Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet NSE 7 Network Security Architect NSE7_EFW-7.2 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam NSE7_EFW-7.2 Premium Access

View all detail and faqs for the NSE7_EFW-7.2 exam


491 Students Passed

89% Average Score

97% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two statements about the Security fabric are true? (Choose two.)

Options:

A.

FortiGate uses the FortiTelemetry protocol to communicate with FortiAnatyzer.

B.

Only the root FortiGate sends logs to FortiAnalyzer

C.

Only FortiGate devices with configuration-sync receive and synchronize global CMDB objects that the toot FortiGate sends

D.

Only the root FortiGate collects network topology information and forwards it to FortiAnalyzer

Questions # 2:

How are bulk configuration changes made using FortiManager CLI scripts? (Choose two.)

Options:

A.

When run on the Device Database, changes are applied directly to the managed FortiGate device.

B.

When run on the Remote FortiGate directly, administrators do not have the option to review the changes prior to installation.

C.

When run on the All FortiGate in ADOM, changes are automatically installed without the creation of a new revision history.

D.

When run on the Policy Package, ADOM database, you must use the installation wizard to apply the changes to the managed FortiGate device.

Questions # 3:

Refer to the exhibit, which shows an SSL certification inspection configuration.

Question # 3

Which action does FortiGate take if the server name indication (SNI) does not match either the common name (CN) or any of the subject alternative names (SAN) in the server certificate?

Options:

A.

FortiGate uses the first entry listed in the SAN field in the server certificate

B.

FortiGate uses the CN information from the Subject field in the server certificate

C.

FortiGate uses the SNI from the user's web browser.

D.

FortiGate closes the connection because this represents an invalid SSL/TLS configuration

Questions # 4:

Which ADVPN configuration must be configured using a script on fortiManager, when using VPN Manager to manage fortiGate VPN tunnels?

Options:

A.

Enable AD-VPN in IPsec phase 1

B.

Disable add-route on hub

C.

Configure IP addresses on IPsec virtual interfaces

D.

Set protected network to all

Questions # 5:

Exhibit.

Question # 5

Refer to the exhibit, which shows a partial web filter profile conjuration

What can you cone udo from this configuration about access to www.facebook , com, which is categorized as Social Networking?

Options:

A.

The access is blocked based on the Content Filter configuration

B.

The access is allowed based on the FortiGuard Category Based Filter configuration

C.

The access is blocked based on the URL Filter configuration

D.

The access is hocked if the local or the public FortiGuard server does not reply

Questions # 6:

Exhibit.

Question # 6

Refer to the exhibit, which contains a partial VPN configuration.

What can you conclude from this configuration1?

Options:

A.

FortiGate creates separate virtual interfaces for each dial up client.

B.

The VPN should use the dynamic routing protocol to exchange routing information Through the tunnels.

C.

Dead peer detection s disabled.

D.

The routing table shows a single IPSec virtual interface.

Questions # 7:

Which FortiGate in a Security I auric sends togs to FortiAnalyzer?

Options:

A.

Only the root FortiGate.

B.

Each FortiGate in the Security fabric.

C.

The FortiGate devices performing network address translation (NAT) or unified threat management (UTM). if configured.

D.

Only the last FortiGate that handled a session in the Security Fabric

Questions # 8:

Which two statements about the BFD parameter in BGP are true? (Choose two.)

Options:

A.

It allows failure detection in less than one second.

B.

The two routers must be connected to the same subnet.

C.

It is supported for neighbors over multiple hops.

D.

It detects only two-way failures.

Questions # 9:

Which, three conditions are required for two FortiGate devices to form an OSPF adjacency? (Choose three.)

Options:

A.

OSPF interface network types match

B.

OSPF router IDs are unique

C.

OSPF interface priority settings are unique

D.

OSPF link costs match

E.

Authentication settings match

Questions # 10:

Which two statements about the Security Fabric are true? (Choose two.)

Options:

A.

Each member of the Security Fabric maintains the shared Security Fabric map.

B.

Only the root FortiGate collects network topology information and forwards it to FortiAnalyzer.

C.

FortiGate uses the FortiTelemetry protocol to communicate with FortiAnalyzer.

D.

Each FortiGate device in the Security Fabric must have bidirectional FortiTelemetry connectivity.

E.

Only FortiGate devices with configuration-sync sel to Local receive and synchronize the global CMDB objects that the root FortiGate sends.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.