Join the discussion
Question 1/44
Which two statements describe how the RPF check is used? (Choose two.)
Correct Answer: A,D
The Reverse Path Forwarding (RPF) check is run on the first sent packet of any new session to ensure that the packet arrives on a legitimate interface. This check protects the network from IP spoofing attacks by verifying that a return route exists from the receiving interface back to the source IP address. If the route is invalid or not found, the packet is discarded. Options B and C are incorrect because RPF checks are performed on the first sent packet, not the reply packet.
References:
* FortiOS 7.4.1 Administration Guide: Reverse Path Forwarding (RPF) Check
References:
* FortiOS 7.4.1 Administration Guide: Reverse Path Forwarding (RPF) Check
Add Comments
- Other Question (44q)
- Q1. Which two statements describe how the RPF check is used? (Choose two.)...
- Q2. What are two features of the NGFW profile-based mode? (Choose two.)...
- Q3. Refer to the exhibits. (Exhibit) An administrator creates a new address object on the root...
- Q4. Refer to the exhibits. (Exhibit) The exhibits show a diagram of a FortiGate device connect...
- Q5. An administrator configures FortiGuard servers as DNS servers on FortiGate using default s...
- Q6. A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling...
- Q7. Refer to the exhibit showing a FortiGuard connection debug output. (Exhibit) Based on the ...
- Q8. Which two statements are correct when FortiGate enters conserve mode? (Choose two.)...
- Q9. Refer to the exhibit. (Exhibit) Which statement about this firewall policy list is true?...
- Q10. FortiGuard categories can be overridden and defined in different categories. To create a w...
- Q11. FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN an...
- Q12. Refer to the exhibits. (Exhibit) The exhibits show a diagram of a FortiGate device connect...
- Q13. Which engine handles application control traffic on the next-generation firewall (NGFW) Fo...
- Q14. What are three key routing principles in SD-WAN? (Choose three.)...
- Q15. What is the primary FortiGate election process when the HA override setting is disabled?...
- Q16. Refer to the exhibit. (Exhibit) FortiGate has two separate firewall policies for Sales and...
- Q17. Refer to the exhibit. (Exhibit) Which two statements are true about the routing entries in...
- Q18. Refer to the exhibits, which show a diagram of a FortiGate device connected to the network...
- Q19. Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI. (Exhi...
- Q20. Which two statements are true regarding FortiGate HA configuration synchronization? (Choos...
- Q21. An administrator has configured a strict RPF check on FortiGate. How does strict RPF check...
- Q22. An administrator configured a FortiGate to act as a collector for agentless polling mode. ...
- Q23. Which statement is correct regarding the use of application control for inspecting web app...
- Q24. Refer to the exhibits, which show the firewall policy and the security profile for Faceboo...
- Q25. Refer to the exhibit. (Exhibit) Review the intrusion prevention system (IPS) profile signa...
- Q26. A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using ...
- Q27. What are two features of collector agent advanced mode? (Choose two.)...
- Q28. A network administrator enabled antivirus and selected an SSL inspection profile on a fire...
- Q29. An administrator must enable a DHCP server on one of the directly connected networks on Fo...
- Q30. Which two attributes are required on a certificate so it can be used as a CA certificate o...
- Q31. Which two settings are required for SSL VPN to function between two FortiGate devices? (Ch...
- Q32. Refer to the exhibit. (Exhibit) Which algorithm does SD-WAN use to distribute traffic that...
- Q33. Refer to the exhibit showing a debug flow output. (Exhibit) What two conclusions can you m...
- Q34. FortiGate is integrated with FortiAnalyzer and FortiManager. When a firewall policy is cre...
- Q35. Which method allows management access to the FortiGate CLI without network connectivity?...
- Q36. Which three pieces of information does FortiGate use to identify the hostname of the SSL s...
- Q37. Refer to the exhibit. (Exhibit) The exhibit shows the FortiGuard Category Based Filter sec...
- Q38. Refer to the exhibit. (Exhibit) In the network shown in the exhibit, the web client cannot...
- Q39. Which three strategies are valid SD-WAN rule strategies for member selection? (Choose thre...
- Q40. An administrator manages a FortiGate model that supports NTurbo. How does NTurbo enhance p...
- Q41. Which three statements explain a flow-based antivirus profile? (Choose three.)...
- Q42. A FortiGate administrator is required to reduce the attack surface on the SSL VPN portal. ...
- Q43. Refer to the exhibits. (Exhibit) The exhibits show a diagram of a FortiGate device connect...
- Q44. Refer to the exhibit which contains a RADIUS server configuration. (Exhibit) An administra...

[×]
Download PDF File
Enter your email address to download Fortinet.FCP_FGT_AD-7.4.v2025-06-10.q44.pdf