0 likes | 0 Views
Get the latest FCP - FortiGate 7.6 Administrator FCP_FGT_AD-7.6 Dumps Questions from Certspots, designed for instant download and easy study anytime, anywhere. This PDF version includes real exam-style questions and accurate answers, allowing you to prepare offline with convenience and confidence. Whether on your laptop, tablet, or mobile device, Certspots ensures you can access and practice the most updated content to boost your chances of passing your exam on the first attempt.
E N D
Fortinet FCP_FGT_AD-7.6 Dumps FCP - FortiGate 7.6 Administrator FCP - FortiGate 7.6 Administrator https://www.certspots.com/exam/fcp_fgt_ad-7-6/
Fortinet FCP_FGT_AD-7.6 Exam Dumps 1. 1. Which two IP pool types are useful for carrier-grade NAT Which two IP pool types are useful for carrier-grade NAT deployments? (Choose two.) deployments? (Choose two.) A. Port block allocation A. Port block allocation B. Fixed port range B. Fixed port range C. One-to-one C. One-to-one D. Overload D. Overload Answer: A,B Answer: A,B
Fortinet FCP_FGT_AD-7.6 Exam Dumps 2. 2.What must you configure to enable proxy-based TCP session failover? What must you configure to enable proxy-based TCP session failover? A. You must configure ha-configuration-sync under configure system ha. A. You must configure ha-configuration-sync under configure system ha. B. You do not need to configure anything because all TCP sessions are B. You do not need to configure anything because all TCP sessions are automatically failed over. automatically failed over. C. You must configure session-pickup-enable under configure system ha. C. You must configure session-pickup-enable under configure system ha. D. You must configure session-pickup-connectionless enable under D. You must configure session-pickup-connectionless enable under configure system ha. configure system ha. Answer: C Answer: C
Fortinet FCP_FGT_AD-7.6 Exam Dumps 3. 3. An administrator needs to inspect all web traffic (including An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to the SSL-VPN. Internet web traffic) coming from users connecting to the SSL-VPN. How can this be achieved? How can this be achieved? A. Assigning public IP addresses to SSL-VPN users A. Assigning public IP addresses to SSL-VPN users B. Configuring web bookmarks B. Configuring web bookmarks C. Disabling split tunneling C. Disabling split tunneling D. Using web-only mode D. Using web-only mode Answer: C Answer: C
Fortinet FCP_FGT_AD-7.6 Exam Dumps 4. 4. What is the common feature shared between IPv4 and SD-WAN What is the common feature shared between IPv4 and SD-WAN ECMP algorithms? ECMP algorithms? A. Both can be enabled at the same time. A. Both can be enabled at the same time. B. Both support volume algorithms. B. Both support volume algorithms. C. Both control ECMP algorithms. C. Both control ECMP algorithms. D. Both use the same physical interface load balancing settings. D. Both use the same physical interface load balancing settings. Answer: C Answer: C
Fortinet FCP_FGT_AD-7.6 Exam Dumps 5. 5. An administrator has configured a strict RPF check on FortiGate. An administrator has configured a strict RPF check on FortiGate. How does strict RPF check work? How does strict RPF check work? A. Strict RPF allows packets back to sources with all active routes. A. Strict RPF allows packets back to sources with all active routes. B. Strict RPF checks the best route back to the source using the B. Strict RPF checks the best route back to the source using the incoming interface. incoming interface. C. Strict RPF checks only for the existence of at least one active C. Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface. route back to the source using the incoming interface. D. Strict RPF check is run on the first sent and reply packet of any D. Strict RPF check is run on the first sent and reply packet of any new session. new session. Answer: B Answer: B
Fortinet FCP_FGT_AD-7.6 Exam Dumps 6. 6. Which two settings are required for SSL VPN to function between Which two settings are required for SSL VPN to function between two FortiGate devices? (Choose two.) two FortiGate devices? (Choose two.) A. The client FortiGate requires a manually added route to remote A. The client FortiGate requires a manually added route to remote subnets. subnets. B. The client FortiGate requires a client certificate signed by the CA B. The client FortiGate requires a client certificate signed by the CA on the server FortiGate. on the server FortiGate. C. The server FortiGate requires a CA certificate to verify the client C. The server FortiGate requires a CA certificate to verify the client FortiGate certificate. FortiGate certificate. D. The client FortiGate requires the SSL VPN tunnel interface type to D. The client FortiGate requires the SSL VPN tunnel interface type to connect SSL VPN. connect SSL VPN. Answer: C,D Answer: C,D
Fortinet FCP_FGT_AD-7.6 Exam Dumps 7. 7. Which two statements are true about the FGCP protocol? (Choose Which two statements are true about the FGCP protocol? (Choose two.) two.) A. FGCP elects the primary FortiGate device. A. FGCP elects the primary FortiGate device. B. FGCP is not used when FortiGate is in transparent mode. B. FGCP is not used when FortiGate is in transparent mode. C. FGCP runs only over the heartbeat links. C. FGCP runs only over the heartbeat links. D. FGCP is used to discover FortiGate devices in different HA groups. D. FGCP is used to discover FortiGate devices in different HA groups. Answer: A,C Answer: A,C
Fortinet FCP_FGT_AD-7.6 Exam Dumps 8. 8. What are two benefits of flow-based inspection compared to What are two benefits of flow-based inspection compared to proxy-based inspection? (Choose two.) proxy-based inspection? (Choose two.) A. FortiGate uses fewer resources. A. FortiGate uses fewer resources. B. FortiGate performs a more exhaustive inspection on traffic. B. FortiGate performs a more exhaustive inspection on traffic. C. FortiGate adds less latency to traffic. C. FortiGate adds less latency to traffic. D. FortiGate allocates two sessions per connection. D. FortiGate allocates two sessions per connection. Answer: A,C Answer: A,C
Fortinet FCP_FGT_AD-7.6 Exam Dumps 9. 9. Which three statements explain a flow-based antivirus profile? Which three statements explain a flow-based antivirus profile? (Choose three.) (Choose three.) A. Flow-based inspection uses a hybrid of the scanning modes A. Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection. available in proxy-based inspection. B. If a virus is detected, the last packet is delivered to the client. B. If a virus is detected, the last packet is delivered to the client. C. The IPS engine handles the process as a standalone. C. The IPS engine handles the process as a standalone. D. FortiGate buffers the whole file but transmits to the client at the D. FortiGate buffers the whole file but transmits to the client at the same time. same time. E. Flow-based inspection optimizes performance compared to E. Flow-based inspection optimizes performance compared to proxy-based inspection. proxy-based inspection. Answer: A,D,E Answer: A,D,E
Fortinet FCP_FGT_AD-7.6 Exam Dumps 10. 10. Which three criteria can FortiGate use to look for a matching Which three criteria can FortiGate use to look for a matching firewall policy to process traffic? (Choose three.) firewall policy to process traffic? (Choose three.) A. Services defined in the firewall policy A. Services defined in the firewall policy B. Highest to lowest priority defined in the firewall policy B. Highest to lowest priority defined in the firewall policy C. Destination defined as Internet Services in the firewall policy C. Destination defined as Internet Services in the firewall policy D. Lowest to highest policy ID number D. Lowest to highest policy ID number E. Source defined as Internet Services in the firewall policy E. Source defined as Internet Services in the firewall policy Answer: A,C,E Answer: A,C,E