Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Fortinet NSE 7 Network Security Architect NSE7_LED-7.0 Questions and answers with ValidTests

Exam NSE7_LED-7.0 All Questions
Exam NSE7_LED-7.0 Premium Access

View all detail and faqs for the NSE7_LED-7.0 exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

Question # 1

Examine the network diagram and packet capture shown in the exhibit

The packet capture was taken between FortiGate and FortiAuthenticator and shows a RADIUS Access-Request packet sent by FortiSwitch to FortiAuthenticator through FortiGate

Why does the User-Name attribute in the RADIUS Access-Request packet contain the client MAC address?

Options:

A.

The client is performing AD machine authentication

B.

FortiSwitch is authenticating the client using MAC authentication bypass

C.

The client is performing user authentication

D.

FortiSwitch is sending a RADIUS accounting message to FortiAuthenticator

Expert Solution
Questions # 2:

Which two statements about FortiSwitch trunks are true? (Choose two.)

Options:

A.

A trunk is a link aggregation group interface.

B.

By default, when connecting two FortiSwitch devices to each other, a trunk is automatically created between the switches.

C.

Trunks do not support tagged Ethernet frames.

D.

LACP is not supported.

Expert Solution
Questions # 3:

Refer to the exhibits

Question # 3

The exhibits show the wireless network (VAP) SSID profiles defined on FortiManager and an AP profile assigned to a group of APs that are supported by FortiGate

None of the APs are broadcasting the SSlDs defined by the AP profile

Which changes do you need to make to enable the SSIDs to broadcast?

Options:

A.

In the SSIDs section enable Tunnel

B.

Enable one channel in the Channels section

C.

Enable multiple channels in the Channels section and enable Radio Resource Provision

D.

In the SSIDs section enable Manual and assign the networks manually

Expert Solution
Questions # 4:

What is the purpose of enabling Windows Active Directory Domain Authentication on FortiAuthenticator?

Options:

A.

It enables FortiAuthenticator to use Windows administrator credentials to perform an LDAP lookup for a user search

B.

It enables FortiAuthenticator to use a Windows CA certificate when authenticating RADIUS users

C.

It enables FortiAuthenticator to import users from Windows AD

D.

It enables FortiAuthenticator to register itself as a Windows trusted device to proxy authentication using Kerberos

Expert Solution
Questions # 5:

Exhibit.

Question # 5

Refer to the exhibit showing a network topology and SSID settings.

FortiGate is configured to use an external captive portal However wireless users are not able to see the captive portal login page

Which configuration change should the administrator make to fix the problem?

Options:

A.

Enable NAT in the firewall policy with the ID 13.

B.

Add the FortiAuthenticator and WindowsAD address objects as exempt destinations services

C.

Enable the captive-portal-exempt option in the firewall policy with the ID 12

D.

Remove the guest.portal user group in the firewall policy with the ID 12

Expert Solution
Questions # 6:

Refer to the exhibit.

Question # 6

Examine the partial debug output shown in the exhibit.

Question # 6

Which two statements about the debug output are true? (Choose1 two.)

Options:

A.

The LDAP DN search did not match any LDAP user.

B.

The credentials provided for student are correct.

C.

The Training-Lab LDAP server is configured to use regular bind.

D.

The connection to the Training-Lab LDAP server timed out.

Expert Solution
Questions # 7:

To troubleshoot configuration push issues on a managed FortiSwitch, which FortiGate process should an administrator enable debug for?

Options:

A.

httpsd

B.

cu_acd

C.

fortilinkd

D.

flcfgd

Expert Solution
Questions # 8:

Which two statements about the use of digital certificates are true? (Choose two.)

Options:

A.

A chain of trust may include one or more intermediate CAs.

B.

In a chain of trust, the root CA is signed by another certificate.

C.

To validate the signature on a certificate, an endpoint does not need to know the CA of that certificate.

D.

An intermediate CA can sign other certificates.

Expert Solution
Questions # 9:

Which three protocols are used for controlling FortiSwitch devices on FortiGate? (Choose three.)

Options:

A.

HTTPS

B.

CAPWAP

C.

IGMP

D.

FTP

E.

FortiLink

Expert Solution
Questions # 10:

Which two statements about the guest portal on FortiAuthenticator are true? (Choose two.)

Options:

A.

Each remote user on FortiAuthenticator can sponsor up to 10 guest accounts

B.

Administrators must approve all guest accounts before they can be used

C.

The guest portal provides pre and post-log in services

D.

Administrators can use one or more incoming parameters to configure a mapping rule for the guest portal

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions