Question 6 of 37

Refer to the exhibit.

Examine the IPsec VPN phase 1 configuration shown in the exhibit.

An administrator wants to use certificate-based authentication for an IPsec VPN user.

Which three configuration changes must you make on FortiGate to perform certificate-based authentication for the IPsec VPN user? (Choose three.)

    Correct Answer: A, B, D

    To perform certificate-based authentication for the IPsec VPN user on FortiGate, the following changes need to be made: Firstly, create a PKI user for the IPsec VPN user, and then configure the IPsec VPN tunnel to accept the PKI user as a peer certificate. This is because the VPN user will authenticate using a certificate rather than a pre-shared key. Next, in the Authentication section of the IPsec VPN tunnel, switch the Method drop-down list to Signature and select the certificate that FortiGate will use for the IPsec VPN. This change aligns with using certificate-based authentication as opposed to pre-shared keys. Lastly, import the Certificate Authority (CA) that signed the user's certificate to the FortiGate device. The CA's certificate is necessary for validating the user's certificate during the VPN establishment process. These steps collectively enable certificate-based authentication for the IPsec VPN user.

Question 7 of 37

You are investigating a report of poor wireless performance in a network that you manage. The issue is related to an AP interface in the 5 GHz range. You are monitoring the channel utilization over time.

What is the recommended maximum utilization value that an interface should not exceed?

    Correct Answer: C

    For optimal performance in a wireless network, the recommended maximum channel utilization value for an interface in the 5 GHz range should not exceed 75%. Exceeding this threshold can lead to congestion, reduced performance, and increased latency. Therefore, 75% is generally considered the upper limit for maintaining good wireless performance.

Question 8 of 37

Which CLI command should an administrator use to view the certificate verification process in real time?

    Correct Answer: C

    The correct CLI command to view the certificate verification process in real time is 'diagnose debug application authd -1'. The 'authd' application handles authentication processes, including certificate verifications, while other applications like 'foauthd', 'radiusd', and 'fnbamd' are responsible for other specific services.

Question 9 of 37

Which two statements about the guest portal on FortiAuthenticator are true? (Choose two.)

    Correct Answer: C, D

    The guest portal on FortiAuthenticator provides both pre and post-log in services, which means it offers functionalities that guests can access before logging in as well as after successfully logging in. Additionally, administrators have the flexibility to use one or more incoming parameters to configure mapping rules for the guest portal, which allows them to customize access and behavior based on different criteria.

Question 10 of 37

Refer to the exhibits.

In the wireless configuration shown in the exhibits, an AP is deployed in a remote site and has a wireless network (VAP) called Corporate deployed to it.

The network is a tunnelled network; however, clients connecting to a wireless network require access to a local printer. Clients are trying to print to a printer on the remote site, but are unable to do so.

Which configuration change is required to allow clients connected to the Corporate SSID to print locally?

    Correct Answer: A

    To allow clients connected to the Corporate SSID to print locally, the split-tunneling configuration on the VAP (Virtual Access Point) profile is needed. This is necessary because split-tunneling must be enabled on the VAP to route the print traffic locally, bypassing the default tunnel configuration to the central site. The current wtp-profile already has split-tunneling enabled, but the configuration is incomplete without enabling it on the VAP profile. Therefore, configuring split-tunneling in the VAP configuration will ensure local print traffic is handled correctly.