10/204 questions · Unlock full access
Q1

A financial services company is using FortiManager in workflow mode to ensure a strict change control process. An administrator submits a session containing changes to a critical firewall policy. The designated approver reviews the session but finds a minor error in one of the service objects used. What is the approver's most appropriate action within the FortiManager workflow process?

Q2

A network administrator is tasked with adding 100 new retail branch FortiGates to FortiManager using the Zero Touch Provisioning (ZTP) feature. The administrator has created a device blueprint that includes a system template and assigns a policy package. However, they notice that after a new FortiGate is registered via ZTP, the assigned policy package is not being installed automatically. What is a likely cause for this issue?

Q3Multiple answers

An administrator needs to create a firewall policy that allows traffic only from authenticated Active Directory users in the 'Engineering' group. The FSSO connector is configured correctly in the ADOM. When creating the firewall policy, which two objects must be selected to correctly define the source of the traffic? (Select TWO).

Q4

True or False: When FortiManager is operating in a closed network without internet access, it is impossible to manage FortiGuard subscriptions for managed devices.

Q5

A system administrator is reviewing the revision history for a managed FortiGate and observes several configuration changes that were made directly on the FortiGate, causing a 'Modified' state in FortiManager. The administrator wants to overwrite the local changes on the FortiGate with the configuration stored in FortiManager's device database. Which action should be performed?

Q6

A university manages its campus network with multiple FortiGates grouped by building. The central IT team wants to enforce a baseline security policy across all buildings but allow each building's IT staff to add their own specific firewall rules. The central IT team must retain control over the baseline rules, preventing any modifications by building staff. Which FortiManager feature should be used to achieve this hierarchical policy management?

Q7

An organization is deploying a new FortiManager HA cluster. The administrator has configured two FortiManager VMs with identical resources and firmware. After configuring the HA settings, the administrator notices that the configuration synchronization is failing between the primary and secondary units. Which of the following is a common cause for this issue?

Q8

A junior administrator is using a script to update the DNS settings on a group of 20 FortiGates. After running the script, the task monitor shows that the script failed on five of the devices. What is the most effective first step to diagnose the cause of the failures on those specific devices?

Q9

What is the primary function of ADOM revisions in FortiManager?

Q10

A new FortiManager administrator profile is being created for a team that only manages Web Application Firewall (WAF) policies. The super administrator wants to limit the team's access to only the relevant sections of the GUI. Which permission setting within the administrator profile achieves this?