Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)
AEncapsulating Security Payload (ESP)
BSecure Shell (SSH)
CInternet Key Exchange (IKE)
DSecurity Association (SA)
Which two settings can you configure to speed up routing convergence in BGP? (Choose two.)
Aupdate-source
Bset-route-tag
Choldtime-timer
Dlink-down-failover
Which two statements are correct when traffic matches the implicit SD-WAN rule? (Choose two.)
AThe sdwan_service_id flag in the session information is 0.
BAll SD-WAN rules have the default setting enabled.
CTraffic does not match any of the entries in the policy route table.
DTraffic is load balanced using the algorithm set for the v4-ecmp-mode setting.
Refer to the exhibit.
Which configuration change is required if the responder FortiGate uses a dynamic routing protocol to exchange routes over IPsec?
Atype must be set to static.
Bmode-cfg must be enabled.
Cexchange-interface-ip must be enabled.
Dadd-route must be disabled.
Question 6
SD-WAN
0
Question 7
SD-WAN
Question 8
Enterprise Networking
Question 9
SD-WAN
Question 10
SD-WAN
Question 11
Network Security
Question 12
Enterprise Networking
Question 13
SD-WAN
Question 14
SD-WAN
Question 15
SD-WAN
Question 16
SD-WAN
Question 17
SD-WAN
Question 18
SD-WAN
Question 19
Network Security
Question 20
SD-WAN
Question 21
SD-WAN
Question 22
SD-WAN
Question 23
Enterprise Networking
Question 24
Enterprise Networking
Question 25
SD-WAN
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which two statements about SD-WAN central management are true? (Choose two.)
AThe objects are saved in the ADOM common object database.
BIt does not support meta fields.
CIt uses templates to configure SD-WAN on managed devices.
DIt supports normalized interfaces for SD-WAN member configuration.
Refer to the exhibit.
An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network. The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over T_INET_0_0. However, the traffic is routed over T_INET_1_0.
Based on the output shown in the exhibit, which two reasons can cause the observed behavior? (Choose two.)
AThe traffic matches a regular policy route configured with T_INET_1_0 as the outgoing device.
BT_INET_1_0 has a lower route priority value (higher priority) than T_INET_0_0.
CT_INET_0_0 does not have a valid route to the destination.
DT_INET_1_0 has a higher member configuration priority than T_INET_0_0.
Refer to the exhibit.
The device exchanges routes using IBGP.
Which two statements are correct about the IBGP configuration and routing information on the device? (Choose two.)
AEach BGP route is three hops away from the destination.
Bibgp-multipath is disabled.
Cadditional-path is enabled.
DYou can run the get router info routing-table database command to display the additional paths.
Refer to the exhibit.
Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?
AAll traffic from a source IP to a destination IP is sent to the same interface.
BAll traffic from a source IP is sent to the same interface.
CAll traffic from a source IP is sent to the most used interface.
DAll traffic from a source IP to a destination IP is sent to the least used interface.
Which CLI command do you use to perform real-time troubleshooting for ADVPN negotiation?
Aget router info routing-table all
Bdiagnose debug application ike
Cdiagnose vpn tunnel list
Dget ipsec tunnel list
Refer to the exhibit.
Based on the exhibit, which two actions does FortiGate perform on sessions after a firewall policy change? (Choose two.)
AFortiGate flushes all sessions.
BFortiGate terminates the old sessions.
CFortiGate does not change existing sessions.
DFortiGate evaluates new sessions.
Which are two benefits of using CLI templates in FortiManager? (Choose two.)
AYou can reference meta fields.
BYou can configure interfaces as SD-WAN members without having to remove references first.
CYou can configure FortiManager to sync local configuration changes made on the managed device, to the CLI template.
DYou can configure advanced CLI settings.
Which best describes the SD-WAN traffic shaping mode that bases itself on a percentage of available bandwidth?
AInterface-based shaping mode
BReverse-policy shaping mode
CShared-policy shaping mode
DPer-IP shaping mode
Which are three key routing principles in SD-WAN? (Choose three.)
AFortiGate performs route lookups for new sessions only.
BRegular policy routes have precedence over SD-WAN rules.
CSD-WAN rules have precedence over ISDB routes.
DBy default, SD-WAN members are skipped if they do not have a valid route to the destination.
EBy default, SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member.
Refer to the exhibits.
Exhibit A -
Exhibit B -
Exhibit A shows the SD-WAN performance SLA and exhibit B shows the SD-WAN member status, the routing table, and the performance SLA status.
If port2 is detected dead by FortiGate, what is the expected behavior?
APort2 becomes alive after three successful probes are detected.
BFortiGate removes all static routes for port2.
CThe administrator manually restores the static routes for port2, if port2 becomes alive.
DHost 8.8.8.8 is reachable through port1 and port2.
Refer to the exhibits.
Exhibit A -
Exhibit B -
Exhibit A shows a site-to-site topology between two FortiGate devices: branch1_fgt and dc1_fgt. Exhibit B shows the system global and system settings configuration on dc1_fgt.
When branch1_client establishes a connection to dc1_host, the administrator observes that, on dc1_fgt, the reply traffic is routed over T_INET_0_0, even though T_INET_1_0 is the preferred member in the matching SD-WAN rule.
Based on the information shown in the exhibits, what configuration change must be made on dc1_fgt so dc1_fgt routes the reply traffic over T_INET_1_0?
AEnable auxiliary-session under config system settings.
BDisable tсp-session-without-syn under config system settings.
CEnable snat-route-change under config system global.
DDisable allow-subnet-overlap under config system settings.
Refer to the exhibits.
Exhibit A -
Exhibit B -
Exhibit A shows the configuration for an SD-WAN rule and exhibit B shows the respective rule status, the routing table, and the member status.
The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule.
Based on the exhibits, what can the administrator expect for traffic matching the SD-WAN rule?
AThe traffic will be load balanced across all three overlays.
BThe traffic will be routed over T_INET_0_0.
CThe traffic will be routed over T_MPLS_0.
DThe traffic will be routed over T_INET_1_0.
Refer to the exhibit, which shows the IPsec phase 1 configuration of a spoke.
What must you configure on the IPsec phase 1 configuration for ADVPN to work with SD-WAN?
AYou must set ike-version to 1.
BYou must enable net-device.
CYou must enable auto-discovery-sender.
DYou must disable idle-timeout.
Refer to the exhibits.
Exhibit A -
Exhibit B -
Exhibit A shows the traffic shaping policy and exhibit B shows the firewall policy.
The administrator wants FortiGate to limit the bandwidth used by YouTube. When testing, the administrator determines that FortiGate does not apply traffic shaping on YouTube traffic.
Based on the policies shown in the exhibits, what configuration change must be made so FortiGate performs traffic shaping on YouTube traffic?
ADestination internet service must be enabled on the traffic shaping policy.
BApplication control must be enabled on the firewall policy.
CWeb filtering must be enabled on the firewall policy.
DIndividual SD-WAN members must be selected as the outgoing interface on the traffic shaping policy.
In a hub-and-spoke topology, what are two advantages of enabling ADVPN on the IPsec overlays? (Choose two.)
AIt provides the benefits of a full-mesh topology in a hub-and-spoke network.
BIt provides direct connectivity between spokes by creating shortcuts.
CIt enables spokes to bypass the hub during shortcut negotiation.
DIt enables spokes to establish shortcuts to third-party gateways.
What is the route-tag setting in an SD-WAN rule used for?
ATo indicate the routes for health check probes.
BTo indicate the destination of a rule based on learned BGP prefixes.
CTo indicate the routes that can be used for routing SD-WAN traffic.
DTo indicate the members that can be used to route SD-WAN traffic.
Refer to the exhibit.
The exhibit shows the SD-WAN rule status and configuration.
Based on the exhibit, which change in the measured latency will make T_MPLS_0 the new preferred member?
AWhen T_INET_0_0 and T_MPLS_0 have the same latency.
BWhen T_MPLS_0 has a latency of 100 ms.
CWhen T_INET_0_0 has a latency of 250 ms.
DWhen T_N1PLS_0 has a latency of 80 ms.
Which two performance SLA protocols enable you to verify that the server response contains a specific value? (Choose two.)
Ahttp
Bicmp
Ctwamp
Ddns
Refer to the exhibit.
Which two conclusions for traffic that matches the traffic shaper are true? (Choose two.)
AThe traffic shaper drops packets if the bandwidth is less than 2500 KBps.
BThe measured bandwidth is less than 100 KBps.
CThe traffic shaper drops packets if the bandwidth exceeds 6250 KBps.
DThe traffic shaper limits the bandwidth of each source IP to a maximum of 6250 KBps.
Refer to the exhibit.
Two hub-and-spoke groups are connected through a site-to-site IPsec VPN between Hub 1 and Hub 2. The administrator configured ADVPN on both hub-and-spoke groups.
Which two outcomes are expected if a user in Toronto sends traffic to London? (Choose two.)
ALondon generates an IKE information message that contains the Toronto public IP address.
BTraffic from Toronto to London triggers the dynamic negotiation of a direct site-to-site VPN.
CToronto needs to establish a site-to-site tunnel with Hub 2 to bypass Hub 1.
DThe first packets from Toronto to London are routed through Hub 1 then to Hub 2.