<< Prev Question Next Question >>

Question 77/96

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up.
Based on the phase 2 configuration shown in the exhibit, what configuration change will bring phase 2 up?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (96q)
Question 1: Which two statements are true when FortiGate is in transpare...
Question 2: Refer to the exhibit. (Exhibit) The global settings on a For...
Question 3: An administrator wants to monitor their network for any prob...
Question 4: The HTTP inspection process in web filtering follows a speci...
Question 5: Refer to the exhibit. (Exhibit) Which statement about the co...
Question 6: What is the common feature shared between IPv4 and SD-WAN EC...
Question 7: Which two configuration settings are global settings? (Choos...
Question 8: Refer to the exhibit to view the authentication rule configu...
Question 9: Which CLI command allows administrators to troubleshoot Laye...
Question 10: View the exhibit. (Exhibit) Both VDOMs are operating in NAT/...
Question 11: When configuring a firewall virtual wire pair policy, which ...
Question 12: Which two statements about FortiGate antivirus databases are...
Question 13: Refer to the exhibit. (Exhibit) In the network shown in the ...
Question 14: To complete the final step of a Security Fabric configuratio...
Question 15: Refer to the exhibit, which contains a radius server configu...
Question 16: If the Issuer and Subject values are the same in a digital c...
Question 17: View the exhibit. (Exhibit) Which two behaviors result from ...
Question 18: Refer to the exhibit. (Exhibit) The exhibit contains a netwo...
Question 19: An administrator has configured two-factor authentication to...
Question 20: Which three actions are valid for static URL filtering? (Cho...
Question 21: Refer to the exhibits. The exhibits show the SSL and authent...
Question 22: Which engine handles application control traffic on the next...
Question 23: An administrator does not want to report the login events of...
Question 24: FortiGate is operating in NAT mode and is configured with tw...
Question 25: Which two statements are true about the FGCP protocol? (Choo...
Question 26: Which security feature does FortiGate provide to protect ser...
Question 27: Which two types of traffic are managed only by the managemen...
Question 28: Which two IP pool types are useful for carrier-grade NAT dep...
Question 29: Which two statements about incoming and outgoing interfaces ...
Question 30: An administrator must disable RPF check to investigate an is...
Question 31: Examine the IPS sensor and DoS policy configuration shown in...
Question 32: Which two statements correctly describe the differences betw...
Question 33: Which statement about the IP authentication header (AH) used...
Question 34: Refer to exhibit. An administrator configured the web filter...
Question 35: Refer to the exhibits. Exhibit A shows system performance ou...
Question 36: You can configure FortiGate to store logs on syslog servers,...
Question 37: Which two statements are correct regarding FortiGate HA clus...
Question 38: Which three CLI commands can you use to troubleshoot Layer 3...
Question 39: Which statement about the policy ID number of a firewall pol...
Question 40: An administrator has configured outgoing interface any in a ...
Question 41: Examine the exhibit, which shows a firewall policy configure...
Question 42: Which statement regarding the firewall policy authentication...
Question 43: FortiGuard categories can be overridden and defined in diffe...
Question 44: Which three options are the remote log storage options you c...
Question 45: Which two protocol options are available on the CLI but not ...
Question 46: Refer to the exhibit. (Exhibit) An administrator is running ...
Question 47: Which two configuration settings are synchronized when Forti...
Question 48: Refer to the exhibit to view the application control profile...
Question 49: An administrator has configured central DNAT and virtual IPs...
Question 50: Which three statements explain a flow-based antivirus profil...
Question 51: Which three methods can you use to deliver the token code to...
Question 52: Refer to the exhibit. (Exhibit) Which contains a network dia...
Question 53: Which three options are the remote log storage options you c...
Question 54: Which three security features require the intrusion preventi...
Question 55: An administrator needs to increase network bandwidth and pro...
Question 56: Which of the following statements is true regarding SSL VPN ...
Question 57: Which two actions can you perform only from the root FortiGa...
Question 58: Why does FortiGate keep TCP sessions in the session table fo...
Question 59: If Internet Service is already selected as Source in a firew...
Question 60: Refer to the exhibits. Exhibit A. (Exhibit) Exhibit B. (Exhi...
Question 61: Refer to the exhibit. (Exhibit) Which route will be selected...
Question 62: Which two protocols are used to enable administrator access ...
Question 63: Which of the following are valid actions for FortiGuard cate...
Question 64: Refer to the FortiGuard connection debug output. (Exhibit) B...
Question 65: In consolidated firewall policies, IPv4 and IPv6 policies ar...
Question 66: What is the effect of enabling auto-negotiate on the phase 2...
Question 67: An administrator has configured the following settings: (Exh...
Question 68: Which timeout setting can be responsible for deleting SSL VP...
Question 69: Which security fabric feature causes an event trigger to mon...
Question 70: Which scanning technique on FortiGate can be enabled only on...
Question 71: Which CLI command will display sessions both from client to ...
Question 72: What is eXtended Authentication (XAuth)?...
Question 73: Which NAT method translates the source IP address in a packe...
Question 74: Which three criteria can FortiGate use to look for a matchin...
Question 75: Which are two benefits of using SD-WAN? (Choose two.)...
Question 76: Which statement best describes the role of a DC agent in an ...
Question 77: Refer to the exhibit. (Exhibit) A network administrator is t...
Question 78: An organization's employee needs to connect to the office th...
Question 79: Which of the following statements correctly describes FortiG...
Question 80: Examine the two static routes shown in the exhibit, then ans...
Question 81: Which statement is correct regarding the inspection of some ...
Question 82: Which two statements about antivirus scanning in a firewall ...
Question 83: An administrator needs to inspect all web traffic (including...
Question 84: Refer to the exhibit, which contains a session diagnostic ou...
Question 85: What devices form the core of the security fabric?...
Question 86: An administrator configured the antivirus profile in a firew...
Question 87: Which two statements are true about the RPF check? (Choose t...
Question 88: Which three methods are used by the collector agent for AD p...
Question 89: Which statements best describe auto discovery VPN (ADVPN). (...
Question 90: Consider the topology: Application on a Windows machine &lt;...
Question 91: FortiGate is configured as a policy-based next-generation fi...
Question 92: Which statement correctly describes NetAPI polling mode for ...
Question 93: What are two benefits of flow-based inspection compared to p...
Question 94: How do you format the FortiGate flash disk?...
Question 95: Refer to the exhibit. (Exhibit) The exhibit shows the IPS se...
Question 96: Refer to the exhibit. (Exhibit) The exhibit shows a FortiGat...