web analytics
NSE7_PBC-6.4 Dumps / NSE7_PBC-6.4 Exam Questions / NSE7_PBC-6.4 PDF Dumps / NSE7_PBC-6.4 VCE Dumps / Troubleshoot Internet Security Issues Exam

[2-June-2021] New PassLeader Public Cloud Security 6.4 NSE7_PBC-6.4 Dumps with VCE and PDF (New Questions)

PassLeader just published the NEWEST Fortinet NSE7_PBC-6.4 exam dumps! And, PassLeader offer two types of the NSE7_PBC-6.4 dumps — NSE7_PBC-6.4 VCE dumps and NSE7_PBC-6.4 PDF dumps, both VCE and PDF contain the NEWEST NSE7_PBC-6.4 exam questions, they will help you PASSING the Fortinet NSE7_PBC-6.4 exam easily! Now, get the NEWEST NSE7_PBC-6.4 dumps in VCE and PDF from PassLeaderhttps://www.passleader.com/nse7-pbc-6-4.html (30 Q&As Dumps)

What’s more, part of that PassLeader NSE7_PBC-6.4 dumps now are freehttps://drive.google.com/drive/folders/16kp5xdrKzAfI9UJHq4BkTBaLT37gkdvb

You need to deploy FortiGate VM devices in a highly available topology in the Microsoft Azure cloud. The following are the requirements of your deployment:
– Two FortiGate devices must be deployed; each in a different availability zone.
– Each FortiGate requires two virtual network interfaces: one will connect to a public subnet and the other will connect to a private subnet.
– An external Microsoft Azure load balancer will distribute ingress traffic to both FortiGate devices in an active-active topology.
– An internal Microsoft Azure load balancer will distribute egress traffic from protected virtual machines to both FortiGate devices in an active-active topology.
– Traffic should be accepted or denied by a firewall policy in the same way by either FortiGate device in this topology.
Which FortiOS CLI configuration can help reduce the administrative effort required to maintain the FortiGate devices, by synchronizing firewall policy and object configuration between the FortiGate devices?

A.    config system sdn-connector
B.    config system ha
C.    config system auto-scale
D.    config system session-sync

Answer: B

Customer XYZ has an ExpressRoute connection from Microsoft Azure to a data center. They want to secure communication over ExpressRoute, and to install an in-line FortiGate to perform intrusion prevention system (IPS) and antivirus scanning. Which three methods can the customer use to ensure that all traffic from the data center is sent through FortiGate over ExpressRoute? (Choose three.)

A.    Install FortiGate in Azure and build a VPN tunnel to the data center over ExpressRoute.
B.    Configure a user-defined route table.
C.    Enable the redirect option in ExpressRoute to send data center traffic to a user-defined route table.
D.    Configure the gateway subnet as the subnet in the user-defined route table.
E.    Define a default route where the next hop IP is the FortiGate WAN interface.

Answer: CDE

Which statement about FortiSandbox in Amazon Web Services (AWS) is true?

A.    In AWS, virtual machines (VMs) that inspect files do not have to be reset after inspecting a file.
B.    FortiSandbox in AWS uses Windows virtual machines (VMs) to inspect files.
C.    In AWS, virtual machines (VMs) that inspect files are constantly up and running.
D.    FortiSandbox in AWS can have a maximum of eight virtual machines (VMs) that inspect files.

Answer: C

You have been asked to develop an Azure Resource Manager infrastructure as a code template for the FortiGate-VM, that can be reused for multiple deployments. The deployment fails, and errors point to the storageAccount name. Which two are restrictions for a storageAccount name in an Azure Resource Manager template? (Choose two.)

A.    The uniqueString() function must be used.
B.    The storageAccount name must use special characters.
C.    The storageAccount name must be in lowercase.
D.    The storageAccount name must contain between 3 and 24 alphanumeric characters.

Answer: AC

An organization deployed a FortiGate-VM in the Google Cloud Platform and initially configured it with two vNICs. Now, the same organization wants to add additional vNICs to this existing FortiGate-VM to support different workloads in their environment. How can they do this?

A.    They can create additional vNICs using the Cloud Shell.
B.    They cannot create and add additional vNICs to an existing FortiGate-VM.
C.    They can create additional vNICs in the UI console.
D.    They can use the Compute Engine API Explorer.

Answer: D

Which two statements about Amazon Web Services (AWS) networking are correct? (Choose two.)

A.    Proxy ARP entries are disregarded.
B.    802.1q VLAN tags are allowed inside the same virtual private cloud.
C.    AWS DNS reserves the first host IP address of each subnet.
D.    Multicast traffic is not allowed.

Answer: CD

You have previously deployed an Amazon Web Services (AWS) transit virtual private cloud (VPC) with a pair of FortiGate firewalls (VM04 / c4.xlarge) as your security perimeter. You are beginning to see high CPU usage on the FortiGate instances. Which action will fix this issue?

A.    Convert the c4.xlarge instances to m4.xlarge instances.
B.    Migrate the transit VPNs to new and larger instances (VM08 / c4.2xlarge).
C.    Convert from IPsec tunnels to generic routing encapsulation (GRE) tunnels, for the VPC peering connections.
D.    Convert the transit VPC firewalls into an auto-scaling group and launch additional EC2 instances in that group.

Answer: D

Which two Amazon Web Services (AWS) topologies support east-west traffic inspection within the AWS cloud by the FortiGate VM? (Choose two.)

A.    A single VPC deployment with multiple subnets and a NAT gateway.
B.    A single VPC deployment with multiple subnets.
C.    A multiple VPC deployment utilizing a transit VPC topology.
D.    A multiple VPC deployment utilizing a transit gateway.

Answer: BC

Your company deploys FortiGate VM devices in high availability (HA) (active-active) mode with Microsoft Azure load balancers using the Microsoft Azure ARM template. Your senior administrator instructs you to connect to one of the FortiGate devices and configure the necessary firewall rules. However, you are not sure now to obtain the correct public IP address of the deployed FortiGate VM and identify the access ports. How do you obtain the public IP address of the FortiGate VM and identify the correct ports to access the device?

A.    In the configured load balancer, access the inbound NAT rules section.
B.    In the configured load balancer, access the backend pools section.
C.    In the configured load balancer, access the inbound and outbound NAT rules section.
D.    In the configured load balancer, access the health probes section.

Answer: C

What is the bandwidth limitation of an Amazon Web Services (AWS) transit gateway VPC attachment?

A.    Up to 1.25 Gbps per attachment.
B.    Up to 50 Gbps per attachment.
C.    Up to 10 Gbps per attachment.
D.    Up to 1 Gbps per attachment.

Answer: A

Which two statements about Microsoft Azure network security groups are true? (Choose two.)

A.    Network security groups can be applied to subnets and virtual network interfaces.
B.    Network security groups can be applied to subnets only.
C.    Network security groups are stateless inbound and outbound rules used for traffic filtering.
D.    Network security groups are a stateful inbound and outbound rules used for traffic filtering.

Answer: BD

Which three properties are configurable Microsoft Azure network security group rule settings? (Choose three.)

A.    Action.
B.    Sequence number.
C.    Source and destination IP ranges.
D.    Destination port ranges.
E.    Source port ranges.

Answer: ADE

When an organization deploys a FortiGate-VM in a high availability (HA) (active/active) architecture in Microsoft Azure, they need to determine the default timeout values of the load balancer probes. In the event of failure, how long will Azure take to mark a FortiGate-VM as unhealthy, considering the default timeout values?

A.    Less than 10 seconds.
B.    30 seconds.
C.    20 seconds.
D.    16 seconds.

Answer: B

Which two statements about the Amazon Cloud Services (AWS) network access control lists (ACLs) are true? (Choose two.)

A.    Network ACLs are stateless, and inbound and outbound rules are used for traffic filtering.
B.    Network ACLs are stateful, and inbound and outbound rules are used for traffic filtering.
C.    Network ACLs must be manually applied to virtual network interfaces.
D.    Network ACLs support allow rules and deny rules.

Answer: AD

When configuring the FortiCASB policy, which three configuration options are available? (Choose three.)

A.    Intrusion prevention policies.
B.    Threat protection policies.
C.    Data loss prevention policies.
D.    Compliance policies.
E.    Antivirus policies.

Answer: BCD


Learning the PassLeader NSE7_PBC-6.4 dumps with VCE and PDF for 100% passing Fortinet certificationhttps://www.passleader.com/nse7-pbc-6-4.html (30 Q&As Dumps)

BONUS!!! Download part of PassLeader NSE7_PBC-6.4 dumps for freehttps://drive.google.com/drive/folders/16kp5xdrKzAfI9UJHq4BkTBaLT37gkdvb