Fortinet NSE7_PBC-7.2 - Fortinet NSE 7 - Public Cloud Security 7.2 Exam

Page:    1 / 7   
Total 34 questions

Refer to the exhibit.

The exhibit shows a customer deployment of two Linux instances and their main routing table in Amazon Web Services (AWS). The customer also created a Transit Gateway (TGW) and two attachments.
Which two steps are required to route traffic from Linux instances to the TGW? (Choose two.)

  • A. In the TGW route table, add route propagation to 192.168.0.0/16.
  • B. In the main subnet routing table in VPC A and B, add a new route with destination 0.0.0.0/0, next hop Internet gateway (IGW).
  • C. In the TGW route table, associate two attachments.
  • D. In the main subnet routing table in VPC A and B, add a new route with destination 0.0.0.0/0, next hop TGW.


Answer : CD

What kind of underlying mechanism does Transit Gateway Connect use to send traffic from the virtual private cloud (VPC) to the transit gateway?

  • A. A GRE attachment
  • B. A BGP attachment
  • C. A Transit Gateway Connect attachment
  • D. A transport attachment


Answer : A

In an SD-WAN TGW Connect topology, which three initial steps are mandatory when routing traffic from a spoke VPC to a security VPC through a Transit Gateway? (Choose three.)

  • A. From the security VPC TGW subnet routing table, point 0.0.0.0/0 traffic to the FortiGate internal port.
  • B. From the security VPC FortiGate internal subnet routing table, point 0.0.0.0/0 traffic to the TGW.
  • C. From the spoke VPC internal routing table, point 0.0.0.0/0 traffic to the TGW.
  • D. From the security VPC TGW subnet routing table, point 0.0.0.0/0 traffic to the TGW.
  • E. From both spoke VPCs, and the security VPC, point 0.0.0.0/0 traffic to the Internet Gateway.


Answer : BCD

Which two Amazon Web Services (AWS) features do you use for the transit virtual private cloud (VPC) automation process to add new spoke VPCs? (Choose two.)

  • A. Amazon CloudWatch
  • B. Amazon S3 bucket
  • C. AWS Transit Gateway
  • D. AWS Security Hub


Answer : AC

How does an administrator secure container environments from newly emerged security threats?

  • A. Use distributed network-related application control signatures.
  • B. Use Docker-related application control signatures.
  • C. Use Amazon AWS_S3-related application control signatures.
  • D. Use Amazon AWS-related application control signatures.


Answer : B

Page:    1 / 7   
Total 34 questions