identify the server's hostname during the SSL handshake.
Subject Alternative Name (SAN) field in the server certificate (C): The SAN field in the server certificate
lists additional hostnames or IP addresses that the certificate is valid for. FortiGate inspects this field to
confirm the identity of the server.
Subject field in the server certificate (D): The Subject field contains the primary hostname or domain
name for which the certificate was issued. FortiGate uses this information to match and validate the
server’s identity during SSL certificate inspection.
The other options are not used in SSL certificate inspection for hostname identification:
Host field in the HTTP header (A): This is part of the HTTP request, not the SSL handshake, and is not
used for SSL certificate inspection.
Serial number in the server certificate (E): The serial number is used for certificate management and
revocation, not for hostname identification.
Reference
FortiOS 7.4.1 Administration Guide - SSL/SSH Inspection, page 1802.
FortiOS 7.4.1 Administration Guide - Configuring SSL/SSH Inspection Profile, page 1799.
Question: 3
Refer to the exhibit.
Answer: A
Explanation:
For traffic that does not match any of the defined SD-WAN rules, the default implicit SD-WAN rule is
applied. By default, the FortiGate uses a "source-destination IP-based" algorithm, which means all traffic
from a specific source IP to a specific destination IP is sent through the same interface. This ensures that
a consistent path is used for traffic between the same source and destination IP addresses. Options B, C,
and D do not apply because the default algorithm does not prioritize by latency, session count, or source
IP alone.
Reference:
FortiOS 7.4.1 Administration Guide: SD-WAN Load Balancing Algorithms
Question: 4
A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.
Which IPsec Wizard template must the administrator apply?
A. Remote Access
B. Site to Site
C. Dial up User
D. iHub-and-Spoke
Answer: A
Explanation:
For configuring an IPsec VPN tunnel for a sales employee traveling abroad, the "Remote Access"
template is the most appropriate choice. This template is designed to allow remote users to securely
Question: 5
Refer to the exhibits, which show the system performance output and the default configuration of high
memory usage thresholds in a FortiGate.
Based on the system performance output, what can be the two possible outcomes? (Choose two.)
Answer: B, D
Explanation:
FEATURES