Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

26/2/24, 9:28 FortiGate 7.

4 Operator Exam: Attempt review

 FCA - FortiGate 7.4 Operator Self-Paced


Started on Monday, February 26, 2024, 2:57 PM
State Finished
Completed on Monday, February 26, 2024, 3:26 PM
Time taken 28 mins 24 secs
Points 36/40
Grade 90 out of 100
Feedback Congratulations, you passed!

Question 1

Correct

1 points out of 1

Which two protocols can you use for administrative access on a FortiGate interface?

Select one:
Remote Desktop Protocol (RDP) and Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol Secure (HTTPS) and Secure Shell (SSH)
Simple Mail Transfer Protocol (SMTP) and Secure Sockets Layer (SSL)
Telnet and Simple Network Management Protocol (SNMP)

Question 2
Correct

1 points out of 1

How do you configure an internet service as the destination in a firewall policy?

Select one:
Specify the MAC address of the service.
Configure the service with a virtual IP.
Select the service from the ISDB.
Choose the IP subnet of the service.

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 1/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 3

Correct

1 points out of 1

How does FortiGate application control address evasion techniques used by peer-to-peer protocols?

Select one:
By analyzing flow-based inspection
By examining a URL block list
By allowing traffic from only well-known ports.
By monitoring traffic for known patterns

Question 4

Correct

1 points out of 1

Which category of services does FortiGuard Labs provide as part of FortiGuard Security Services?

Select one:
Endpoint protection and vulnerability management
Network segmentation and access control
Data encryption and secure communications
Advanced threat intelligence and prevention

Question 5

Correct

1 points out of 1

Why is it recommended that you use user groups instead of individual user accounts in a firewall policy?

Select one:
User groups simplify the firewall configuration.
User groups provide stronger encryption for authentication.
User groups make it easier to monitor authenticated users.
User groups contain all individual user accounts by default.

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 2/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 6
Correct

1 points out of 1

When configuring antivirus scanning on a firewall policy, which antivirus item should you select?

Select one:
Antivirus schedule
Antivirus profile
Antivirus engine version
Antivirus exclusion list

Question 7

Incorrect

0 points out of 1

What is the recommended process to configure FortiGate for remote authentication for user identification?

Select one:
Create a user group and configure a firewall policy with the group as the source.
Create a user account, configure a firewall policy with the user account as the source, and verify the configuration using logs. 
Connect FortiGate to a remote authentication server and configure its IP addresses as the source.
Create a user group, map authenticated remote users to the group, and configure a firewall policy with the user group as the source.

Question 8
Correct

1 points out of 1

What are two reasons why FortiGate Secure Socket Layer Virtual Private Network (SSL VPN) is considered cost-effective compared to other
vendors? (Choose two.)

Select one or more:


Because it provides full network access to remote users.
Because it does not require an additional license.
Because the number of remote users is determined by the model.
Because it supports a limited number of third-party applications.

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 3/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 9
Correct

1 points out of 1

To avoid certificate errors, which field settings must be included in a Secure Sockets Layer (SSL) certificate issued by a certificate authority (CA)?

Select one:
signatureAlgorithm: SHA256withRSA and validityPeriod: 365 days
subjectAltName: DNS:*.example.com and extendedKeyUsage: serverAuth
basicConstraints: CA:TRUE and keyUsage: keyCertSign
issuer: C=US, O=Fortinet, CN=Verisign

Question 10
Correct

1 points out of 1

What is the purpose of creating a firewall address object?

Select one:
To enable web filtering for a specific address
To define the action for a firewall policy
To specify the source and destination interfaces
To match the source or destination IP subnet

Question 11
Correct

1 points out of 1

What is the security rating in the Fortinet Security Fabric, and how is it calculated?

Select one:
It represents the current level of network performance.
It is calculated based on the number of security logs generated.
It is a numerical value based on device settings and best practices.
It indicates the level of compatibility with third-party devices.

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 4/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 12
Correct

1 points out of 1

Which action can you take to improve the security rating provided by the Fortinet Security Fabric?

Select one:
Apply one or more of the suggested best practices.
Create a configuration revision or back up the configuration.
Run the integrity check on all end devices.
Upgrade FortiGate to the latest mature version available.

Question 13
Correct

1 points out of 1

What is a recommended best practice when configuring Secure Socket Layer Virtual Private Network (SSL VPN)?

Select one:
Use the principle of least privilege.
Import the self-signed SSL certificate.
Allow connections from all locations.
Use local users for authentication.

Question 14
Correct

1 points out of 1

Which two options can you use for centralized logging when you configure the Fortinet Security Fabric? (Choose two.)

Select one or more:


FortiSOAR
Syslog server
FortiAnalyzer
FortiGate Cloud

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 5/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 15
Correct

1 points out of 1

Which scan technique detects known malware by matching signatures in the FortiGuard Labs database?

Select one:
Antivirus scan
Grayware scan
Machine learning (ML)/artificial intelligence (AI) scan
Behavioral analysis scan

Question 16
Correct

1 points out of 1

How does an IPS protect networks from threats?

Select one:
By analyzing traffic and identifying potential threats
By allowing only secure access to network resources
By encrypting all network traffic from untrusted IP addresses
By blocking all incoming network traffic from new sources

Question 17
Correct

1 points out of 1

What are two reasons why organizations and individuals use web filtering? (Choose two.)

Select one or more:


To enhance their users’ experience
To increase network bandwidth
To preserve employee productivity
To prevent network congestion

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 6/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 18

Correct

1 points out of 1

What is a scenario where automation is used in the Fortinet Security Fabric?

Select one:
Assigning security ratings to newly added devices
Automatically quarantining a computer with malicious activity
Generating weekly reports for management review
Monitoring disk space utilization on FortiAnalyzer

Question 19

Correct

1 points out of 1

Excluding the steps for tuning the sensors, what is the last step involved in configuring IPS on FortiGate?

Select one:
Editing the sensor's signature and filters
Enabling SSL inspection for the traffic of interest
Blocking malicious URLs and botnet command-and-control (C&C) traffic
Applying the sensor to a firewall policy

Question 20

Correct

1 points out of 1

When is remote authentication preferred over local authentication?

Select one:
When FortiGate does not support local user accounts
When the network does not have an available authentication server
When multiple FortiGate devices need to authenticate the same users or user groups
When FortiGate needs to give lower priority to the traffic from local user accounts

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 7/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 21
Correct

1 points out of 1

In addition to central processing unit (CPU) and memory usage, what are two other key performance parameters you should monitor on
FortiGate? (Choose two.)

Select one or more:


Number of SSL sessions
Number of active VPN tunnels
Number of days for licenses to expire
Number of local users and user groups

Question 22

Correct

1 points out of 1

What causes a web browser to display a certificate warning when using Secure Sockets Layer (SSL) deep inspection with the FortiGate CA
certificate?

Select one:
FortiGate is unable to decrypt the SSL-encrypted traffic.
The temporary certificate makes FortiGate behave like a man-in-the-middle (MITM) attack.
The browser does not support SSL deep inspection.
FortiGate is using a CA that is not trusted by the web browser.

Question 23

Correct

1 points out of 1

What are two benefits of performing regular maintenance on FortiGate firewalls? (Choose two.)

Select one or more:


Ensure you have the latest hardware.
Prevent security breaches in your organization.
Meet compliance and legal requirements.
Minimize costs during upgrades.

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 8/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 24

Correct

1 points out of 1

Why is Secure Socket Layer (SSL) inspection necessary for the intrusion prevention system (IPS) to detect threats in encrypted traffic?

Select one:
SSL inspection allows the IPS to detect and analyze encrypted threats.
Without SSL inspection, encrypted traffic is automatically blocked by the IPS.
The IPS engine can inspect only legacy encryption algorithms, by default.
SSL inspection improves network performance by bypassing encrypted traffic.

Question 25

Correct

1 points out of 1

How does FortiGate handle blocked websites in web filtering using FortiGuard category filters?

Select one:
Users receive a warning message but can choose to continue accessing the website.
Users are prompted to provide a valid username and password for access.
Users are allowed to access the website, but their activity is recorded in the FortiGate logs.
Users are redirected to a replacement message indicating the website is blocked.

Question 26

Correct

1 points out of 1

Which inspection mode processes and forwards each packet, without waiting for the complete file or web page?

Select one:
Stateful inspection
Flow-based inspection
Application-level inspection
Proxy-based inspection

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 9/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 27
Correct

1 points out of 1

You need to examine the logs related to local users watching YouTube videos. Where can you find those logs?

Select one:
Log and Report > Security Events > Application Control
Log and Report > Security Events > Antivirus
Log and Report > Security Events > Intrusion Prevention
Log and Report > Security Events > WebFilter

Question 28
Correct

1 points out of 1

What functionality does FortiGate provide to establish secure connections between a main office and its remote branches, over the internet?

Select one:
Security scanning
Virtual private networks
Monitoring and logging
Firewall authentication

Question 29
Correct

1 points out of 1

What is the purpose of the FortiGuard Labs signature database?

Select one:
To keep FortiGate firewalls protected against the latest malware variants
To identify and correct vulnerabilities in FortiGate firewalls
To give FortiGate firewalls the ability to track network traffic and usage patterns
To provide secure configuration templates to FortiGate firewalls

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 10/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 30

Correct

1 points out of 1

What protocol is used to dynamically create IPSec VPN tunnels?

Select one:
Layer 2 Tunneling Protocol (L2TP)
Point-to-Point Tunneling Protocol (PPTP)
Internet Key Exchange Version 2 (IKEv2)
Generic Route Encapsulation (GRE)

Question 31

Correct

1 points out of 1

Which two criteria can be matched in the Source field of a firewall policy?

Select one:
IP address and user
Address group and hostname
MAC address and domain name
Interface and service type

Question 32

Correct

1 points out of 1

In which architecture is the need to control application traffic becoming increasingly relevant?

Select one:
Cloud-based architecture
Peer-to-peer architecture
Distributed architecture
Traditional client-server architecture

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 11/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 33
Correct

1 points out of 1

Which two additional features and settings can you apply to traffic after it is accepted by a firewall policy? (Choose two.)

Select one or more:


Application control
Packet filtering
User authentication
Antivirus scanning

Question 34

Correct

1 points out of 1

What are two activities that cybercriminals can perform using malware? (Choose two.)

Select one or more:


Trigger a high availability (HA) failover
Steal intellectual property
Extort money
Damage physical ports

Question 35
Correct

1 points out of 1

Which condition could prevent a configured route from being added to the FortiGate routing table?

Select one:
The incorrect distance being set for the default gateway IP address
The DHCP server associated with the route being disabled
The presence of a better route for the same destination
The absence of administrative access protocols on the interface

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 12/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 36
Incorrect

0 points out of 1

Why is it important to back up FortiGate system configurations regularly?

Select one:
To ensure optimal performance of FortiGate 
To avoid errors while upgrading FortiOS
To save time and effort in case of a hardware failure
To prevent unexpected configuration changes

Question 37
Incorrect

0 points out of 1

Which protocol is used for the authentication and encryption of the data in an IPSec VPN implementation?

Select one:
Encapsulation Security Payload (ESP)
Transport Layer Security (TLS)
Advanced Encryption Standard (AES)
Secure Hash Algorithm (SHA) 

Question 38

Correct

1 points out of 1

Which piece of information does FortiGate know about the user without firewall authentication?

Select one:
The application being used
The user login name
The source IP address
The originating domain name

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 13/14
26/2/24, 9:28 FortiGate 7.4 Operator Exam: Attempt review

Question 39

Correct

1 points out of 1

What is the main advantage of using Secure Socket Layer Virtual Private Network (SSL VPN) in web mode?

Select one:
Support for a wide range of applications and protocols
No need to install client software
Access to all network resources for remote users
Ability to perform client integrity checks

Question 40
Incorrect

0 points out of 1

How are websites filtered using FortiGuard category filters?

Select one:
By scanning the website for malware in real time 
By denying access based on the website IP address
By examining the HTTP headers from the website
By blocking access based on the website content

https://training.fortinet.com/mod/quiz/review.php?attempt=18303818&cmid=485066 14/14

You might also like