Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Fortinet > Fortinet Certified Solution Specialist > FCSS_SDW_AR-7.4

FCSS_SDW_AR-7.4 FCSS - SD-WAN 7.4 Architect Question and Answers

Question # 4

You configured an SD-WAN rule with the best quality strategy and selected the predefined health check, Default_FortiGuard, to check the link performances against FortiGuard servers.

For the quality criteria, you selected Custom-profile-1.

Which factors does FortiGate use, and in which order. to determine the link that it should use to steer the traffic?

A.

Latency – Member configuration order – Link cost threshold

B.

Link quality index – Member configuration order – Link cost threshold

C.

Links that meet the SLA targets – Member configuration order – Member local cost

D.

Latency – Jitter - Packet loss – Bibandwidth – Member configuration order

Full Access
Question # 5

Refer to the exhibit.

You configure SD-WAN on a standalone FortiGate device. You want to create an SD-WAN rule that steers Facebook and Linkedin traffic through the less costly internet link. The FortiGate GUI page appears as shown in the exhibit.

What should you do to set Facebook and LinkedIn as destinations?

A.

Install a license to allow applications as destinations of SD-WAN rules.

B.

In the Internet service field, select Facebook and LinkedIn.

C.

Enable the applications as destinations of the SD-WAN rule feature visibility.

D.

You cannot configure applications as destinations of an SD-WAN rule on a standalone FortiGate device.

Full Access
Question # 6

Refer to the exhibit.

Which statement best describe the role of the ADVPN device in handling traffic?

A.

This is a spoke that has received a direct shortcut query from a remote spoke.

B.

This is a hub, and two spokes, 192.2.0.1 and 10.0.3.101, establish a shortcut.

C.

This is a hub that has received a shortcut query from a spoke and has forwarded it to another spoke.

D.

This is a spoke that has received a shortcut query from a remote hub.

Full Access
Question # 7

Refer to the exhibit that shows an SD-WAN zone configuration on the FortiManager GUI.

Based on the exhibit, how will the FortiGate device behave after it receives this configuration?

A.

The configuration instructs FortiGate to choose an ADVPN shortcut based on SD-WAN information.

B.

The configuration instructs FortiGate to allow ADVPN shortcuts for the tunnels of this SD-WAN zone.

C.

The configuration instructs FortiGate to establish shortcuts only when at least two members meet the SLA target.

D.

The configuration instructs FortiGate to establish shortcuts only for overlay interfaces that meet the SLA target HUB1_HC.

Full Access
Question # 8

Refer to the exhibits.

You use FortiManager to manage the branch devices and configure the SD-WAN template. You have configured direct internet access (DIA) for the IT department users. Now. you must configure secure internet access (SIA) for all local LAN users and have set the firewall policies as shown in the second exhibit.

Then, when you use the install wizard to install the configuration and the policy package on the branch devices, FortiManager reports an error as shown in the third exhibit.

Which statement describes why FortiManager could not install the configuration on the branches?

A.

You must direct SIA traffic to a VPN tunnel.

B.

You cannot install firewall policies that reference an SD-WAN zone.

C.

You cannot install firewall policies that reference an SD-WAN member.

D.

You cannot install SIA and DIA rules on the same device.

Full Access
Question # 9

Which two statements correctly describe what happens when traffic matches the implicit SD-WAN rule? (Choose two.)

A.

The session information output displays no SD-WAN service id.

B.

Traffic is load balanced using the algorithm set for the v4-ecmp-mode setting.

C.

The traffic is distributed, regardless of weight, through all available static routes.

D.

Traffic does not match any of the entries in the policy route table.

E.

FortiGate flags the session with may_dirty and vwl_def ault.

Full Access
Question # 10

Exhibit.

The administrator configured the IPsec tunnel VPN1 on a FortiGate device with the parameters shown in exhibit.

Based on the configuration, which three conclusions can you draw about the characteristics and requirements of the VPN tunnel? (Choose three.)

A.

The tunnel interface IP address on the spoke side is provided by the hub.

B.

The remote end can be a third-party IPsec device.

C.

The administrator must manually assign the tunnel interface IP address on the hub side

D.

The remote end must support IKEv2.

E.

This configuration allows user-defined overlay IP addresses.

Full Access
Question # 11

You used the HUB IPsec_Recommended and the BRANCH IPsec_Recommended templates to define the overlay topology. Then, you used the SD-WAN template to define the SD- WAN members, rules, and performance SLAs.

You applied the changes to the devices and want to use the FortiManager monitors menu to get a graphical view that shows the status of each SD-WAN member.

Which statement best explains how to obtain this graphical view?

A.

Use the SD-WAN monitor template view to get a map view of the branches, hub, and tunnel status, including the SLA pass or missed status.

B.

Use the SD-WAN monitor table view to get a donut view and a table view that shows the status of each SD-WAN member, including the SLA pass or missed status.

C.

Use the VPN monitor map view to get a map view of the branches, hub, and tunnel status, including the SLA pass or missed status.

D.

Use the SD-WAN monitor asset view to get a donut view and a table view that shows the status of each device and the SLA status of each SD-WAN member.

Full Access
Question # 12

Refer to the exhibits.

The exhibits show the configuration for SD-WAN performance. SD-WAN rule, the application IDs of Facebook and YouTube along with the firewall policy configuration and the underlay zone status.

Which two statements are true about the health and performance of SD-WAN members 3 and 4? (Choose two.)

A.

Only related TCP traffic is used for performance measurement.

B.

The performance is an average of the metrics measured for Facebook and YouTube traffic passing through the member.

C.

Encrypted traffic is not used for the performance measurement.

D.

FortiGate identifies the member as dead when there is no Facebook and YouTube traffic passing through the member.

Full Access
Question # 13

Exhibit.

Two hub-and-spoke groups are connected through redundant site-to-site IPsec VPNs between Hub 1 and Hub 2

Which two configuration settings are required for the spoke A1 to establish an ADVPN shortcut with the spoke B2? (Choose two.)

A.

On hubs, auto-discovery-forwarder must be enabled on the IPsec VPNs to hubs.

B.

On hubs, auto-discovery-receiver must be enabled on the IPsec VPNs to spokes.

C.

On hubs, auto-discovery-forwarder must be enabled on the IPsec VPNs to spokes.

D.

On hubs, auto-diacovery-sender must be enabled on the IPsec VPNs to spokes

Full Access
Question # 14

Refer to the exhibits.

The exhibits show the source NAT (SNAT) global setting. port2 interface settings, and the routing table on FortiGate.

The administrator increases the member priority on port2 to 20.

Upon configuration changes and the receipt of new packets, which two actions does FortiGate perform on existing sessions established over port2? (Choose two.)

A.

FortiGate continues routing all existing sessions over port2.

B.

FortiGate routes only new sessions over port2.

C.

FortiGate flags the SNAT session as dirty only if the administrator has assigned an IP pool to the firewall policies with NAT.

D.

FortiGate flags the sessions as dirty.

E.

FortiGate updates the gateway information of the sessions with SNAT so that they use port1 instead of port2.

Full Access
Question # 15

The FortiGate devices are managed by ForliManager, and are configured for direct internet access (DIA). You confirm that DIA is working as expected for each branch, and check the SD-WAN zone configuration and firewall policies shown in the exhibits.

Then, you use the SD-WAN overlay template to configure the IPsec overlay tunnels. You create the associated SD-WAN rules to connect existing branches to the company hub device and apply the changes on the branches.

After those changes, users complain that they lost internet access. DIA is no longer working.

Based on the exhibit, which statement best describes the possible root cause of this issue?

A.

The SD-WAN overlay template defines a zone for each underlay interface and moves the interfaces into those zones.

B.

The SD-WAN overlay template didn’t configure a firewall policy to allow traffic through the overlay.

C.

The SD-WAN overlay template redefines the interface gateway addresses if they are defined with metadata variables.

D.

The SD-WAN overlay template updates the SD-WAN template and the rules.

Full Access
Question # 16

Refer to the exhibits.

The administrator configured a device blueprint and CLI scripts as shown in the exhibits, to prepare for onboarding FortiGate devices in the company’s stores. Later, a technician prepares a FortiGate 51G with a basic configuration and connects it to the network. The basic configuration contains the port1 configuration and the minimal configuration required to allow the device to connect to FortiManager.

After the device first connects to FortiManager, FortiManager updates the device configuration.

Based on the exhibits, which actions does FortiManager perform?

A.

FortiManager updates the device configuration according to the selected templates. It applies the corp_st template first.

B.

FortiManager does not update the port1 configuration because FortiManager does not change the configuration of interfaces with fgfm access.

C.

FortiManager updates access rights only for port1. FortiManager cannot update the IP address because it was already set manually.

D.

FortiManager updates the configuration of port1, port2, and port5. The three ports might get new IP addresses.

Full Access
Question # 17

Which statement describes FortiGate behavior when you reference a zone in a static route?

A.

FoftiGate installs ECMP static routes for the first two members of the zone.

B.

FortiGate ignores the static routes defined through members referenced in the zone.

C.

FortiGate routes the traffic through the best performing member of the zone.

D.

FortiGate installs a static route for each member in the zone.

Full Access
Question # 18

You are planning a large SD-WAN deployment with approximately 1000 spokes and want to allow ADVPN between the spokes. Some remote sites use FortiSASE to connect to the company's SD-WAN hub. Which overlay routing configuration should you use?

A.

BGP on loopback with dynamic BGP for ADVPN shortcut routing.

B.

BGP on loopback with IPsec phase2 selectors for ADVPN shortcut routing.

C.

BGP per overlay with dynamic BGP for ADVPN shortcut routing.

D.

BGP per overlay with BGP next-hop convergence for ADVPN shortcut routing.

Full Access
Question # 19

Refer to the exhibits.

The interface details, static route configuration, and firewall policies on the managed FortiGate device are shown.

You want to configure a new SD-WAN zone, named Underlay, that contains the interfaces port1 and port2.

What must be your first action?

A.

Define port1 as an SD-WAN member.

B.

Delete the static routes.

C.

Delete the SD-WAN Zone Test.

D.

Delete the firewall policies.

Full Access
Question # 20

Refer to the exhibit.

How does FortiGate handle the traffic with the source IP 10.0.1.130 and the destination IP 128.66.0 125?

A.

FortiGate routes the traffic flow according to the FIB.

B.

FortiGate load balances the traffic flow through port1 and port2.

C.

FortiGate drops the traffic flow.

D.

FortiGate steers the traffic flow through port2.

Full Access