Loading questions...
Updated
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
This exam has 34 community-verified practice questions. Create a free account to access all questions, comments, and explanations.
Which two are valid traffic processing actions that a FortiSwitch access control list (ACL) can apply to matching traffic? (Choose two.)
You are configuring FortiSwitch to perform layer 3 inter-VLAN routing while managed by FortiGate over FortiLink. On supported hardware models, FortiSwitch can offload routing decisions for better performance.
How does FortiSwitch perform routing between VLANs?
You are deploying a small office network with a single FortiGate and a single FortiSwitch. The office currently has moderate traffic, but the IT team expects the network to grow in the near future, adding more FortiSwitch devices and endpoints.
Which FortiLink configuration should you deploy to provide the best combination of current performance and scalability for future growth?
When Dynamic Host Configuration Protocol (DHCP) snooping is enabled on a FortiSwitch VLAN, which two statements are true? (Choose two.)
Which two statements about the FortiLink authorization process are true? (Choose two.)
In which two ways can you assign a FortiSwitch port to a VDOM using a multi-tenancy setup? (Choose two.)
When you change FortiSwitch management mode from standalone to managed, what happens to the existing standalone configuration?
Refer to the exhibits.
Network Topology -

DHCP Snooping database -

All three FortiSwitch-connected ports are configured in VLAN 10.
FortiGate acts as the Dynamic Host Configuration Protocol (DHCP) server and is connected to a DHCP snooping trusted trunk port. PC1 and PC2 are connected to ports configured as untrusted for DAI, and no static bindings are configured in the IP source guard (IPSG) database.
PC2 is compromised and attempts to spoof the FortiGate IP address by sending forged Address Resolution Protocol (ARP) replies with its own MAC address.
What will FortiSwitch do with the ARP packets from PC2?
Refer to the exhibit.
Commands -

The LLDP profile shown in the exhibit was configured to detect IP phones and automatically assign them to the appropriate VLAN. You apply this LLDP profile on a FortiSwitch port.
Which configuration should you enable on the FortiSwitch profile to collect detailed information about all the connected IP phones?
You are deploying a FortiSwitch virtual stack in a network that contains Cisco devices. You want the Cisco devices to automatically discover the FortiSwitch devices and exchange device information.
Which two protocols must be enabled on the FortiSwitch devices to achieve this? (Choose two.)
Refer to the exhibit.
Topology view -

You just connected three FortiSwitch devices: Core-1, Core-2, and Access-1. Core-1 and Core-2 both connect to Access-1 for redundancy.
All switches are managed by FortiGate, which uses port4 as the FortiLink interface. After you enable the uplink ports on Core-2, you notice that port3 on Access-1 enters the Discarding STP state.
What is the most likely cause of this behavior?
You are configuring VLANs on a FortiSwitch device managed by FortiGate.
Which two statements accurately describe VLAN assignment requirements and behavior on FortiSwitch ports? (Choose two.)
Refer to the exhibit.
Network Topology -

PC1 and PC2 are connected to port1 on FortiSwitch.
Which VLAN tags will FortiSwitch apply when forwarding PC1 and PC2 traffic out of port2?
What is one key advantage of using a sniffer profile on FortiSwitch compared to using the sniffer command?