Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Certified Solution Specialist > FCSS_LED_AR-7.6

FCSS_LED_AR-7.6 Fortinet NSE 6 - LAN Edge 7.6 Architect Question and Answers

Question # 4

You ' ve configured the FortiLink interface, and the DHCP server is enabled by default. The resulting DHCP server settings are shown in the exhibit. What is the role of the vci-string setting in this configuration?

A.

To ignore DHCP requests coming from FortiSwitch and FortiExtender devices.

B.

To restrict the IP address assignment to devices that have FortiSwitch or FortiExtender as their hostname.

C.

To connect, devices must match the VCI string; otherwise, they will not receive an IP address.

D.

To reserve IP addresses for FortiSwitch and FortiExtender devices.

Full Access
Question # 5

Refer to the exhibits.

The exhibits show the FortiGate logs, widget, and CLI. Security Fabric quarantine automation is being tested using a device with the IP address 10.0.2.1, which is connected to a managed FortiSwitch. Shortly after attempting to access a malicious website, the device loses access to the internet and other VLANs within the network. However, it can still communicate with other devices within the same VLAN. Which configuration change is required to fix the issue?

A.

Replace the IP Ban action with Access Layer Quarantine.

B.

Adjust the IP Ban settings to the Quarantine action.

C.

Adjust the indicator of compromise (IOC) on FortiAnalyzer.

D.

Enable intra-VLAN traffic blocking in the Security Fabric quarantine settings.

Full Access
Question # 6

Which statement about generating a certificate signing request (CSR) for a CER certificate is true?

A.

Inaccurate or missing fields in the CSR will prevent the CA from validating the request, leading to the rejection of the certificate and possible delays in the deployment process.

B.

If key fields like the common name (CN) and organization (O) are incorrect, the certification authority (CA) will still issue the certificate, but it may not be trusted by certain applications or systems that rely on accurate field information for validation.

C.

CSR fields are primarily used for internal recordkeeping by the requesting organization, and only the public key in the CSR must be accurate for successful certificate signing.

D.

The fields in the CSR are primarily for documentation purposes; any missing or incorrect information will be automatically corrected by the CA during the signing process.

Full Access
Question # 7

A conference center wireless network provides guest access through a captive portal, allowing unregistered users to self-register and connect to the network. The IT team has been tasked with updating the existing configuration to enforce captive portal authentication over a secure HTTPS connection. Which two steps should the administrator take to implement this change? (Choose two.)

A.

Enable HTTP redirect in the user authentication settings.

B.

Create a new SSID with the HTTPS captive portal URL.

C.

Disable HTTP administrative access on the guest SSID to enforce HTTPS connection.

D.

Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator.

Full Access
Question # 8

A FortiSwitch is not appearing in the FortiGate management interface after being connected via FortiLink. What could be a first troubleshooting step?

A.

Ensure that the FortiGate security policies allow traffic from the FortiSwitch.

B.

Manually assign a static IP to the FortiSwitch.

C.

Verify that FortiGate device DHCP server is assigning an IP to the FortiSwitch.

D.

Ensure the FortiSwitch has internet access.

Full Access
Question # 9

In addition to requiring a FortiAnalyzer device to configure the Security Fabric, which license must be added to FortiAnalyzer to use Indicators of Compromise (IOC) rules?

A.

loT Security Add-on license

B.

IOC Subscription license

C.

IOC detection is included on FAZ-Basic license

D.

Threat Detection Service license

Full Access
Question # 10

Refer to the exhibits.

A NAC policy has been configured to apply traffic that flows through FortiSwitch port 2. Traffic that meets the NAC policy criteria will be assigned to the Students VLAN. However, the NAC policy does not seem to be taking effect.

Which configuration is missing?

A.

Port2 Access mode should be set to NAC mode.

B.

The MAC address or OS might be misconfigured for the connected device.

C.

Port2 Access mode should be set to Port Policy mode.

D.

The Students VLAN should be set to Allowed VLANs instead of Native VLAN.

Full Access
Question # 11

FortiGate has been added to FortiAIOps for management.

Which step must be performed on FortiAIOps to add a FortiSwitch device connected to the recently added FortiGate?

A.

Add the FortiSwitch device by submitting its serial number.

B.

FortiAIOps requires that the FortiSwitch IP address is submitted.

C.

FortiSwitch is added automatically.

D.

Configure the FortiSwitch IP address, user ID, and password

Full Access
Question # 12

Refer to the exhibits.

Examine the firewall policy configuration and SSID settings. Users trying to connect to the new Guest wireless network should be redirected to an external captive portal, however, these wireless users are not able to see the captive portal login page. The external captive portal URL has been verified as correct, yet the issue persists. Which configuration change should fix the problem?

A.

Add FortiAuthenticator and WindowsAD as exempt sources.

B.

Security mode should be set to WPA2 Enterprise to authenticate through RADIUS.

C.

A firewall policy with the ID 11 is missing to enable the captive-portal-exempt option.

D.

Include the user group guest.portal in the firewall policy.

Full Access
Question # 13

Refer to the exhibit.

On FortiGate, a RADIUS server is configured to forward authentication requests to FortiAuthenticator, which acts as a RADIUS proxy. FortiAuthenticator then relays these authentication requests to a remote Windows AD server using LDAP.

While testing authentication using the CLI command diagnose test authserver. the administrator observed that authentication succeeded with PAP but failed when using MS-CHAFV2.

Which two solutions can the administrator implement to enable MS-CHAPv2 authentication? (Choose two.)

A.

Enable Windows Active Directory domain authentication on FortiAuthenticator.

B.

Configure FortiAuthenticator to use RADIUS instead of LDAP as the back-end authentication server.

C.

Enable RADIUS attribute filtering on FortiAuthenticator.

D.

Change the FortiGate authentication method to CHAP instead of MS-CHAPv2.

Full Access
Question # 14

You are setting up a captive portal to provide Wi-Fi access for visitors. To simplify the process, your team wants visitors to authenticate using their existing social media accounts instead of creating new accounts or entering credentials manually.

Which two actions are required to enable this functionality? (Choose two.)

A.

Set up a remote open authorization (OAuth) server for each selected social media platform.

B.

Configure only the email login option because a social media login cannot be used with captive portals.

C.

Enable Account Login as the authentication type and configure a remote LDAP server.

D.

Set up the FortiAuthenticator internal database as the primary source for user credentials.

E.

Configure the social login profiles for the supported platforms.

Full Access