Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

15/3/24, 18:55 FortiGate 7.

4 Operator Exam: Attempt review

 FCA - FortiGate 7.4 Operator Self-Paced

Started on Friday, March 15, 2024, 11:19 PM


State Finished
Completed on Friday, March 15, 2024, 11:55 PM
Time taken 35 mins 42 secs
Points 36/40
Grade 90 out of 100
Feedback Congratulations, you passed!

Question 1 What is a recommended best practice when configuring Secure Socket Layer Virtual Private Network (SSL VPN)?
Correct

1 points out of 1 Select one:


Use the principle of least privilege.
Allow connections from all locations.
Use local users for authentication.
Import the self-signed SSL certificate.

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 1/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 2 Why is it important to back up FortiGate system configurations regularly?


Correct

1 points out of 1 Select one:


To prevent unexpected configuration changes
To avoid errors while upgrading FortiOS
To save time and effort in case of a hardware failure
To ensure optimal performance of FortiGate

Question 3 How does FortiGate application control address evasion techniques used by peer-to-peer protocols?
Correct

1 points out of 1 Select one:


By monitoring traffic for known patterns
By examining a URL block list
By allowing traffic from only well-known ports.
By analyzing flow-based inspection

Question 4 When upgrading the FortiGate firmware, why is it important to follow the recommended upgrade path?
Correct

1 points out of 1 Select one:


It minimizes the need for configuration backups.
It ensures the compatibility and stability of the device.
It provides access to new major features.
It guarantees a faster upgrade process.

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 2/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 5 Which protocol is used for the authentication and encryption of the data in an IPSec VPN implementation?
Correct

1 points out of 1 Select one:


Encapsulation Security Payload (ESP)
Advanced Encryption Standard (AES)
Secure Hash Algorithm (SHA)
Transport Layer Security (TLS)

Question 6 Why is the order of firewall policies important?


Correct

1 points out of 1 Select one:


To avoid conflicts with other policies in the table with similar parameters
To allow for a faster processing of high priority traffic
To ensure that the security traffic is logged before the normal traffic
To ensure more granular policies are checked and applied before more general policies

Question 7 Which two protocols can you use for administrative access on a FortiGate interface?
Correct

1 points out of 1 Select one:


Telnet and Simple Network Management Protocol (SNMP)
Hypertext Transfer Protocol Secure (HTTPS) and Secure Shell (SSH)
Simple Mail Transfer Protocol (SMTP) and Secure Sockets Layer (SSL)
Remote Desktop Protocol (RDP) and Hypertext Transfer Protocol (HTTP)

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 3/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 8 Which two criteria can be matched in the Source field of a firewall policy?
Correct

1 points out of 1 Select one:


MAC address and domain name
IP address and user
Address group and hostname
Interface and service type

Question 9 You need to examine the logs related to local users watching YouTube videos. Where can you find those logs?
Correct

1 points out of 1 Select one:


Log and Report > Security Events > Intrusion Prevention
Log and Report > Security Events > Antivirus
Log and Report > Security Events > Application Control
Log and Report > Security Events > WebFilter

Question 10 What are the three key categories of services provided by FortiGuard Labs?
Correct

1 points out of 1 Select one:


Machine learning, antivirus, and network monitoring
Data encryption, network segmentation, and access control
Threat hunting, intrusion detection, and firewall management
Artificial intelligence, real-time threat protection, and outbreak alerts

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 4/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 11 How does the FortiGate intrusion prevention system (IPS) use signatures to detect malicious traffic?
Correct

1 points out of 1 Select one:


By blocking all network traffic
By monitoring user activity on websites
By decrypting Secure Sockets Layer (SSL)-encrypted traffic
By comparing network packets to known threats

Question 12 Which two steps are involved in configuring web filtering based on FortiGuard category filters? (Choose two.)
Correct

1 points out of 1 Select one or more:


Apply the web filter security profile to the appropriate firewall policy.
Upgrade FortiOS to obtain the latest database from FortiGuard.
Create a web filtering security profile using FortiGuard category-based filters.
Identify the specific websites to be blocked or allowed.

Question 13 To avoid certificate errors, which field settings must be included in a Secure Sockets Layer (SSL) certificate issued by a certificate
Incorrect authority (CA)?
0 points out of 1
Select one:
issuer: C=US, O=Fortinet, CN=Verisign
subjectAltName: DNS:*.example.com and extendedKeyUsage: serverAuth 
signatureAlgorithm: SHA256withRSA and validityPeriod: 365 days

basicConstraints: CA:TRUE and keyUsage: keyCertSign

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 5/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 14 What is a characteristic of a firewall policy used to allow the traffic from Secure Socket Layer Virtual Private Network (SSL VPN)
Incorrect connections?
0 points out of 1
Select one:
It defines the port number used for the SSL VPN portal.
It uses a virtual tunnel interface in the source field.
It encapsulates the traffic using the VPN settings configured. 
It assigns SSL certificates to user groups trying to connect.

Question 15 Which condition could prevent a configured route from being added to the FortiGate routing table?
Correct

1 points out of 1 Select one:


The DHCP server associated with the route being disabled
The presence of a better route for the same destination
The absence of administrative access protocols on the interface
The incorrect distance being set for the default gateway IP address

Question 16 Which two additional features and settings can you apply to traffic after it is accepted by a firewall policy? (Choose two.)
Correct

1 points out of 1 Select one or more:


Application control
Packet filtering
Antivirus scanning

User authentication

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 6/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 17 What is the recommended process to configure FortiGate for remote authentication for user identification?
Correct

1 points out of 1 Select one:


Create a user account, configure a firewall policy with the user account as the source, and verify the configuration using
logs.
Create a user group and configure a firewall policy with the group as the source.
Connect FortiGate to a remote authentication server and configure its IP addresses as the source.
Create a user group, map authenticated remote users to the group, and configure a firewall policy with the user group 
as the source.

Question 18 What is the security rating in the Fortinet Security Fabric, and how is it calculated?
Correct

1 points out of 1 Select one:


It indicates the level of compatibility with third-party devices.
It is calculated based on the number of security logs generated.
It is a numerical value based on device settings and best practices.
It represents the current level of network performance.

Question 19 How can administrators track successful authentication attempts in FortiGate?


Correct

1 points out of 1 Select one:


By analyzing network traffic patterns
By utilizing advanced threat intelligence feeds

By reviewing the logs and dashboards
By monitoring security events in real-time

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 7/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 20 What causes a web browser to display a certificate warning when using Secure Sockets Layer (SSL) deep inspection with the
Incorrect FortiGate CA certificate?
0 points out of 1
Select one:
FortiGate is using a CA that is not trusted by the web browser.
The browser does not support SSL deep inspection.
FortiGate is unable to decrypt the SSL-encrypted traffic. 
The temporary certificate makes FortiGate behave like a man-in-the-middle (MITM) attack.

Question 21 Which two settings are included in a Dynamic Host Configuration Protocol (DHCP) server configuration on FortiGate? (Choose
Correct two.)
1 points out of 1
Select one or more:
Interface Alias
Address range
Subnet object
Default gateway

Question 22 Which scan technique detects known malware by matching signatures in the FortiGuard Labs database?
Correct

1 points out of 1 Select one:


Machine learning (ML)/artificial intelligence (AI) scan
Grayware scan

Antivirus scan
Behavioral analysis scan

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 8/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 23 What are two reasons why FortiGate Secure Socket Layer Virtual Private Network (SSL VPN) is considered cost-effective
Correct compared to other vendors? (Choose two.)
1 points out of 1
Select one or more:
Because it provides full network access to remote users.
Because it supports a limited number of third-party applications.
Because the number of remote users is determined by the model.
Because it does not require an additional license.

Question 24 How does FortiGate intrusion prevention system (IPS) detect anomalous traffic patterns that do not conform to established
Correct protocol requirements and standards?
1 points out of 1
Select one:
By using protocol decoders
By analyzing Secure Sockets Layer (SSL) certificates
By decrypting network packets
By monitoring user behavior

Question 25 Which actions can you apply to application categories in the Application Control profile?
Correct

1 points out of 1 Select one:


Monitor, allow, block, or quarantine
Authenticate, log, encrypt, or back up

Monitor, optimize, redirect, or shape
Allow, encrypt, compress, or redirect

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 9/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 26 What are some of the features provided by IPSec VPNs?


Correct

1 points out of 1 Select one:


Data encryption and load balancing
Data authentication and data integrity
Network segmentation and packet inspection
Bandwidth optimization and antireplay protection

Question 27 What is a scenario where automation is used in the Fortinet Security Fabric?
Correct

1 points out of 1 Select one:


Generating weekly reports for management review
Automatically quarantining a computer with malicious activity
Assigning security ratings to newly added devices
Monitoring disk space utilization on FortiAnalyzer

Question 28 Excluding the steps for tuning the sensors, what is the last step involved in configuring IPS on FortiGate?
Correct

1 points out of 1 Select one:


Editing the sensor's signature and filters
Enabling SSL inspection for the traffic of interest
Blocking malicious URLs and botnet command-and-control (C&C) traffic
Applying the sensor to a firewall policy

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 10/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 29 What functionality does FortiGate provide to establish secure connections between a main office and its remote branches, over
Correct the internet?
1 points out of 1
Select one:
Firewall authentication
Monitoring and logging
Virtual private networks
Security scanning

Question 30 When is remote authentication preferred over local authentication?


Correct

1 points out of 1 Select one:


When FortiGate does not support local user accounts
When multiple FortiGate devices need to authenticate the same users or user groups
When FortiGate needs to give lower priority to the traffic from local user accounts
When the network does not have an available authentication server

Question 31 Why is Secure Socket Layer (SSL) inspection necessary for the intrusion prevention system (IPS) to detect threats in encrypted
Correct traffic?
1 points out of 1
Select one:
SSL inspection allows the IPS to detect and analyze encrypted threats.
The IPS engine can inspect only legacy encryption algorithms, by default.

Without SSL inspection, encrypted traffic is automatically blocked by the IPS.
SSL inspection improves network performance by bypassing encrypted traffic.

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 11/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 32 What are two activities that cybercriminals can perform using malware? (Choose two.)
Correct

1 points out of 1 Select one or more:


Extort money
Damage physical ports
Trigger a high availability (HA) failover
Steal intellectual property

Question 33 Which piece of information does FortiGate know about the user without firewall authentication?
Correct

1 points out of 1 Select one:


The originating domain name
The source IP address
The application being used
The user login name

Question 34 What is the purpose of the FortiGuard Labs signature database?


Correct

1 points out of 1 Select one:


To identify and correct vulnerabilities in FortiGate firewalls
To provide secure configuration templates to FortiGate firewalls
To give FortiGate firewalls the ability to track network traffic and usage patterns
To keep FortiGate firewalls protected against the latest malware variants

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 12/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 35 Which two options can you use for centralized logging when you configure the Fortinet Security Fabric? (Choose two.)
Incorrect

0 points out of 1 Select one or more:


Syslog server 
FortiAnalyzer
FortiGate Cloud
FortiSOAR

Question 36 What are two benefits of performing regular maintenance on FortiGate firewalls? (Choose two.)
Correct

1 points out of 1 Select one or more:


Ensure you have the latest hardware.
Minimize costs during upgrades.
Meet compliance and legal requirements.
Prevent security breaches in your organization.

Question 37 Why is it recommended that you use user groups instead of individual user accounts in a firewall policy?
Correct

1 points out of 1 Select one:


User groups provide stronger encryption for authentication.
User groups contain all individual user accounts by default.
User groups make it easier to monitor authenticated users.
User groups simplify the firewall configuration.

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 13/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 38 What is the key difference between Secure Sockets Layer (SSL) certificate inspection and SSL deep inspection?
Correct

1 points out of 1 Select one:


SSL certificate inspection applies to only HTTPS traffic, while SSL deep inspection applies to multiple SSL-encrypted 
protocols.
SSL certificate inspection introduces certificate errors, while SSL deep inspection prevents certificate warnings.
SSL certificate inspection requires a trusted certificate authority (CA), while SSL deep inspection uses the FortiGate CA
certificate.
SSL certificate inspection decrypts and inspects encrypted content, while SSL deep inspection verifies the identity of the
web server.

Question 39 How does an IPS protect networks from threats?


Correct

1 points out of 1 Select one:


By blocking all incoming network traffic from new sources
By analyzing traffic and identifying potential threats
By encrypting all network traffic from untrusted IP addresses
By allowing only secure access to network resources

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 14/15
15/3/24, 18:55 FortiGate 7.4 Operator Exam: Attempt review

Question 40 Which inspection mode processes and forwards each packet, without waiting for the complete file or web page?
Correct

1 points out of 1 Select one:


Proxy-based inspection
Flow-based inspection
Application-level inspection
Stateful inspection

https://training.fortinet.com/mod/quiz/review.php?attempt=18468023&cmid=485066 15/15

You might also like