Fortinet NSE7-PBC-6-4 Exam Questions

Questions for the NSE7-PBC-6-4 were updated on : Nov 14 ,2024

Page 1 out of 2. Viewing questions 1-15 out of 30

Question 1

When configuring the FortiCASB policy, which three configuration options are available? (Choose
three.)

  • A. Intrusion prevention policies
  • B. Threat protection policies
  • C. Data loss prevention policies
  • D. Compliance policies
  • E. Antivirus policies
Answer:

BCD

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/bf017449-
572a-11e9- 81a4-00505692583a/forticasb-4.1.0-admin-guide.pdf (62)

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

You have been tasked with deploying FortiGate VMs in a highly available topology on the Amazon
Web Services (AWS) cloud. The requirements for your deployment are as follows:

You must deploy two FortiGate VMs in a single virtual private cloud (VPC), with an external
elastic load balancer which will distribute ingress traffic from the internet to both FortiGate VMs in
an active-active topology.

Each FortiGate VM must have two elastic network interfaces: one will connect to a public
subnet and other will connect to a private subnet.

To maintain high availability, you must deploy the FortiGate VMs in two different availability
zones.
How many public and private subnets will you need to configure within the VPC?

  • A. One public subnet and two private subnets
  • B. Two public subnets and one private subnet
  • C. Two public subnets and two private subnets
  • D. One public subnet and one private subnet
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

You are deploying Amazon Web Services (AWS) GuardDuty to monitor malicious or unauthorized
behaviors related to AWS resources. You will also use the Fortinet aws-lambda-guardduty script to
translate feeds from AWS GuardDuty findings into a list of malicious IP addresses. FortiGate can then
consume this list as an external threat feed.
Which Amazon AWS services must you subscribe to in order to use this feature?

  • A. GuardDuty, CloudWatch, S3, Inspector, WAF, and Shield.
  • B. GuardDuty, CloudWatch, S3, and DynamoDB.
  • C. Inspector, Shield, GuardDuty, S3, and DynamoDB.
  • D. WAF, Shield, GuardDuty, S3, and DynamoDB.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ed901ad2-
4424-11e9- 94bf-00505692583a/FortiOS_6.2.0_AWS_Cookbook.pdf

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Refer to the exhibit.

A customer has deployed an environment in Amazon Web Services (AWS) and is now trying to send
outbound traffic from the Web servers to the Internet. The FortiGate policies are configured to allow
all outbound traffic; however, the traffic is not reaching the FortiGate internal interface.
What are two possible reasons for this behavior? (Choose two.)

  • A. The web servers are not configured with the default gateway.
  • B. The Internet gateway (IGW) is not added to VPC (virtual private cloud).
  • C. AWS source and destination checks are enabled on the FortiGate interfaces.
  • D. AWS security groups may be blocking the traffic.
Answer:

AD

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Refer to the exhibit.

Your senior administrator successfully configured a FortiGate fabric connector with the Azure
resource manager, and created a dynamic address object on the FortiGate VM to connect with a
windows server in Microsoft Azure. However, there is now an error on the dynamic address object,
and you must resolve the issue.
How do you resolve this issue?

  • A. Run diagnose debug application azd -l on FortiGate.
  • B. In the Microsoft Azure portal, set the correct tag values for the windows server.
  • C. In the Microsoft Azure portal, access the windows server, obtain the private IP address, and assign the IP address under the FortiGate-VM AzureLab address object.
  • D. Delete the address object and recreate a new address object with the type set to FQDN.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Refer to the exhibit.

You are deploying a FortiGate-VM in Microsoft Azure using the PAYG/On-demand licensing model.
After you configure the FortiGate-VM, the validation process fails, displaying the error shown in the
exhibit.
What caused the validation process to fail?

  • A. You selected the incorrect resource group.
  • B. You selected the Bring Your Own License (BYOL) licensing mode.
  • C. You selected the PAYG/On-demand licensing model, but did not select correct virtual machine size.
  • D. You selected the PAYG/On-demand licensing model, but did not associate a valid Azure subscription.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

An Amazon Web Services (AWS) auto-scale FortiGate cluster has just experienced a scale-down
event, terminating a FortiGate in availability zone C.
This has now black-holed the private subnet in this availability zone.
What action will the worker node automatically perform to restore access to the black-holed subnet?

  • A. The worker node applies a route table from a non-black-holed subnet to the black-holed subnet.
  • B. The worker node moves the virtual IP of the terminated FortiGate to a running FortiGate on the worker node's private subnet interface.
  • C. The worker node modifies the route table applied to the black-holed subnet changing its default route to point to a running FortiGate on the worker node's private subnet interface.
  • D. The worker node migrates the subnet to a different availability zone.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which two statements about the Amazon Cloud Services (AWS) network access control lists (ACLs)
are true? (Choose two.)

  • A. Network ACLs are stateless, and inbound and outbound rules are used for traffic filtering.
  • B. Network ACLs are stateful, and inbound and outbound rules are used for traffic filtering.
  • C. Network ACLs must be manually applied to virtual network interfaces.
  • D. Network ACLs support allow rules and deny rules.
Answer:

AD

User Votes:
A
50%
B
50%
C
50%
D
50%

Reference: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

When an organization deploys a FortiGate-VM in a high availability (HA) (active/active) architecture
in Microsoft Azure, they need to determine the default timeout values of the load balancer probes.
In the event of failure, how long will Azure take to mark a FortiGate-VM as unhealthy, considering
the default timeout values?

  • A. Less than 10 seconds
  • B. 30 seconds
  • C. 20 seconds
  • D. 16 seconds
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which three properties are configurable Microsoft Azure network security group rule settings?
(Choose three.)

  • A. Action
  • B. Sequence number
  • C. Source and destination IP ranges
  • D. Destination port ranges
  • E. Source port ranges
Answer:

ADE

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Reference: https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-
overview

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 11

Refer to the exhibit.

You attempted to deploy the FortiGate-VM in Microsoft Azure with the JSON template, and it failed
to boot up. The exhibit shows an excerpt from the JSON template.
What is incorrect with the template?

  • A. The LUN ID is not defined.
  • B. FortiGate-VM does not support managedDisk from Azure.
  • C. The caching parameter should be None.
  • D. The CreateOptions parameter should be FromImage.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which two statements about Microsoft Azure network security groups are true? (Choose two.)

  • A. Network security groups can be applied to subnets and virtual network interfaces.
  • B. Network security groups can be applied to subnets only.
  • C. Network security groups are stateless inbound and outbound rules used for traffic filtering.
  • D. Network security groups are a stateful inbound and outbound rules used for traffic filtering.
Answer:

BD

User Votes:
A
50%
B
50%
C
50%
D
50%

Reference: https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-
overview

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Refer to the exhibit.

In your Amazon Web Services (AWS) virtual private cloud (VPC), you must allow outbound access to
the internet and upgrade software on an EC2 instance, without using a NAT instance. This specific EC2
instance is running in a private subnet: 10.0.1.0/24.
Also, you must ensure that the EC2 instance source IP address is not exposed to the public internet.
There are two subnets in this VPC in the same availability zone, named public (10.0.0.0/24) and
private (10.0.1.0/24).
How do you achieve this outcome with minimum configuration?

  • A. Deploy a NAT gateway with an EIP in the private subnet, edit the public main routing table, and change the destination route 0.0.0.0/0 to the target NAT gateway.
  • B. Deploy a NAT gateway with an EIP in the public subnet, edit route tables, select Public-route, and delete the route destination 10.0.0.0/16 to target local.
  • C. Deploy a NAT gateway with an EIP in the private subnet, edit route tables, select Private-route, and add a new route destination 0.0.0.0/0 to the target internet gateway.
  • D. Deploy a NAT gateway with an EIP in the public subnet, edit route tables, select Private-route and add a new route destination 0.0.0.0/0 to target the NAT gateway.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

What is the bandwidth limitation of an Amazon Web Services (AWS) transit gateway VPC
attachment?

  • A. Up to 1.25 Gbps per attachment
  • B. Up to 50 Gbps per attachment
  • C. Up to 10 Gbps per attachment
  • D. Up to 1 Gbps per attachment
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Reference: https://d1.awsstatic.com/whitepapers/building-a-scalable-and-secure-multi-vpc-aws-
network- infrastructure.pdf (5)

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

A company deployed a FortiGate-VM with an on-demand license using Amazon Web Services (AWS)
Market Place Cloud Formation template. After deployment, the administrator cannot remember the
default admin password.
What is the default admin password for the FortiGate-VM instance?

  • A. The admin password cannot be recovered and the customer needs to deploy the FortiGate-VM again.
  • B. <blank>
  • C. admin
  • D. The instance-ID value
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Reference: https://docs.fortinet.com/document/fortigate/6.2.0/aws-cookbook/828256/connecting-
to-the- fortigate-vm

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2