?
Platform design
Fortinet Fabric Infrastructure
What is a more accurate description of a modern firewall?
A. A device that inspects network traffic at an entry point to the Internet and within a simple, easily- defined network perimeter.
B. A multi-functional device that inspects network traffic from the perimeter or internally, within a network that has many different entry points.
What solution, specific to Fortinet, enhances performance and reduces latency for specific features and traffic?
A. Specialized circuits called ASls
B. Increased RAM and CPU power
Resetting a lost password administrator
user: maintainer Password: bcpb<serialnumber>
user: maintainer Password: <serialnumber>bcpb
Maintainer user for reset lost password can´t be disabled.
How do you restrict logins to FortiGate to be only from specific IP addresses?
A. Disable HTTPS access on interface
B. Configure trusted host
As a best security practice when configuring administrative access to FortiGate, which protocol should be disabled?
A. Telnet
B. SSH
To access the maintainer account during a recovery, begin by:
A. Unplugging or turning off the device
B. Typing execute reboot. on the CLI
When configuring FortiGate as a DHCP server to restrict access by MAC address, what does the Assign IP option do?
A. Assign a specific IP address to a MAC address
B. Dynamically assign an IP to a MAC address
When configuring FortiGate as a DNS server, which resolution method uses the FortiGate DNS database only to try to resolve queries?
A. Non-recursive
B. Recursive
When restoring an encrypted system configuration file, in addition to needing the FortiGate model and firmware version from the time the configuration file was produced, you also must provide:
A. The password to decrypt the file
B. The private decryption key to decrypt the file
Which document should you consult to increase the chances of success before upgrading or downgrading firmware?
A. System Administration guide
B. Release Notes
Fortinet Security Fabric (Select 6)
Endpoint
SIEM
Management
SDN
Cloud
Virtual
Appliance
UTM
Layer-2
Security Fabric attributes
Broad Powerful Automated
Integration Secure Fast
Devices That Comprise the Security Fabric
Core Recommended Extended
FortiGate FortiAnalyzer FortiManager
What are the essential devices that are required by the Fortinet security fabric?
A. FortiAnalyzer, FortiManager, and FortiGates
B. FortiAnaIyzer and FortiGates
What was a strategy discussed in this section to contain network breaches?
A. Segment the network with multiple firewalls.
B. implement stricter policies on the edge firewall.