Question 6 of 66

You receive a FortiAnalyzer alert warning that a 1 ТВ disk filled up in a day. Upon investigation, you find thousands of unusual DNS log requests, such as JHCMQK.website.com, with no answers. You later discover that DNS exfiltration is occurring through both UDP and TLS.

How can you prevent this data theft technique?

Answer

Suggested Answer

The suggested answer is B.

Community Votes3 votes
BSuggested
100%
Question 7 of 66

Refer to the exhibit.

Exam FCSS_EFW_AD-7.6: Image 1

Based on the exhibit, what is the first message that Spoke 1 replies to the hub instructing it to bring up the dynamic tunnel if a client generates traffic destined to Spoke 2?

Answer

Suggested Answer

The suggested answer is A.

Community Votes4 votes
ASuggested
75%
C
25%
Question 8 of 66

Refer to the exhibit.

Exam FCSS_EFW_AD-7.6: Image 1

A network diagram with a hub and spokes deployment is shown.

Must deploy several spokes, including the BGP configuration for the spokes that connect to the hub.

Which two commands would you use to minimize the amount of configuration needed on the hub? (Choose two.)

Answer

Suggested Answer

The suggested answer is C, D.

Question 9 of 66

Refer to the exhibit.

Exam FCSS_EFW_AD-7.6: Image 1

The VDOM configuration on a FortiGate device is shown.

You discover that web filtering stopped working in Corel and Core2 after a maintenance window.

What are two reasons why web filtering stopped working? (Choose two.)

Answer

Suggested Answer

The suggested answer is A, B.

Community Votes3 votes
BCMost voted
100%
Question 10 of 66

Refer to the exhibit.

An OSPF network is shown.Exam FCSS_EFW_AD-7.6: Image 1

Which configuration must you apply to optimize the OSPF database?

Answer

Suggested Answer

The suggested answer is A.

Community Votes2 votes
ASuggested
100%