Fortinet NSE7_EFW-7.2 Practice Questions

Total 64 Questions


Last Updated On : 26-Nov-2025


undraw-questions

Think You're Ready? Prove It Under Real Fortinet Exam Conditions

Take Exam

What are two functions of automation stitches? (Choose two.)



A. Automation stitches can be created to run diagnostic commands and email the results when CPU or memory usage exceeds specified thresholds.


B. An automation stitch configured to execute actions in parallel can be set to insert a specific delay between actions.


C. Automation stitches can be configured on any FortiGate device in a Security Fabric environment.


D. An automation stitch configured to execute actions sequentially can take parameters from previous actions as input for the current action.





A.
  Automation stitches can be created to run diagnostic commands and email the results when CPU or memory usage exceeds specified thresholds.

D.
  An automation stitch configured to execute actions sequentially can take parameters from previous actions as input for the current action.

Which ADVPN configuration must be configured using a script on fortiManager, when using VPN Manager to manage fortiGate VPN tunnels?



A. Enable AD-VPN in IPsec phase 1


B. Disable add-route on hub


C. Configure IP addresses on IPsec virtual interlaces


D. Set protected network to all





A.
  Enable AD-VPN in IPsec phase 1

Explanation:

To enable AD-VPN, you need to edit an SD-WAN overlay template and enable the Auto-Discovery VPN toggle. This will automatically add the required settings to the IPsec template and the BGP template. You cannot enable AD-VPN directly in the IPsec phase 1 settings using VPN Manager.

References := ADVPN | FortiManager 7.2.0 - Fortinet Documentation

Which two statements about IKE vision 2 are true? (Choose two.)



A. Phase 1 includes main mode


B. It supports the extensible authentication protocol (EAP)


C. It supports the XAuth protocol.


D. It exchanges a minimum of four messages to establish a secure tunnel





B.
  It supports the extensible authentication protocol (EAP)

D.
  It exchanges a minimum of four messages to establish a secure tunnel

Explanation:

IKE version 2 supports the extensible authentication protocol (EAP), which allows for more flexible and secure authentication methods1. IKE version 2 also exchanges a minimum of four messages to establish a secure tunnel, which is more efficient than IKE version 12. References: = IKE settings | FortiClient 7.2.2 - Fortinet Documentation, Technical Tip: How to configure IKE version 1 or 2 … - Fortinet Community

You want to improve reliability over a lossy IPSec tunnel. Which combination of IPSec phase 1 parameters should you configure?



A. fec-ingress and fec-egress


B. Odpd and dpd-retryinterval


C. fragmentation and fragmentation-mtu


D. keepalive and keylive





C.
  fragmentation and fragmentation-mtu

Explanation:

For improving reliability over a lossy IPSec tunnel, the fragmentation and fragmentation-mtu parameters should be configured. In scenarios where there might be issues with packet size or an unreliable network, setting the IPsec phase 1 to allow for fragmentation will enable large packets to be broken down, preventing them from being dropped due to size or poor network quality. The fragmentation-mtu specifies the size of the fragments. This is aligned with Fortinet's recommendations for handling IPsec VPN over networks with potential packet loss or size limitations.

Which two statements about the Security fabric are true? (Choose two.)



A. FortiGate uses the FortiTelemetry protocol to communicate with FortiAnatyzer.


B. Only the root FortiGate sends logs to FortiAnalyzer


C. Only FortiGate devices with configuration-sync receive and synchronize global CMDB objects that the toot FortiGate sends


D. Only the root FortiGate collects network topology information and forwards it to FortiAnalyzer





B.
  Only the root FortiGate sends logs to FortiAnalyzer

C.
  Only FortiGate devices with configuration-sync receive and synchronize global CMDB objects that the toot FortiGate sends

Explanation:

In the Security Fabric, only the root FortiGate sends logs to FortiAnalyzer (B). Additionally, only FortiGate devices withconfiguration-syncenabled receive and synchronize global Central Management Database (CMDB) objects that the root FortiGate sends (C). FortiGate uses the FortiTelemetry protocol to communicate with other FortiGates, not FortiAnalyzer (A). The last option (D) is incorrect as all FortiGates can collect and forward network topology information to FortiAnalyzer.
References:

FortiOS Handbook - Security Fabric

Which two statements about metadata variables are true? (Choose two.)



A. You create them on FortiGate


B. They apply only to non-firewall objects.


C. The metadata format is $.


D. They can be used as variables in scripts





A.
  You create them on FortiGate

D.
  They can be used as variables in scripts

Explanation:

Metadata variables in FortiGate are created to store metadata associated with different FortiGate features. These variables can be used in various configurations and scripts to dynamically replace the variable with its actual value during processing. A: You create metadata variables on FortiGate. They are used to store metadata for FortiGate features and can be called upon in different configurations. D: They can be used as variables in scripts. Metadata variables are utilized within the scripts to dynamically insert values as per the context when the script runs.

Fortinet FortiOS Handbook: CLI Reference

You want to configure faster failure detection for BGP Which parameter should you enable on both connected FortiGate devices?



A. Ebgp-enforce-multihop


B. bfd


C. Distribute-list-in


D. Graceful-restart





B.
  bfd

Explanation:

BFD (Bidirectional Forwarding Detection) is a protocol that provides fast failure detection for BGP by sending periodic messages to verify the connectivity between two peers1. BFD can be enabled on both connected FortiGate devices by using the command set bfd enable under the BGP configuration2.

References: = Technical Tip : FortiGate BFD implementation and examples …, Configure BGP | FortiGate / FortiOS 7.0.2 - Fortinet Documentation

Page 2 out of 10 Pages
NSE7_EFW-7.2 Practice Test Home

Your Official Fortinet NSE7_EFW-7.2 Exam Rehearsal

Our new Timed NSE7_EFW-7.2 Exam Simulation replicates the exact format, question count, and strict time limit of the real test.

We don't just test your knowledge; we build your Fortinet exam-day stamina and speed, so you can answer with confidence when it matters most.



Stop the clock-watching. Start your simulation now!