exam questions

Exam FCP_FGT_AD-7.4 All Questions

View all questions & answers for the FCP_FGT_AD-7.4 exam

Exam FCP_FGT_AD-7.4 topic 1 question 14 discussion

Actual exam question from Fortinet's FCP_FGT_AD-7.4
Question #: 14
Topic #: 1
[All FCP_FGT_AD-7.4 Questions]

Refer to the exhibit, which shows the IPS sensor configuration.

If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)

  • A. The sensor will gather a packet log for all matched traffic.
  • B. The sensor will reset all connections that match these signatures.
  • C. The sensor will allow attackers matching the Microsoft.Windows.iSCSI.Target.DoS signature.
  • D. The sensor will block all attacks aimed at Windows servers.
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
0d6e481
Highly Voted 4 months, 3 weeks ago
Selected Answer: CD
How can A be a correct answer when the packet logging is enabled only for the iSCSI attack and disabled for the Windows attacks?
upvoted 11 times
...
rigonet
Highly Voted 2 months, 2 weeks ago
Selected Answer: AC
Correct Answers: A and C Explanation of Each Option: A. The sensor will gather a packet log for all matched traffic. Correct. The "Microsoft.Windows.iSCSI.Target.DoS" signature has packet logging enabled, so matched traffic will be logged. B. The sensor will reset all connections that match these signatures. Incorrect. The configuration does not indicate resetting connections, as the action for the "iSCSI" signature is set to "Monitor." C. The sensor will allow attackers matching the Microsoft.Windows.iSCSI.Target.DoS signature. Correct. The action for this signature is set to "Monitor," meaning traffic matching this signature is allowed but logged. D. The sensor will block all attacks aimed at Windows servers. Incorrect. The signature for "iSCSI" is explicitly set to "Monitor," so it will not block this attack. Conclusion: The sensor will log traffic (A) for matched signatures and allow traffic (C) for the monitored "iSCSI" signature.
upvoted 5 times
...
JS77test
Most Recent 1 day, 12 hours ago
Selected Answer: AC
A. The sensor will gather a packet log for all matched traffic. -> In other words all traffic that matches "Microsoft.Windows.iSCSI.Target.DoS" signature will match C. The sensor will allow attackers matching the Microsoft.Windows.iSCSI.Target.DoS signature. -> Matches are only monitored but not blocked => Monitor: Allow traffic to continue to its destination and log the activity. B. -> Action "Reset" exists but is not used in example D. -> Windows Servers is only the Name of the Rule. Match criteria is set to "OS Windows", so ALL MS Windows operating systems, regardingless which role, client or server. => OS: Refers to the Operating System affected by the attack.
upvoted 1 times
...
truserud
1 week, 3 days ago
Selected Answer: AC
C & D guys need to read page 243 in the study guide. A & C are most probable the correct answers based off of that page alone: "The rules are similar to firewall policy matching; the engine evaluates the filters and signatures at the top of the list first, and applies the first match. The engine skips subsequent filters." Sensor will gather logs for packets Sensor will allow traffic. Now, look at the blocked ipse sensor, it only specifies Windows, not for example target "Server". So it will not block all traffic against Windows Servers.
upvoted 1 times
...
TheVaro
1 week, 3 days ago
Selected Answer: CD
A is incorrect because packet logging is only enabled for the "Microsoft.Windows.iSCSI.Target.DoS" signature but disabled for the general "Windows" category. B is incorrect because "Monitor" mode does not reset connections, and while "Block" mode is enabled for Windows-related attacks, there is no explicit mention of connection resets.
upvoted 1 times
...
6a61123
2 weeks, 1 day ago
Selected Answer: C
A is incorrect because it will only log for the iSCSI DoS so if it is not iSCSI DoS, it will not be logged B is incorrect because reset is not selected for any actions C is correct because the iSCSI DoS is set to monitor D is incorrect because it won’t block ALL Windows attacks – it is allowing iSCSI DoS (but I think this is what they want to be the 2nd answer).
upvoted 2 times
...
jrb77
1 month, 2 weeks ago
Selected Answer: AC
How can D be correct when it states that the sensor will block all attacks at Windows servers, when it is allowing C. Explanation is needed on this one.
upvoted 1 times
...
6bee64f
1 month, 2 weeks ago
Selected Answer: CD
Packet logging is not enabled for both connection, and there are not conditions to reset connections.... CD
upvoted 1 times
...
jrb77
1 month, 3 weeks ago
Selected Answer: AC
If you look at A, it is a true statement, because it states, The sensor will gather a packet log for all matched traffic. The ISCSI target has packet logging enabled. Even if windows OS does not have packet logging enabled, the statement for the answer is still true because it will gather a packet log for "All Matched Traffic" For C, I believe this is correct, as you will be allowing attackers through a monitoring action. I believe that A and C are correct.
upvoted 1 times
...
wohny
1 month, 3 weeks ago
Selected Answer: CD
Only C is correct, but if I have to choose 2, then D is more correct than A. D is correct except for the statement from C :) A is not correct because it only logs C, if it is not met, dropped packets are not logged - D.
upvoted 2 times
...
Cyber_rosh20
2 months ago
Selected Answer: AC
A because will log just the signature of iSCSI not all windows attack
upvoted 1 times
...
sxcap
2 months, 3 weeks ago
Selected Answer: CD
A is incorrect because there is no log enabled to blocked packets B is incorrect because iSCI packets are allowed C is correct because iSCI packets are allowed D is correct because all other windows server attacks will be blocked
upvoted 3 times
...
Booma1234
2 months, 4 weeks ago
Selected Answer: AC
A and C are the only way mes it could be when you look closely at it.
upvoted 1 times
...
evdw
3 months, 1 week ago
Selected Answer: AC
Correct answer is A,C
upvoted 2 times
...
evdw
3 months, 1 week ago
Microsoft.Windows.iSCSI.Target.DoS is allowed, so not all attacks to windows are blocked. And when hitting the Microsoft.Windows.iSCSI.Target.DoS attack, it is getting logged
upvoted 1 times
...
vuhidus
3 months, 2 weeks ago
Selected Answer: CD
I believe it's C & D
upvoted 2 times
...
Charly0710
3 months, 3 weeks ago
A and C. D cannot be for the following reason: "When the IPS engine compares traffic with the signatures in each filter, order matters. The rules are similar to firewall policy matching; the engine evaluates the filters and signatures at the top of the list first, and applies the first match. The engine skips subsequent filters". Pag 243 Fortinate Administrator Study Guide
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago