Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Download Full Version FCP_FGT_AD-7.4 Fortinet Exam

FCP - FortiGate 7.4 Administrator Questions and Answers

Question 21

Which two statements describe how the RPF check is used? (Choose two.)

Options:

A.

The RPF check is run on the first sent packet of any new session.

B.

The RPF check is run on the first reply packet of any new session.

C.

The RPF check is run on the first sent and reply packet of any new session.

D.

The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.

Question 22

Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)

Options:

A.

Pre-shared key and certificate signature as authentication methods

B.

Extended authentication (XAuth)to request the remote peer to provide a username and password

C.

Extended authentication (XAuth) for faster authentication because fewer packets are exchanged

D.

No certificate is required on the remote peer when you set the certificate signature as the authentication method

Question 23

Refer to the exhibit which contains a RADIUS server configuration.

An administrator added a configuration for a new RADIUS server. While configuring, the administrator selected the Include in every user group option.

What is the impact of using the Include in every user group option in a RADIUS configuration?

Options:

A.

This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group

B.

This option places all users into even/ RADIUS user group, including groups that are used for the LDAP server on FortiGate

C.

This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case is FortiAuthenticator

D.

This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group

Question 24

Which statement is correct regarding the use of application control for inspecting web applications?

Options:

A.

Application control can identify child and parent applications, and perform different actions on them

B.

Application control signatures are included in Fortinet Antivirus engine

C.

Application control does not display a replacement message for a blocked web application

D.

Application control does not require SSL Inspection to Identity web applications