Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

FCP - FortiGate 7.4 Administrator Question and Answers

FCP - FortiGate 7.4 Administrator

Last Update Sep 14, 2025
Total Questions : 89

We are offering FREE FCP_FGT_AD-7.4 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare FCP_FGT_AD-7.4 free exam questions and then go for complete pool of FCP - FortiGate 7.4 Administrator test questions that will help you more.

FCP_FGT_AD-7.4 pdf

FCP_FGT_AD-7.4 PDF

$36.75  $104.99
FCP_FGT_AD-7.4 Engine

FCP_FGT_AD-7.4 Testing Engine

$43.75  $124.99
FCP_FGT_AD-7.4 PDF + Engine

FCP_FGT_AD-7.4 PDF + Testing Engine

$57.75  $164.99
Questions 1

Which two statements describe how the RPF check is used? (Choose two.)

Options:

A.  

The RPF check is run on the first sent packet of any new session.

B.  

The RPF check is run on the first reply packet of any new session.

C.  

The RPF check is run on the first sent and reply packet of any new session.

D.  

The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.

Discussion 0
Questions 2

What are two features of collector agent advanced mode? (Choose two.)

Options:

A.  

In advanced mode, FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.

B.  

Advanced mode supports nested or inherited groups.

C.  

In advanced mode, security profiles can be applied only to user groups, not individual users.

D.  

Advanced mode uses the Windows convention —NetBios: Domain\Username.

Discussion 0
Questions 3

An administrator must enable a DHCP server on one of the directly connected networks on FortiGate. However, the administrator is unable to complete the process on the GUI to enable the service on the interface.

In this scenario, what prevents the administrator from enabling DHCP service?

Options:

A.  

The role of the interface prevents setting a DHCP server.

B.  

The DHCP server setting is available only on the CLI.

C.  

Another interface is configured as the only DHCP server on FortiGate.

D.  

The FortiGate model does not support the DHCP server.

Discussion 0
Questions 4

Which statement is correct regarding the use of application control for inspecting web applications?

Options:

A.  

Application control can identify child and parent applications, and perform different actions on them

B.  

Application control signatures are included in Fortinet Antivirus engine

C.  

Application control does not display a replacement message for a blocked web application

D.  

Application control does not require SSL Inspection to Identity web applications

Discussion 0
Questions 5

Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.

Based on the exhibit, which statement is true?

Options:

A.  

The underlay zone contains port1 and

B.  

The d-wan zone contains no member.

C.  

The d-wan zone cannot be deleted.

D.  

The virtual-wan-link zone contains no member.

Discussion 0
Questions 6

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

Options:

A.  

FortiGate directs the collector agent to use a remote LDAP server.

B.  

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.  

FortiGate does not support workstation check.

D.  

FortiGate uses the AD server as the collector agent.

Discussion 0
Questions 7

A network administrator has configured an SSL/SSH inspection profile defined for full SSL inspection and set with a private CA certificate. The firewall policy that allows the traffic uses this profile for SSL inspection and performs web filtering. When visiting any HTTPS websites, the browser reports certificate warning errors.

What is the reason for the certificate warning errors?

Options:

A.  

The SSL cipher compliance option is not enabled on the SSL inspection profile. This setting is required when the SSL inspection profile is defined with a private CA certificate.

B.  

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

C.  

The browser does not recognize the certificate in use as signed by a trusted CA.

D.  

With full SSL inspection it is not possible to avoid certificate warning errors at the browser level.

Discussion 0
Questions 8

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name.

FortiGate allows the traffic according to policy ID 1. This is the policy that allows SD-WAN traffic.

Despite these settings the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows.

What can be the reason?

Options:

A.  

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

B.  

There is no application control profile applied to the firewall policy.

C.  

Destination in the SD-WAN rules are configured per application but the feature visibility is not enabled.

D.  

SD-WAN rule names do not appear immediately. The administrator needs to refresh the page.

Discussion 0
Questions 9

Refer to the exhibit.

The exhibit shows a diagram of a FortiGate device connected to the network, the firewall policy and VIP configuration on the FortiGate device, and the routing table on the ISP router.

When the administrator tries to access the web server public address (203.0.113.2) from the internet, the connection times out. At the same time the administrator runs a sniffer on FortiGate to capture incoming web traffic to the server and does not see any output.

Based on the information shown in the exhibit, what configuration change must the administrator make to fix the connectivity issue?

Options:

A.  

Configure a loopback interface with address 203.0.113.2/32.

B.  

In the VIP configuration, enable arp-reply.

C.  

In the firewall policy configuration, enable match-vip.

D.  

Enable port forwarding on the server to map the external service port to the internal service port.

Discussion 0
Questions 10

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name.

FortiGate allows the traffic according to policy ID 1. This is the policy that allows SD-WAN traffic.

Despite these settings the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows.

What can be the reason?

Options:

A.  

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

B.  

There is no application control profile applied to the firewall policy.

C.  

Destination in the SD-WAN rules are configured per application but the feature visibility is not enabled.

D.  

SD-WAN rule names do not appear immediately. The administrator needs to refresh the page.

Discussion 0
Questions 11

FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively.

Which two statements are true about the requirements of connected physical interfaces on FortiGate? (Choose two.)

Options:

A.  

Both interfaces must have the interface role assigned

B.  

Both interfaces must have directly connected routes on the routing table

C.  

Both interfaces must have DHCP enabled

D.  

Both interfaces must have IP addresses assigned

Discussion 0
Questions 12

Refer to the exhibits, which show the system performance output and the default configuration of high memory usage thresholds in a FortiGate.

Based on the system performance output, what can be the two possible outcomes? (Choose two.)

Options:

A.  

FortiGate will start sending all files to FortiSandbox for inspection.

B.  

FortiGate has entered conserve mode.

C.  

Administrators cannot change the configuration.

D.  

Administrators can access FortiGate onlythrough the console port.

Discussion 0
Questions 13

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

Options:

A.  

Strict RPF checks the best route back to the source using the incoming interface.

B.  

Strict RPF allows packets back to sources with all active routes.

C.  

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

D.  

Strict RPF check is run on the first sent and reply packet of any new session.

Discussion 0
Questions 14

Refer to the exhibits.

An administrator creates a new address object on the root FortiGate (Local-FortiGate) in the security fabric. After synchronization, this object is not available on the downstream FortiGate (ISFW).

What must the administrator do to synchronize the address object?

Options:

A.  

Change the csf setting on Local-FortiGate (root) to sec fabric-object-unification default.

B.  

Change the csf setting on both devices to sec downscream-access enable.

C.  

Change the csf setting on ISFW (downstream) to sec auchorizacion-requesc-cype certificace.

D.  

Change the csf setting on ISFW (downstream) to sec configuration-sync local.

Discussion 0
Questions 15

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration.

An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2.

The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver.

Which two configuration changes can the administrator make to the policy to deny Webserver access for Remote-User2? (Choose two.)

Options:

A.  

Enable match-vip in the Deny policy.

B.  

Set the Destination address as Webserver in the Deny policy.

C.  

Disable match-vip in the Deny policy.

D.  

Set the Destination address as Deny_IP in the Allow_access policy.

Discussion 0
Questions 16

A network administrator has configured an SSL/SSH inspection profile defined for full SSL inspection and set with a private CA certificate. The firewall policy that allows the traffic uses this profile for SSL inspection and performs web filtering. When visiting any HTTPS websites, the browser reports certificate warning errors.

What is the reason for the certificate warning errors?

Options:

A.  

The SSL cipher compliance option is not enabled on the SSL inspection profile. This setting is required when the SSL inspection profile is defined with a private CA certificate.

B.  

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

C.  

The browser does not recognize the certificate in use as signed by a trusted CA.

D.  

With full SSL inspection it is not possible to avoid certificate warning errors at the browser level.

Discussion 0
Questions 17

Which three statements about SD-WAN zones are true? (Choose three.)

Options:

A.  

An SD-WAN zone can contain physical and logical interfaces

B.  

You can use an SD-WAN zone in static route definitions

C.  

You can define up to three SD-WAN zones per FortiGate device

D.  

An SD-WAN zone must contains at least two members

E.  

An SD-WAN zone is a logical grouping of members

Discussion 0
Questions 18

An administrator wants to configure dead peer detection (DPD) on IPsec VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when there is outbound traffic but no response from the peer.

Which DPD mode on FortiGate meets this requirement?

Options:

A.  

On Demand

B.  

On Idle

C.  

Disabled

D.  

Enabled

Discussion 0
Questions 19

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

Options:

A.  

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

B.  

The browser does not trust the certificate used by FortiGate for SSL inspection

C.  

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

D.  

The matching firewall policy is set to proxy inspection mode

Discussion 0
Questions 20

An administrator manages a FortiGate model that supports NTurbo.

How does NTurbo enhance performance for flow-based inspection?

Options:

A.  

NTurbo offloads traffic to the content processor.

B.  

NTurbo creates two inspection sessions on the FortiGate device.

C.  

NTurbo buffers the whole file and then sends it to the antivirus engine.

D.  

NTurbo creates a special data path to redirect traffic between the IPS engine its ingress and egress interfaces.

Discussion 0
Questions 21

Refer to the exhibit.

In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output shown in the exhibit.

What should the administrator do next, to troubleshoot the problem?

Options:

A.  

Execute a debug flow.

B.  

Capture the traffic using an external sniffer connected to part1.

C.  

Execute another sniffer on FortiGate, this time with the filter "hose 10.o.1.10".

D.  

Run a sniffer on the web server.

Discussion 0
Questions 22

Refer to the exhibit.

Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?

Options:

A.  

All traffic from a source IP to a destination IP is sent to the same interface.

B.  

Traffic is sent to the link with the lowest latency.

C.  

Traffic is distributed based on the number of sessions through each interface.

D.  

All traffic from a source IP is sent to the same interface

Discussion 0
Questions 23

Which inspection mode does FortiGate use for application profiles if it is configured as a profile-based next-generation firewall (NGFW)?

Options:

A.  

Full content inspection

B.  

Proxy-based inspection

C.  

Certificate inspection

D.  

Flow-based inspection

Discussion 0
Questions 24

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

Options:

A.  

The NetSessionEnum function is used to track user logouts.

B.  

NetAPI polling can increase bandwidth usage in large networks.

C.  

The collector agent must search Windows application event logs.

D.  

The collector agent uses a Windows API to query DCs for user logins.

Discussion 0
Questions 25

Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

Options:

A.  

Enable the parameter Never Timeout in the admin profiles

B.  

Increase the admintimeout value under config system accprofile super_admin.

C.  

Increase the admintimeout value under config system global

D.  

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Discussion 0
Questions 26

Refer to the exhibit showing a FortiGuard connection debug output.

Based on the output, which two facts does the administrator know about the FortiGuard connection? (Choose two.)

Options:

A.  

One server was contacted to retrieve the contract information.

B.  

There is at least one server that lost packets consecutively.

C.  

A local FortiManaqer is one of the servers FortiGate communicates with.

D.  

FortiGate is using default FortiGuard communication settings.

Discussion 0
Questions 27

FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.

Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)

Options:

A.  

www.example.com:443

B.  

www.example.com

C.  

www.example.com/index.hrml

D.  

example.com

Discussion 0
Questions 28

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy.

When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the

and does not block the file allowing it to be downloaded.

The administrator confirms that the traffic matches the configured firewall policy.

What are two reasons for the failed virus detection by FortiGate? (Choose two.)

Options:

A.  

The selected SSL inspection profile has certificate inspection enabled

B.  

The browser does not trust the FortiGate self-siqned CA certificate

C.  

The EICAR test file exceeds the protocol options oversize limit

D.  

The website is exempted from SSL inspection

Discussion 0
Questions 29

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, and the firewall configuration.

An administrator created a Deny policy with default settings to deny Webserver access for Remote-User2.

The policy should work such that Remote-User1 must be able to access the Webserver while preventing Remote-User2 from accessing the Webserver.

Which two configuration changes can the administrator make to the policy to deny Webserver access for Remote-User2? (Choose two.)

Options:

A.  

Enable match-vip in the Deny policy.

B.  

Set the Destination address as Webserver in the Deny policy.

C.  

Disable match-vip in the Deny policy.

D.  

Set the Destination address as Deny_IP in the Allow_access policy.

Discussion 0
Questions 30

Refer to the exhibit.

Based on the routing database shown in the exhibit which two conclusions can you make about the routes? (Choose two.)

Options:

A.  

There will be eight routes active in the routing table

B.  

The port1 and port2 default routes are active in the routing table

C.  

The port3 default route has the highest distance

D.  

The port3 default route has the lowest metric

Discussion 0
Questions 31

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy.

When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the

and does not block the file allowing it to be downloaded.

The administrator confirms that the traffic matches the configured firewall policy.

What are two reasons for the failed virus detection by FortiGate? (Choose two.)

Options:

A.  

The selected SSL inspection profile has certificate inspection enabled

B.  

The browser does not trust the FortiGate self-siqned CA certificate

C.  

The EICAR test file exceeds the protocol options oversize limit

D.  

The website is exempted from SSL inspection

Discussion 0
Questions 32

An employee needs to connect to the office through a high-latency internet connection.

Which SSL VPN setting should the administrator adjust to prevent SSL VPN negotiation failure?

Options:

A.  

SSL VPN idle-timeout

B.  

SSL VPN login-timeout

C.  

SSL VPN dtls-hello-timeout

D.  

SSL VPN session-ttl

Discussion 0
Questions 33

Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)

Options:

A.  

Pre-shared key and certificate signature as authentication methods

B.  

Extended authentication (XAuth)to request the remote peer to provide a username and password

C.  

Extended authentication (XAuth) for faster authentication because fewer packets are exchanged

D.  

No certificate is required on the remote peer when you set the certificate signature as the authentication method

Discussion 0
Questions 34

Which two attributes are required on a certificate so it can be used as a CA certificate on SSL inspection? (Choose two.)

Options:

A.  

The issuer must be a public CA

B.  

The CA extension must be set to TRUE

C.  

The Authority Key Identifier must be of type SSL

D.  

The keyUsage extension must be set to

Discussion 0
Questions 35

Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity.

What must the administrator configure to answer this specific request from the NOC team?

Options:

A.  

Enable the parameter Never Timeout in the admin profiles

B.  

Increase the admintimeout value under config system accprofile super_admin.

C.  

Increase the admintimeout value under config system global

D.  

Increase the offline value of the Override idle Timeout parameter in the NOC_Access admin profile

Discussion 0
Questions 36

Which statement about the deployment of the Security Fabric in a multi-VDOM environment is true?

Options:

A.  

Downstream devices can connect to the upstream device from any of their VDOMs

B.  

Each VDOM in the environment can be part of a different Security Fabric

C.  

VDOMs without ports with connected devices are not displayed in the topology

D.  

Security rating reports can be run individually for each configured VDOM

Discussion 0
Questions 37

FortiGuard categories can be overridden and defined in different categories. To create a web rating override for the example.com home page the override must be configured using a specific syntax.

Which two syntaxes are correct to configure a web rating override for the home page? (Choose two.)

Options:

A.  

www.example.com:443

B.  

www.example.com

C.  

www.example.com/index.hrml

D.  

example.com

Discussion 0
Questions 38

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

Options:

A.  

The host field in the HTTP header.

B.  

The server name indication (SNI) extension in the client hello message.

C.  

The subject alternative name (SAN) field in the server certificate.

D.  

The subject field in the server certificate.

E.  

The serial number in the server certificate.

Discussion 0
Questions 39

Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two.)

Options:

A.  

If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.

B.  

If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.

C.  

If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP

D.  

If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.

Discussion 0
Questions 40

Refer to the exhibit, which shows the IPS sensor configuration.

If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)

Options:

A.  

The sensor will gather a packet log for all matched traffic.

B.  

The sensor will reset all connections that match these signatures.

C.  

The sensor will allow attackers matching the Microsoft.Windows.iSCSl.Target.DoS signature.

D.  

The sensor will block all attacks aimed at Windows servers.

Discussion 0
Questions 41

What is the primary FortiGate election process when the HA override setting is disabled?

Options:

A.  

Connected monitored ports > Priority > System uptime > FortiGate serial number

B.  

Connected monitored ports > System uptime > Priority > FortiGate serial number

C.  

Connected monitored ports > Priority > HA uptime > FortiGate serial number

D.  

Connected monitored ports > HA uptime > Priority > FortiGate serial number

Discussion 0
Questions 42

Refer to the exhibit.

The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile.

An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category.

What are two solutions for satisfying the requirement? (Choose two.)

Options:

A.  

Configure a separate firewall policy with action Deny and an FQDN address object for *. download, com as destination address.

B.  

Set the Freeware and Software Downloads category Action to Warning

C.  

Configure a web override rating for download, com and select Malicious Websites as the subcategory.

D.  

Configure a static URL filter entry for download, com with Type and Action set to Wildcard and Block, respectively.

Discussion 0
Questions 43

Refer to the exhibit.

Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?

Options:

A.  

All traffic from a source IP to a destination IP is sent to the same interface.

B.  

Traffic is sent to the link with the lowest latency.

C.  

Traffic is distributed based on the number of sessions through each interface.

D.  

All traffic from a source IP is sent to the same interface

Discussion 0
Questions 44

An administrator configured a FortiGate to act as a collector for agentless polling mode.

What must the administrator add to the FortiGate device to retrieve AD user group information?

Options:

A.  

LDAP server

B.  

RADIUS server

C.  

DHCP server

D.  

Windows server

Discussion 0
Questions 45

The HTTP inspection process in web filtering follows a specific order when multiple features are enabled in the web filter profile.

Which order must FortiGate use when the web filter profile has features such as safe search enabled?

Options:

A.  

FortiGuard category filter and rating filter

B.  

Static domain filter, SSL inspection filter, and external connectors filters

C.  

DNS-based web filter and proxy-based web filter

D.  

Static URL filter, FortiGuard category filter, and advanced filters

Discussion 0
Questions 46

Which two statements are true about the FGCP protocol? (Choose two.)

Options:

A.  

FGCP is not used when FortiGate is in transparent mode

B.  

FGCP elects the primary FortiGate device

C.  

FGCP is used to discover FortiGate devices in different HA groups

D.  

FGCP runs only over the heartbeat links

Discussion 0
Questions 47

Refer to the exhibit which contains a RADIUS server configuration.

An administrator added a configuration for a new RADIUS server. While configuring, the administrator selected the Include in every user group option.

What is the impact of using the Include in every user group option in a RADIUS configuration?

Options:

A.  

This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group

B.  

This option places all users into even/ RADIUS user group, including groups that are used for the LDAP server on FortiGate

C.  

This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case is FortiAuthenticator

D.  

This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group

Discussion 0
Questions 48

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

Options:

A.  

FortiGate directs the collector agent to use a remote LDAP server.

B.  

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.  

FortiGate does not support workstation check.

D.  

FortiGate uses the AD server as the collector agent.

Discussion 0
Questions 49

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

Options:

A.  

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile

B.  

The browser does not trust the certificate used by FortiGate for SSL inspection

C.  

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

D.  

The matching firewall policy is set to proxy inspection mode

Discussion 0
Questions 50

An administrator has configured a strict RPF check on FortiGate.

How does strict RPF check work?

Options:

A.  

Strict RPF checks the best route back to the source using the incoming interface.

B.  

Strict RPF allows packets back to sources with all active routes.

C.  

Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.

D.  

Strict RPF check is run on the first sent and reply packet of any new session.

Discussion 0
Questions 51

Refer to the exhibits.

FGT-1 and FGT-2 are updated with HA configuration commands shown in the exhibit.

What would be the expected outcome in the HA cluster?

Options:

A.  

FGT-1 will remain the primary because FGT-2 has lower priority.

B.  

FGT-2 will take over as the primary because it has the override enable setting and higher priority than FGT-1.

C.  

FGT-1 will synchronize the override disable setting with FGT-2.

D.  

The HA cluster will become out of sync because the override setting must match on all HA members.

Discussion 0