What does the diagnose dvm check-integrity command do? (Choose two.)
A. Internally upgrades existing ADOMs to the same ADOM version in order to clean up and correct the ADOM syntax
B. Verifies and corrects unregistered, registered, and deleted device states
C. Verifies and corrects database schemas in all object tables
D. Verifies and corrects duplicate VDOM entries
An administrator has assigned a global policy package to a new ADOM called ADOM1. What will happen if the administrator tries to create a new policy package in ADOM1?
A. When creating a new policy package, the administrator can select the option to assign the global policy package to the new policy package
B. When a new policy package is created, the administrator needs to reapply the global policy package to ADOM1.
C. When a new policy package is created, the administrator must assign the global policy package from the global ADOM.
D. When the new policy package is created, FortiManager automatically assigns the global policy package to the new policy package.
In the event that the primary FortiManager fails, which of the following actions must be performed to return the FortiManager HA to a working state?
A. Secondary device with highest priority will automatically be promoted to the primary role, and manually reconfigure all other secondary devices to point to the new primary device
B. Reboot one of the secondary devices to promote it automatically to the primary role, and reconfigure all other secondary devices to point to the new primary device.
C. Manually promote one of the secondary devices to the primary role, and reconfigure all other secondary devices to point to the new primary device.
D. FortiManager HA state transition is transparent to administrators and does not require any reconfiguration.
View the following exhibit.
Based on the configuration setting, which one of the following statements is true?
A. The setting allows automatic updates to the policy package configuration for a managed device
B. The setting enables the ADOMs feature on FortiManager
C. This setting allows you to assign different VDOMs from the same FortiGate to different ADOMs.
D. The setting disables concurrent ADOM access and adds ADOM locking
What configuration setting for FortiGate is part of a device-level database on FortiManager?
A. VIP and IP Pools
B. Firewall policies
C. Security profiles
D. Routing
As a result of enabling FortiAnalyzer features on FortiManager, which of the following statements is true?
A. FortiManager will reboot
B. FortiManager will send the logging configuration to the managed devices so the managed devices will start sending logs to FortiManager
C. FortiManager will enable ADOMs automatically to collect logs from non-FortiGate devices
D. FortiManager can be used only as a logging device.
An administrator would like to create an SD-WAN using central management. What steps does the administrator need to perform to create an SD-WAN using central management?
A. First create an SD-WAN firewall policy, add member interfaces to the SD-WAN template and create a static route
B. You must specify a gateway address when you create a default static route
C. Remove all the interface references such as routes or policies
D. Enable SD-WAN central management in the ADOM, add member interfaces, create a static route and SD-WAN firewall policies.
An administrator has added all the devices in a Security Fabric group to FortiManager. How does the administrator identify the root FortiGate?
A. By a dollar symbol ($) at the end of the device name
B. By an at symbol (@) at the end of the device name
C. By a question mark(?) at the end of the device name
D. By an Asterisk (*) at the end of the device name
What are the factory default settings on FortiManager? (Choose three.)
A. Username is admin
B. Password is fortinet
C. FortiAnalyzer features are disabled
D. Reports and Event Monitor panes are enabled
E. port1 interface IP address is 192.168.1.99/24
What is the purpose of the Policy Check feature on FortiManager?
A. To find and provide recommendation to combine multiple separate policy packages into one common policy package
B. To find and merge duplicate policies in the policy package
C. To find and provide recommendation for optimizing policies in a policy package
D. To find and delete disabled firewall policies in the policy package