Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

FCSS - Enterprise Firewall 7.4 Administrator Question and Answers

FCSS - Enterprise Firewall 7.4 Administrator

Last Update Jul 10, 2025
Total Questions : 57

We are offering FREE FCSS_EFW_AD-7.4 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare FCSS_EFW_AD-7.4 free exam questions and then go for complete pool of FCSS - Enterprise Firewall 7.4 Administrator test questions that will help you more.

FCSS_EFW_AD-7.4 pdf

FCSS_EFW_AD-7.4 PDF

$42  $104.99
FCSS_EFW_AD-7.4 Engine

FCSS_EFW_AD-7.4 Testing Engine

$50  $124.99
FCSS_EFW_AD-7.4 PDF + Engine

FCSS_EFW_AD-7.4 PDF + Testing Engine

$66  $164.99
Questions 1

Refer to the exhibit, which contains a partial VPN configuration.

What can you conclude from this VPN IPsec phase 1 configuration?

Options:

A.  

This configuration is the best for networks with regular traffic intervals, providing a balance between connectivity assurance and resource utilization.

B.  

Peer IDs are unencrypted and exposed, creating a security risk.

C.  

FortiGate will not add a route to its routing or forwarding information base when the dynamic tunnel is negotiated.

D.  

A separate interface is created for each dial-up tunnel, which can be slower and more resource intensive, especially in large networks.

Discussion 0
Questions 2

An administrator needs to install an IPS profile without triggering false positives that can impact applications and cause problems with the user's normal traffic flow.

Which action can the administrator take to prevent false positives on IPS analysis?

Options:

A.  

Use the IPS profile extension to select an operating system, protocol, and application for all the network internal services and users to prevent false positives.

B.  

Enable Scan Outgoing Connections to avoid clickingsuspicious links or attachments that can deliver botnet malware and create false positives.

C.  

Use an IPS profile with action monitor, however, the administrator must be aware that this can compromise network integrity.

D.  

Install missingor expired SSUTLS certificates on the client PC to prevent expected false positives.

Discussion 0
Questions 3

Refer to the exhibit, which shows an enterprise network connected to an internet service provider.

The administrator must configure the BGP section of FortiGate A to give internet access to the enterprise network.

Which command must the administrator use to establish a connection with the internet service provider?

Options:

A.  

config neighbor

B.  

config redistribute bgp

C.  

config router route-map

D.  

config redistribute ospf

Discussion 0
Questions 4

Refer to the exhibit, which contains the partial output of an OSPF command.

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

Which statement on this FortiGate device is correct?

Options:

A.  

The FortiGate device can inject external routing information.

B.  

The FortiGate device is in the area 0.0.0.5.

C.  

The FortiGate device does not support OSPF ECMP.

D.  

The FortiGate device is a backup designated router.

Discussion 0
Questions 5

Refer to the exhibit, which shows a LAN interface connected from FortiGate to two FortiSwitch devices.

What two conclusions can you draw from the corresponding LAN interface? (Choose two.)

Options:

A.  

You must enable STP or RSTP on FortiGate and FortiSwitch to avoid layer 2 loopbacks.

B.  

The LAN interface must use a 802.3ad type interface.

C.  

This connection is using a FortiLInk to manage VLANs on FortiGate.

D.  

FortiGate is using an SD-WAN-type interface to connect to a FortiSwitch device with MCLAG.

Discussion 0
Questions 6

A company's guest internet policy, operating in proxy mode, blocks access to Artificial Intelligence Technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.

Which configuration changes are required for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443 when full SSL inspection is active in the guest policy?

Options:

A.  

Add a URL wildcard domain to the website CA certificate and use it in the SSL/SSH Inspection Profile.

B.  

In the Protocol Port Mapping section of the SSL/SSH Inspection Profile, enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports.

C.  

To analyze nonstandard ports in web filter profiles, use TLSv1.3 in the SSL/SSH Inspection Profile.

D.  

Administrators can block traffic on nonstandard ports by enabling the SNI check in the SSL/SSH Inspection Profile.

Discussion 0
Questions 7

What is the initial step performed by FortiGate when handling the first packets of a session?

Options:

A.  

Installation of the session key in the network processor (NP)

B.  

Data encryption and decryption

C.  

Security inspections such as ACL, HPE, and IP integrity header checking

D.  

Offloading the packets directly to the content processor (CP)

Discussion 0
Questions 8

What action can be taken on a FortiGate to block traffic using IPS protocol decoders, focusing on network transmission patterns and application signatures?

Options:

A.  

Use the DNS filter to block application signatures and protocol decoders.

B.  

Use application control to limit non-URL-based software handling.

C.  

Enable application detection-based SD-WAN rules.

D.  

Configure a web filter profile in flow mode.

Discussion 0
Questions 9

The IT department discovered during the last network migration that all zero phase selectors in phase 2 IPsec configurations impacted network operations.

What are two valid approaches to prevent this during future migrations? (Choose two.)

Options:

A.  

Use routing protocols to specify allowed subnets over the tunnel.

B.  

Configure an IPsec-aggregate to create redundancy between each firewall peer.

C.  

Clearly indicate to the VPN which segments will be encrypted in the phase two selectors.

D.  

Configure an IP address on the IPsec interface of each firewall to establish unique peer connections and avoid impacting network operations.

Discussion 0
Questions 10

Refer to the exhibit, which shows a network diagram showing the addition of site 2 with an overlapping network segment to the existing VPN IPsec connection between the hub and site 1.

Which IPsec phase 2 configuration must an administrator make on the FortiGate hub to enable equal-cost multi-path (ECMP) routing when multiple remote sites connect with overlapping subnets?

Options:

A.  

Set route-overlap to either use-new or use-old

B.  

Set net-device to ecmp

C.  

Set single-source to enable

D.  

Set route-overlap to allow

Discussion 0
Questions 11

Refer to the exhibit, which shows a corporate network and a new remote office network.

An administrator must integrate the new remote office network with the corporate enterprise network.

What must the administrator do to allow routing between the two networks?

Options:

A.  

The administrator must implement BGP to inject the new remote office network into the corporate FortiGate device

B.  

The administrator must configure a static route to the subnet 192.168.l.0/24 on the corporate FortiGate device.

C.  

The administrator must configure virtual links on both FortiGate devices.

D.  

The administrator must implement OSPF over IPsec on both FortiGate devices.

Discussion 0
Questions 12

An administrator is checking an enterprise network and sees a suspicious packet with the MAC address e0:23:ff:fc:00:86.

What two conclusions can the administrator draw? (Choose two.)

Options:

A.  

The suspicious packet is related to a cluster that has VDOMs enabled.

B.  

The network includes FortiGate devices configured with the FGSP protocol.

C.  

The suspicious packet is related to a cluster with a group-id value lower than 255.

D.  

The suspicious packet corresponds to port 7 on a FortiGate device.

Discussion 0
Questions 13

A company that acquired multiple branches across different countries needs to install new FortiGate devices on each of those branches. However, the IT staff lacks sufficient knowledge to implement the initial configuration on the FortiGate devices.

Which three approaches can the company take to successfully deploy advanced initial configurations on remote branches? (Choose three.)

Options:

A.  

Use metadata variables to dynamically assign values according to each FortiGate device.

B.  

Use provisioning templates and install configuration settings at the device layer.

C.  

Use the Global ADOM to deploy global object configurations to each FortiGate device.

D.  

Apply Jinja in the FortiManager scripts for large-scale and advanced deployments.

E.  

Add FortiGate devices on FortiManager as model devices, and use ZTP or LTP to connect to FortiGate devices.

Discussion 0
Questions 14

An administrator is setting up an ADVPN configuration and wants to ensure that peer IDs are not exposed during VPN establishment.

Which protocol can the administrator use to enhance security?

Options:

A.  

Use IKEv2, which encrypts peer IDs and prevents exposure.

B.  

Opt for SSL VPN web mode because it does not use peer IDs at all.

C.  

Choose IKEv1 aggressive mode because it simplifies peer identification.

D.  

Stick with IKEv1 main mode because it offers better performance.

Discussion 0
Questions 15

Refer to the exhibit.

The routing tables of FortiGate_A and FortiGate_B are shown. FortiGate_A and FortiGate_B are in the same autonomous system.

The administrator wants to dynamically add only route172.16.1.248/30on FortiGate_A.

What must the administrator configure?

Options:

A.  

The prefix 172.16.1.248/30 in the BGP Networks section on FortiGate_B

B.  

A BGP route map out for 172.16.1.248/30 on FortiGate_B

C.  

Enable Redistribute Connected in the BGP section on FortiGate_B.

D.  

A BGP route map in for 172.16.1.248/30 on FortiGate_A

Discussion 0
Questions 16

Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)

Options:

A.  

FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.

B.  

The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.

C.  

The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.

D.  

The ISDB limits access by URL and domain.

Discussion 0
Questions 17

An administrator wants to scale the IBGP sessions and optimize the routing table in an IBGP network.

Which parameter should the administrator configure?

Options:

A.  

network-import-check

B.  

ibgp-enforce-multihop

C.  

neighbor-group

D.  

route-reflector-client

Discussion 0