You are on page 1of 14

3/27/24, 5:08 PM FortiGate 7.

4 Operator Exam: Attempt review

PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE Training Institute

 FCA - FortiGate 7.4 Operator Self-Paced

Started on Wednesday, March 27, 2024, 10:43 PM


State Finished
Completed on Thursday, March 28, 2024, 12:08 AM
Time taken 1 hour 25 mins
Points 19/40
Grade 48 out of 100
Feedback Sorry, you did not pass.

Question 1 What are two reasons why organizations and individuals use web filtering? (Choose two.)
Correct

1 points out of 1 Select one or more:


To enhance their users’ experience
To prevent network congestion
To increase network bandwidth
To preserve employee productivity

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 1/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 2
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
What is a scenario where automation is used in the Fortinet Security Fabric?
Incorrect

0 points out of 1 Select one:


Generating weekly reports for management review
Monitoring disk space utilization on FortiAnalyzer
Automatically quarantining a computer with malicious activity
Assigning security ratings to newly added devices 

Question 3 What is the security rating in the Fortinet Security Fabric, and how is it calculated?
Incorrect

0 points out of 1 Select one:


It represents the current level of network performance.
It is a numerical value based on device settings and best practices.
It indicates the level of compatibility with third-party devices.
It is calculated based on the number of security logs generated. 

Question 4 In which architecture is the need to control application traffic becoming increasingly relevant?
Incorrect

0 points out of 1 Select one:


Distributed architecture
Cloud-based architecture 
Traditional client-server architecture
Peer-to-peer architecture

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 2/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 5
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
Which two settings are included in a Dynamic Host Configuration Protocol (DHCP) server configuration on FortiGate?
Correct (Choose two.)
1 points out of 1
Select one or more:
Address range
Subnet object
Interface Alias
Default gateway

Question 6 What are the three key categories of services provided by FortiGuard Labs?
Incorrect

0 points out of 1 Select one:


Artificial intelligence, real-time threat protection, and outbreak alerts
Data encryption, network segmentation, and access control
Threat hunting, intrusion detection, and firewall management 
Machine learning, antivirus, and network monitoring

Question 7 To avoid certificate errors, which field settings must be included in a Secure Sockets Layer (SSL) certificate issued by a
Incorrect certificate authority (CA)?
0 points out of 1
Select one:
issuer: C=US, O=Fortinet, CN=Verisign
signatureAlgorithm: SHA256withRSA and validityPeriod: 365 days
subjectAltName: DNS:*.example.com and extendedKeyUsage: serverAuth 
basicConstraints: CA:TRUE and keyUsage: keyCertSign 

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 3/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 8
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
What functionality does FortiGate provide to establish secure connections between a main office and its remote branches,
Incorrect over the internet?
0 points out of 1
Select one:
Firewall authentication 
Monitoring and logging
Virtual private networks
Security scanning

Question 9 What is the main advantage of using Secure Socket Layer Virtual Private Network (SSL VPN) in web mode?
Correct

1 points out of 1 Select one:


Access to all network resources for remote users
Ability to perform client integrity checks
Support for a wide range of applications and protocols
No need to install client software

Question 10 What are two consequences of allowing a FortiGate license to expire? (Choose two.)
Incorrect

0 points out of 1 Select one or more:


Loss of access to software updates and technical support
Inability to monitor system logs and generate network reports 
Disruption of network services and potential legal issues
Reduced FortiGate performance and increased vulnerability to security threats

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 4/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 11
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
Which two criteria can be matched in the Source field of a firewall policy?
Incorrect

0 points out of 1 Select one:


Address group and hostname 
IP address and user
MAC address and domain name
Interface and service type

Question 12 In addition to central processing unit (CPU) and memory usage, what are two other key performance parameters you should
Correct monitor on FortiGate? (Choose two.)
1 points out of 1
Select one or more:
Number of days for licenses to expire
Number of SSL sessions
Number of local users and user groups
Number of active VPN tunnels

Question 13 Which scan technique detects known malware by matching signatures in the FortiGuard Labs database?
Correct

1 points out of 1 Select one:


Machine learning (ML)/artificial intelligence (AI) scan
Antivirus scan
Grayware scan
Behavioral analysis scan

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 5/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 14
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
Excluding the steps for tuning the sensors, what is the last step involved in configuring IPS on FortiGate?
Correct

1 points out of 1 Select one:


Applying the sensor to a firewall policy
Enabling SSL inspection for the traffic of interest
Blocking malicious URLs and botnet command-and-control (C&C) traffic
Editing the sensor's signature and filters

Question 15 Which protocol is used for the authentication and encryption of the data in an IPSec VPN implementation?
Incorrect

0 points out of 1 Select one:


Secure Hash Algorithm (SHA) 
Advanced Encryption Standard (AES)
Encapsulation Security Payload (ESP)
Transport Layer Security (TLS)

Question 16 Which category of services does FortiGuard Labs provide as part of FortiGuard Security Services?
Correct

1 points out of 1 Select one:


Data encryption and secure communications
Endpoint protection and vulnerability management
Advanced threat intelligence and prevention
Network segmentation and access control

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 6/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 17
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
How do you configure an internet service as the destination in a firewall policy?
Correct

1 points out of 1 Select one:


Specify the MAC address of the service.
Choose the IP subnet of the service.
Configure the service with a virtual IP.
Select the service from the ISDB.

Question 18 How can administrators track successful authentication attempts in FortiGate?


Incorrect

0 points out of 1 Select one:


By reviewing the logs and dashboards
By utilizing advanced threat intelligence feeds
By analyzing network traffic patterns
By monitoring security events in real-time 

Question 19 What is the purpose of creating a firewall address object?


Incorrect

0 points out of 1 Select one:


To define the action for a firewall policy
To specify the source and destination interfaces
To match the source or destination IP subnet
To enable web filtering for a specific address 

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 7/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 20
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
How does FortiGate application control address evasion techniques used by peer-to-peer protocols?
Incorrect

0 points out of 1 Select one:


By monitoring traffic for known patterns
By allowing traffic from only well-known ports.
By analyzing flow-based inspection 
By examining a URL block list

Question 21 What is the purpose of the FortiGuard Labs signature database?


Incorrect

0 points out of 1 Select one:


To identify and correct vulnerabilities in FortiGate firewalls 
To provide secure configuration templates to FortiGate firewalls
To give FortiGate firewalls the ability to track network traffic and usage patterns
To keep FortiGate firewalls protected against the latest malware variants

Question 22 How does the FortiGate intrusion prevention system (IPS) use signatures to detect malicious traffic?
Correct

1 points out of 1 Select one:


By monitoring user activity on websites
By decrypting Secure Sockets Layer (SSL)-encrypted traffic
By comparing network packets to known threats
By blocking all network traffic

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 8/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 23
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
Which action can you take to improve the security rating provided by the Fortinet Security Fabric?
Incorrect

0 points out of 1 Select one:


Run the integrity check on all end devices. 
Upgrade FortiGate to the latest mature version available.
Apply one or more of the suggested best practices.
Create a configuration revision or back up the configuration.

Question 24 Why is it recommended that you use user groups instead of individual user accounts in a firewall policy?
Incorrect

0 points out of 1 Select one:


User groups contain all individual user accounts by default.
User groups provide stronger encryption for authentication.
User groups simplify the firewall configuration.
User groups make it easier to monitor authenticated users. 

Question 25 What is a characteristic of a firewall policy used to allow the traffic from Secure Socket Layer Virtual Private Network (SSL
Incorrect VPN) connections?
0 points out of 1
Select one:
It uses a virtual tunnel interface in the source field.
It assigns SSL certificates to user groups trying to connect.
It defines the port number used for the SSL VPN portal. 
It encapsulates the traffic using the VPN settings configured.

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 9/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 26
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
Which inspection mode processes and forwards each packet, without waiting for the complete file or web page?
Correct

1 points out of 1 Select one:


Application-level inspection
Proxy-based inspection
Stateful inspection
Flow-based inspection

Question 27 What is the recommended process to configure FortiGate for remote authentication for user identification?
Incorrect

0 points out of 1 Select one:


Create a user group and configure a firewall policy with the group as the source.
Connect FortiGate to a remote authentication server and configure its IP addresses as the source. 
Create a user account, configure a firewall policy with the user account as the source, and verify the configuration using
logs.
Create a user group, map authenticated remote users to the group, and configure a firewall policy with the user group
as the source.

Question 28 Which two additional features and settings can you apply to traffic after it is accepted by a firewall policy? (Choose two.)
Correct

1 points out of 1 Select one or more:


Antivirus scanning
User authentication
Application control
Packet filtering 

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 10/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 29
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
What is grayware?
Incorrect

0 points out of 1 Select one:


Unsolicited programs installed without user consent
Malicious files sent to the sandbox for inspection 
New and unknown malware variants
Known malware with existing signatures

Question 30 What causes a web browser to display a certificate warning when using Secure Sockets Layer (SSL) deep inspection with the
Incorrect FortiGate CA certificate?
0 points out of 1
Select one:
FortiGate is using a CA that is not trusted by the web browser.
The browser does not support SSL deep inspection.
The temporary certificate makes FortiGate behave like a man-in-the-middle (MITM) attack. 
FortiGate is unable to decrypt the SSL-encrypted traffic.

Question 31 Which two steps are involved in configuring web filtering based on FortiGuard category filters? (Choose two.)
Correct

1 points out of 1 Select one or more:


Upgrade FortiOS to obtain the latest database from FortiGuard.
Create a web filtering security profile using FortiGuard category-based filters.
Apply the web filter security profile to the appropriate firewall policy.
Identify the specific websites to be blocked or allowed.

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 11/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 32
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
What protocol is used to dynamically create IPSec VPN tunnels?
Correct

1 points out of 1 Select one:


Internet Key Exchange Version 2 (IKEv2)
Generic Route Encapsulation (GRE)
Layer 2 Tunneling Protocol (L2TP)
Point-to-Point Tunneling Protocol (PPTP)

Question 33 How does FortiGate handle blocked websites in web filtering using FortiGuard category filters?
Correct

1 points out of 1 Select one:


Users are redirected to a replacement message indicating the website is blocked.
Users are allowed to access the website, but their activity is recorded in the FortiGate logs.
Users are prompted to provide a valid username and password for access.
Users receive a warning message but can choose to continue accessing the website.

Question 34 Which two protocols can you use for administrative access on a FortiGate interface?
Correct

1 points out of 1 Select one:


Hypertext Transfer Protocol Secure (HTTPS) and Secure Shell (SSH)
Telnet and Simple Network Management Protocol (SNMP)
Remote Desktop Protocol (RDP) and Hypertext Transfer Protocol (HTTP)
Simple Mail Transfer Protocol (SMTP) and Secure Sockets Layer (SSL)

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 12/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 35
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
Why is Secure Socket Layer (SSL) inspection necessary for the intrusion prevention system (IPS) to detect threats in
Correct encrypted traffic?
1 points out of 1
Select one:
SSL inspection improves network performance by bypassing encrypted traffic.
SSL inspection allows the IPS to detect and analyze encrypted threats.
The IPS engine can inspect only legacy encryption algorithms, by default.
Without SSL inspection, encrypted traffic is automatically blocked by the IPS.

Question 36 What is a recommended best practice when configuring Secure Socket Layer Virtual Private Network (SSL VPN)?
Incorrect

0 points out of 1 Select one:


Import the self-signed SSL certificate. 
Use local users for authentication.
Use the principle of least privilege.
Allow connections from all locations.

Question 37 What are two activities that cybercriminals can perform using malware? (Choose two.)
Correct

1 points out of 1 Select one or more:


Extort money
Trigger a high availability (HA) failover
Steal intellectual property
Damage physical ports

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 13/14
3/27/24, 5:08 PM FortiGate 7.4 Operator Exam: Attempt review

Training Institute
Question 38
PMDB Mantis Askbot ResumeDB FortiVision Oriole Egnyte InfoSite FortiOA OWA HCM FortiCare FUSE
Which piece of information does FortiGate know about the user without firewall authentication?
Correct

1 points out of 1 Select one:


The user login name
The source IP address
The application being used
The originating domain name

Question 39 Which actions can you apply to application categories in the Application Control profile?
Incorrect

0 points out of 1 Select one:


Authenticate, log, encrypt, or back up 
Monitor, allow, block, or quarantine
Monitor, optimize, redirect, or shape
Allow, encrypt, compress, or redirect

Question 40 When configuring a static route on FortiGate, what does the destination represent?
Correct

1 points out of 1 Select one:


The IP address of the next-hop router
The network or host to which traffic will be forwarded
The local interface on FortiGate for the outgoing traffic
The IP address of the remote DNS server

https://training.fortinet.com/mod/quiz/review.php?attempt=18563073&cmid=485066 14/14

You might also like