Free FCSS_NST_SE-7.6 Exam Dumps

Question 16

Refer to the exhibit, which shows the output of the command get router info bgp neighbors 100.64.2.254 advertised-routes.
FCSS_NST_SE-7.6 dumps exhibit
What can you conclude from the output?

Correct Answer:D

Question 17

Exhibit.
FCSS_NST_SE-7.6 dumps exhibit
Refer to the exhibit, which shows the output of diagnose automation test. What can you observe from the output? (Choose two.)

Correct Answer:AD

Question 18

Refer to the exhibit.
FCSS_NST_SE-7.6 dumps exhibit
Which three pieces of information does the diagnose sys top command provide? (Choose three.)

Correct Answer:ACD

Question 19

Refer to the exhibit, which shows a session entry.
FCSS_NST_SE-7.6 dumps exhibit
Which statement about this session is true?

Correct Answer:B
The session output reveals a session with proto=1 (ICMP) and the origin and reply directions show address and NAT translations. Specifically, thehook=post dir=org act=snatshows that source NAT is performed for outgoing packets, where the source 10.1.10.10:40602 is translated to 10.200.5.1:8 (likely ICMP id 8, not a TCP/UDP port). The reply direction,hook=pre dir=reply act=dnat, indicates destination NAT for incoming packets: packets incoming for 10.200.5.1:60430 are destination-NATed to 10.1.10.10:40602. The gateway (gwy) is listed as 10.200.1.254/10.1.0.1, which for outgoing traffic means that return traffic is directed to the gateway (10.200.1.254), per the NAT policy. This is confirmed by the FortiOS Session Table Guide, which explains that the returned ICMP reply will be routed out to this NAT gateway. The session statistics and logical flow (SNAT out, matching DNAT in) reinforce that reply traffic to the initiator traverses via 10.200.1.254.
FortiOS Administration Guide: Session Table, NAT, and Route Interaction
Fortinet Technical Note: Diagnose sys session list, Direction and NAT Analysis