Fortinet NSE7_SAC-6.2 Fortinet NSE 7 - Secure Access 6.2 Exam Practice Test

Page: 1 / 14
Total 30 questions
Question 1

Refer to the exhibit.

Examine the output of the debug command and port configuration shown in the exhibit.

FortiGate learned the MAC address 78:2b:cb:d8:36:68 dynamically.

What action does FortiSwitch take if there is an untagged frame coming to port1 will different MAC address?



Answer : A


Question 2

A FotliGate has the following LDAP configuration

On the Windows LDAP server 10.0.1.10, the administrator used dsqueryT which returned the following output:

>dsquery user -samid admin* "CN=AdministratorrCN=UsersiDC=trainingAD;DC=trainingiDC=lab"

According to the output, which FortiGate LDAP setting is configured incorrectly?



Answer : B


Question 3

An administrator has deployed dual band-capable wireless APs in a wireless network. Multiple 2.4 GHz wireless clients are connecting to the network, and subsequent monitoring shows that individual AP 2.4GHz interfaces are being overloaded with wireless connections.

Which configuration change would best resolve the overloading issue?



Answer : C


Question 4

Examine the following output from the FortiLink real-time debug.:

Based on the output, what is the status of the communication between FortiGate and FortiSwitch?



Answer : D


Question 5

Refer to the exhibit.

Given the network topology shown in the exhibit, which two ports should be configured as untrusted DHCP ports? (Choose two.)



Answer : C, D


Question 6

Refer to the exhibit showing certificate values.

Wireless guest users are unable to authenticate because they are getting a certificate error while loading the captive portal login page This URL string is the HTTPS POST URL guest wireless users see when attempting to access the network using the web browser:

Which two settings are the likely causes of the issue? (Choose two.)



Answer : A, C


Question 7

Refer to the exhibit.

The exhibit shows two FortiGate devices in active-passive HA mode, including four FortiSwitch devices connected to a ring.

Which two configurations are required to deploy this network topology'' (Choose two.)



Page:    1 / 14   
Total 30 questions