100% found this document useful (1 vote)
379 views11 pages

FGFM Protocol and Device Management Quiz

1. The diagnose sniffer packet command can be used to sniffer the FGFM protocol communication between FortiManager and FortiGate. The correct port is 8113. 2. Two Security Fabric features on FortiManager are the ability to view the logical and physical topology of devices, and the ability to view and renew licenses for FortiGate devices. 3. If the administrator installs the modified policy package, the unused objects that are not tied to firewall policies will remain as read-only locally on the FortiGate.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
379 views11 pages

FGFM Protocol and Device Management Quiz

1. The diagnose sniffer packet command can be used to sniffer the FGFM protocol communication between FortiManager and FortiGate. The correct port is 8113. 2. Two Security Fabric features on FortiManager are the ability to view the logical and physical topology of devices, and the ability to view and renew licenses for FortiGate devices. 3. If the administrator installs the modified policy package, the unused objects that are not tied to firewall policies will remain as read-only locally on the FortiGate.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

QUIZ FORTIMANAGER

1. Which command can be used to sniffer the FGFM protocol communication


between FortiManager and FortiGate?
Select one:

diagnose sniffer packet any "port 8113" 4


diagnose sniffer packet any "port 541" 4
diagnose sniffer packet any "port 80" 4
diagnose sniffer packet any "port 443" 4

2. Which two Security Fabric features exist on FortiManager? (Choose two.)


Select one or more:

Enables you to view the logical and physical topology of Security Fabric devices
Enables you to view and renew Security Fabric licenses for FortiGate devices
Enables you to run security ratings on FortiGate devices
Enables you to view the security ratings of FortiGate Security Fabric groups

3. View the following exhibit:


An administrator is importing a new device into FortiManager and has selected the options
shown in the exhibit.
What will happen if the administrator makes the changes and installs the modified policy
package on this managed FortiGate?
Select one:
The unused objects that are not tied to the firewall policies will be installed on FortiGate.
The unused objects that are not tied to the firewall policies will remain as read-only locally on
FortiGate.
The unused objects that are not tied to the firewall policies in the policy package will be
deleted from the FortiManager database.
The unused objects that are not tied to the firewall policies locally on FortiGate will be
deleted.

4. An administrator is having trouble when trying to add FortiGate using the Add
Device wizard on FortiManager.

Which two options can be used to troubleshoot this issue? (Choose two.)
Select one or more:
A configuration sync failure
Make sure Offline Mode is disabled.
Make sure UDP port 541 between FortiManager and FortiGate is allowed.
Make sure FMG-Access on the FortiGate interface facing FortiManager is enabled.

5. An administrator is configuring a new Restricted Admin profile.

Which two permissions can the administrator configure? (Choose two.)


Select one or more:
IPS sensor
Web Filter profile
Device registration
FortiGuard configuration
6. What must you specify when you configure an SD-WAN using central
management?

Select one:
At least two member interfaces
At least four member interfaces
A Fortinet SD-WAN license
At least one member interface

7. How does FortiManager determine if a managed device Sync Status is Out-of-


Sync?
Select one:
It compares the device-level database with the FortiGate configuration.
It compares the provisioning template with the FortiGate configuration.
It compares the current revision history with the FortiGate configuration.
It compares the ADOM-level database with the FortiGate configuration.

8. When adding a new device using the model device option, which methods are
available to link the model device to the real device?
Select one:
Hostname and certification authentication
Model number and hostname
Serial number and pre-shared key
IP address and pre-shared key

9. What is the purpose of dynamic objects?

Select one:
To update the object’s CLI syntax automatically based on the ADOM version
To map a single logical object to a unique definition per device
To merge duplicate objects automatically
To map the same object automatically across multiple ADOMs

10. Which two scripting languages are supported by FortiManager? (Choose two.)
Select one or more:

Perl
Tool Command line (TCL)
Python
Command Line Interface (CLI)

11. What configuration setting for FortiGate is part of a device-level database on


FortiManager? A. VIP and IP Pools

o Firewall policies
o Security profiles
o Routing

12. What is the purpose of the Policy Check feature on FortiManager?


o To find and provide recommendation to combine multiple separate policy packages into onecommon
policy package
o To find and merge duplicate policies in the policy package
o To find and provide recommendation for optimizing policies in a policy package

o To find and delete disabled firewall policies in the policy package

13. An administrator would like to review, approve, or reject all the firewall policy changes
made by the junior administrators.
How should the Workspace mode be configured on FortiManager?
o Set to workflow and use the ADOM locking feature
o Set to read/write and use the policy locking feature
o Set to normal and use the policy locking feature
o Set to disable and use the policy locking feature
14. Refer to the exhibit.

15. You are using the Quick Install option to install configuration changes on the managed
FortiGate.
Which two statements correctly describe the result? (Choose two.)
o It will not create a new revision in the revision history
o It installs device-level changes to FortiGate without launching the Install Wizard
o It cannot be canceled once initiated and changes will be installed on the managed device
o It provides the option to preview configuration changes prior to installing them

16. Which of the following statements are true regarding SD-WAN Central Management?
(Choose three)

o SD-WAN must be enabled on per-ADOM basis


o SD-WAN settings can be installed on multiple FortiGate devices at the same time
o You can create multiple SD-WAN interfaces per VDOM
o When you configure an SD-WAN, you must specify at least two member interfaces.
o The first step in creating an SD-WAN using FortiManager is to create two SD-WAN firewall
policies.
17. Which of the following items does an FGFM keepalive message include? (Choose two.)

o FortiGate uptime
o FortiGate license information
o FortiGate IPS version
o FortiGate configuration checksum

18. View the following exhibit.

An administrator has created a firewall address object, Training, which is used in the Local-FortiGate
policy package. When the install operation is performed, which IP Netmask will be installed on the Local-
FortiGate, for the Training firewall address object?
o [Link]/24
o It will create firewall address group on Local-FortiGate with [Link]/24 and [Link]/24
objectvalues
o [Link]/24
o Local-FortiGate will automatically choose an IP Network based on its network interface settings.
19. Which two statements regarding device management on FortiManager are true? (Choose
two.)

o FortiGate devices in HA cluster devices are counted as a single device.


o FortiGate in transparent mode configurations are not counted toward the device count
onFortiManager.
o FortiGate devices in an HA cluster that has five VDOMs are counted as five separate devices.
o The maximum number of managed devices for each ADOM is 500.

20. An administrator with the SuperUser profile is unable to log in to FortiManager because
of an authentication failure message.
Which troubleshooting step should you take to resolve the issue?
o Make sure FortiManager Access is enabled in the administrator profile
o Make sure Offline Mode is disabled
o Make sure the administrator IP address is part of the trusted hosts.
o Make sure ADOMs are enabled and the administrator has access to the Global ADOM

21. View the following exhibit.

o
A. FortiGate is discovered by FortiManager through the FortiGate NATed IP address.
B. FortiGate can announce itself to FortiManager only if the FortiManager IP address is configured
onFortiGate under central management.
C. During discovery, the FortiManager NATed IP address is not set by default on FortiGate.
If the FCFM tunnel is torn down, FortiManager will try to re-establish the FGFM tunnel.

Which of the following statements are true if FortiManager and FortiGate are behind the NAT devices?
(Choose two.)
o FortiGate is discovered by FortiManager through the FortiGate NATed IP address.
o FortiGate can announce itself to FortiManager only if the FortiManager IP address is configured
onFortiGate under central management.
o During discovery, the FortiManager NATed IP address is not set by default on FortiGate.
o If the FCFM tunnel is torn down, FortiManager will try to re-establish the FGFM tunnel
22. An administrator wants to delete an address object that is currently referenced in a
firewall policy. Which one of the following statements is true?

o FortiManager will not allow the administrator to delete a referenced address object
o FortiManager will disable the status of the referenced firewall policy
o FortiManager will replace the deleted address object with the none address object in thereferenced
firewall policy
o FortiManager will replace the deleted address object with all address object in the
referencedfirewall policy

23. An administrator has enabled Service Access on FortiManager.


What is the purpose of Service Access on the FortiManager interface?
o Allows FortiManager to download IPS packages
o Allows FortiManager to respond to request for FortiGuard services from FortiGate devices
o Allows FortiManager to run real-time debugs on the managed devices
o Allows FortiManager to automatically configure a default route

24. What will be the result of reverting to a previous revision version in the revision history?

o It will install configuration changes to managed device automatically


o It will tag the device settings status as Auto-Update
o It will generate a new version ID and remove all other revision history versions following
statements are true?
o It will modify the device-level database
(Choose two.)

25. When installation is performed from the FortiManager, what is the recovery logic used
between FortiManager and FortiGate for an FGFM tunnel?

o After 15 minutes, FortiGate will unset all CLI commands that were part of the installation
thatcaused the tunnel to go down.
o FortiManager will revert and install a previous configuration revision on the managed FortiGate.
o FortiGate will reject the CLI commands that will cause the tunnel to go down.
o FortiManager will not push the CLI commands as a part of the installation that will cause the
tunnel to go down.
26. Refer to the exhibit.

Which two statements about the output are true? (Choose two.)

o The latest revision history for the managed FortiGate does match with the FortiGate running
configuration
o Configuration changes have been installed to FortiGate and represents FortiGate configuration has
been changed
o The latest history for the managed FortiGate does not match with the device-level database
o Configuration changes directly made on the FortiGate have been automatically updated to device-
level database

27. What does a policy package status of Conflict indicate?

o The policy package reports inconsistencies and conflicts during a Policy Consistency Check.
o The policy package does not have a FortiGate as the installation target.
o The policy package configuration has been changed on both FortiManager and the manageddevice
independently.
o The policy configuration has never been imported after a device was registered on FortiManager.

28. What are the factory default settings on FortiManager? (Choose three.)

o Username is admin
o Password is fortinet
o FortiAnalyzer features are disabled
o Reports and Event Monitor panes are enabled
o port1 interface IP address is [Link]/24
29. Refer to the exhibit.

An administrator logs into the FortiManager GUI and sees the panes shown in the exhibit.
Which two reasons can explain why the FortiAnalyzer feature panes do not appear? (Choose two.)
o The administrator logged in using the unsecure protocol HTTP, so the view is restricted.
o The administrator profile does not have full access privileges like the Super_User profile.
o The administrator IP address is not a part of the trusted hosts configured on FortiManager
interfaces
o FortiAnalyzer features are not enabled on FortiManager.

30. An administrator is replacing a device on FortiManager by running the following


command: execute device replace sn <devname> <serialnum>.

o What device name and serial number must the administrator


use?
o Device name and serial number of the original device.
o Device name and serial number of the replacement device.
o Device name of the replacement device and serial number of the original device.
o Device name of the original device and serial number of the replacement device.

Common questions

Powered by AI

FortiManager determines if a managed device Sync Status is Out-of-Sync by comparing the device-level database with the FortiGate configuration . This comparison ensures the configurations on FortiManager mirror those on FortiGate, which is crucial for maintaining network consistency and security policy enforcement. A mismatch could lead to policy discrepancies and potential security vulnerabilities.

To troubleshoot FortiManager authentication failure for a SuperUser, the administrator should ensure FortiManager Access is enabled in the profile, check that Offline Mode is disabled, confirm the admin IP is part of trusted hosts, and ensure ADOMs are active with the correct access permissions . Each step is crucial in identifying access issues that could prevent administrative actions, impacting security and management tasks.

The 'Policy Check' feature on FortiManager helps find and provide recommendations for optimizing policies in a policy package . This feature aids in identifying redundancies and potential errors, ultimately enhancing the effectiveness and efficiency of security policies, and minimizing configuration errors or vulnerabilities.

A policy package status of Conflict indicates discrepancies between the policy configurations on FortiManager and the managed device. This can cause management challenges, such as inconsistent security policies and operational disruptions. Administrators should perform a thorough review and resolve discrepancies to ensure consistent enforcement .

Ensuring FMG-Access is enabled on the FortiGate interface is crucial because it allows FortiManager to communicate with and manage the FortiGate device effectively. Without it, device configurations cannot be efficiently synchronized or updated, which can lead to management challenges .

Dynamic objects in FortiManager are used to map a single logical object to a unique definition per device . This function allows for flexible and granular management of configurations across different devices without manual adjustment for each device, facilitating efficient policy deployment.

The command used to capture the FGFM protocol communication between FortiManager and FortiGate is 'diagnose sniffer packet any "port 541" 4' .

In a new restricted admin profile on FortiManager, the administrator can configure permissions such as 'IPS sensor' and 'Device registration' . These permissions are critical to limit administrative access to sensitive components and operations, thus enforcing role-based access control and improving security posture.

If a referenced address object is deleted in FortiManager, the system will not allow its deletion; instead, FortiManager may replace it with a 'none' address object in the firewall policy, thereby potentially creating a security gap where traffic might inadvertently be allowed .

Service Access on FortiManager allows it to respond to FortiGuard service requests from FortiGate devices and run real-time debugs on managed devices . These functions enhance management effectiveness by providing timely updates and facilitating prompt issue resolution.

You might also like