Fortinet NSE 6 - FortiSwitch 7.2 NSE6_FSW-7.2 Exam Questions

Page: 1 / 14
Total 55 questions
Question 1

Which two statements about 802.1X authentication on FortiSwitch ports are true? (Choose two.)



Answer : A, D

All hosts behind an authenticated port are allowed access after a successful authentication (A): Once a device on a port successfully authenticates using 802.1X, all other devices connected behind that port also gain network access. This is typical in scenarios where a switch is behind an authenticated port and not each device individually authenticates.

All devices connecting to FortiSwitch must support 802.1X authentication (D): For a network secured with 802.1X, all devices attempting to connect through the FortiSwitch must support and participate in 802.1X authentication to gain access. This ensures that all devices on the network are authenticated before they are allowed to communicate on the network.


Question 2

Exhibit.

What conditions does a FortiSwitch need to have to successfully configure the options shown in the exhibit above? (Choose two.)



Answer : B, C

Regarding the configuration of a FortiSwitch to split a port into multiple smaller interfaces:

The CLI commands are enabling a split port into four 10Gbps interfaces (Option B): The command shown in the exhibit is typically used to configure a high-speed port (like a 40Gbps or 100Gbps interface) to be divided into smaller, independent 10Gbps interfaces. This feature allows more flexible use of the switch's physical resources.

The port full speed prior to the split was 100G SFP+ (Option C): Given the context of splitting the port into multiple 10Gbps interfaces, the original port configuration likely supported a high-speed transceiver such as 100G SFP+. This would make it technically feasible to divide the interface into multiple 10Gbps channels, enhancing connectivity options without requiring additional physical interfaces.

These configurations and capabilities are typical in modern network setups, especially in environments requiring high density and flexibility in connectivity, allowing network administrators to optimize physical infrastructure efficiently.


Question 3

Refer to the exhibits

Traffic arriving on port2 on FortiSwitch is tagged with VLAN ID 10 and destined for PC1 connected on port1. PC1 expects to receive traffic untagged from port1 on FortiSwitch.

Which two configurations can you perform on FortiSwitch to ensure PC1 receives untagged traffic on port1? (Choose two.)



Answer : A, B

The two reasons why port1 can be shut down are loop guard protection and Spanning Tree Protocol (STP).

Loop guard protection: This is a feature that helps to prevent switching loops in a network.expand_more A loop guard can be configured on a port to monitor for specific traffic patterns that indicate a loop. If loop guard protection detects a loop, it will shut down the port to prevent the loop from causing problems.

STP: STP is a protocol that helps to prevent switching loops.expand_more When multiple paths exist between two network devices, STP will block all but one of the paths, creating a loop-free topology.expand_more If STP detects a loop, it will shut down the ports that are involved in the loop.

In the exhibit, both ports 1 and 2 are configured with the same native VLAN 10. This configuration could create a switching loop if both ports are connected to devices on the same network segment. If a loop occurs, loop guard protection or STP could shut down port1 to prevent the loop from causing problems.


Fortinet FortiSwitch 7.2 Administration Guide https://docs.fortinet.com/document/fortigate/7.4.3/administration-guide/954635/getting-started

Question 4

Which Ethernet frame can create Layer 2 flooding due to all bytes on the destination MAC address being set to all FF?



Answer : A

Layer 2 flooding caused by Ethernet frames with all bytes in the destination MAC address set to FF refers to broadcast frames. Here's why:

Broadcast Ethernet Frame (A):

Address Specification: In Ethernet networking, a broadcast frame has a destination MAC address of FF:FF:FF:FF:FF:FF, which instructs network devices to forward the frame to all devices within the broadcast domain.

Network Behavior: This causes Layer 2 flooding as the frame is sent to all ports in the VLAN, except the originating port, ensuring that the broadcast reaches all network segments.

Other Frame Types:

Unicast (B) targets a single device.

Multicast (C) targets a group of devices.

Anycast (D) is not used in Ethernet but rather in IP-based routing to route to the nearest of multiple destinations, typically in internet addressing.

Reference: You can find more information about Ethernet frame types in networking textbooks or documentation that discusses network layer interaction: Network Theory Books


Question 5

Which drop policy mode, if assigned to a congested port, will drop incoming packets until there is no congestion on the egress port?



Answer : A

Tail-drop mode is a congestion management technique used in network devices, including FortiSwitches, to handle congestion on network ports:

Tail-Drop Mode (A):

Behavior: When a queue reaches its maximum capacity on a congested port, tail-drop mode simply drops any incoming packets that arrive after the buffer is full. This continues until the congestion is alleviated and there is space in the queue to accommodate new packets.

Application: This is a straightforward approach used when the device's buffer allocated to the port becomes full due to sustained high traffic, preventing buffer overflow and maintaining system stability.

Reference: For more details on congestion management techniques and settings on FortiSwitch, you can refer to the configuration manuals available on: Fortinet Product Documentation


Question 6

How does FortiSwitch perform actions on ingress and egress traffic using the access control list (ACL)?



Answer : D

In FortiSwitch, Access Control Lists (ACLs) are used to enforce security rules on both ingress and egress traffic:

ACL Evaluation Order (D):

Operational Function: FortiSwitch processes ACL entries from top to bottom, similar to how firewall rules are processed. The first match in the ACL determines the action taken on the packet, whether to allow or deny it, making the order of rules critical.

Configuration Advice: Careful planning of the order of ACL rules is necessary to ensure that more specific rules precede more general ones to avoid unintentional access or blocks.

Reference: For a comprehensive guide on configuring ACLs in FortiSwitch, consult the FortiSwitch security settings documentation available on: Fortinet Product Documentation


Question 7

Which statement about the use of the switch port analyzer (SPAN) packet capture method is true?



Answer : A

The correct statement about using the Switch Port Analyzer (SPAN) packet capture method on FortiSwitch is that 'Mirrored traffic can be sent across multiple switches (A).' This feature allows for extensive traffic analysis as it enables network administrators to configure SPAN sessions that span across different switches, thereby providing the capability to monitor traffic across a broad segment of the network infrastructure.


Page:    1 / 14   
Total 55 questions