Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)
Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)A . Encapsulating Security Payload (ESP)B . Secure Shell (SSH)C . Internet Key Exchange (IKE)D . Security Association (SA)View AnswerAnswer: A, C
Which two statements about the IPsec VPN configuration and the status of the IPsec VPN tunnel are true?
Refer to the exhibit. Which two statements about the IPsec VPN configuration and the status of the IPsec VPN tunnel are true? (Choose two.)A . FortiGate does not install IPsec static routes for remote protected networks in the routing table. Most VotedB . The phase 1 configuration supports the network-overlay...
Based on the information shown in the exhibits, what configuration change must be made on dc1_fgt so dc1_fgt routes the reply traffic over T_INET_1_0?
Refer to the exhibits. Exhibit A - Exhibit B Exhibit A shows a site-to-site topology between two FortiGate devices: branch1_fgt and dc1_fgt. Exhibit B shows the system global and system settings configuration on dc1_fgt. When branch1_client establishes a connection to dc1_host, the administrator observes that, on dc1_fgt, the reply traffic...
Based on the exhibits, which two statements are correct about the health and performance of port1 and port2?
Refer to the exhibits. Exhibit A Exhibit B Exhibit A shows the SD-WAN performance SLA configuration, the SD-WAN rule configuration, and the application IDs of Facebook and YouTube. Exhibit B shows the firewall policy configuration and the underlay zone status. Based on the exhibits, which two statements are correct about...
Which two conclusions for traffic that matches the traffic shaper are true? (Choose two.)
Which two conclusions for traffic that matches the traffic shaper are true? (Choose two.) A . The traffic shaper drops packets if the bandwidth is less than 2500 KBps.B . The measured bandwidth is less than 100 KBps.C . The traffic shaper drops packets if the bandwidth exceeds 6250 KBps.D...
Based on the exhibits, what can the administrator expect for traffic matching the SD-WAN rule?
Refer to the exhibits. Exhibit A Exhibit B - Exhibit A shows the configuration for an SD-WAN rule and exhibit B shows the respective rule status, the routing table, and the member status. The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule. Based on the...
Based on the output shown in the exhibits, which two reasons can cause the observed behavior?
Refer to the exhibits. Exhibit A shows the packet duplication rule configuration, the SD-WAN zone status output, and the sniffer output on FortiGate acting as the sender. Exhibit B shows the sniffer output on a FortiGate acting as the receiver. The administrator configured packet duplication on both FortiGate devices. The...
Which CLI command do you use to perform real-time troubleshooting for ADVPN negotiation?
Which CLI command do you use to perform real-time troubleshooting for ADVPN negotiation?A . get router info routing-table allB . diagnose debug application ikeC . diagnose vpn tunnel listD . get ipsec tunnel listView AnswerAnswer: B Explanation: IKE real-time debug - useful when debugging ADVPN shortcut messages and spoke-to-spoke negotiations....
What are two benefits of choosing packet duplication over FEC for data loss correction on noisy links? (Choose two.)
What are two benefits of choosing packet duplication over FEC for data loss correction on noisy links? (Choose two.)A . Packet duplication can leverage multiple IPsec overlays for sending additional data.B . Packet duplication does not require a route to the destination.C . Packet duplication supports hardware offloading.D . Packet...
Which three matching traffic criteria are available in SD-WAN rules? (Choose three.)
Which three matching traffic criteria are available in SD-WAN rules? (Choose three.)A . Type of physical link connectionB . Internet service database (ISDB) address objectC . Source and destination IP addressD . URL categoriesE . Application signaturesView AnswerAnswer: BCE