Fortinet Interview Questions and Answers

Question 1 : What is UTM- Unified threat management?
Answer : Unified threat management (UTM) is a move toward security management that allows a network administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console. UTM appliances not only combines firewall, gateway anti-virus, and intrusion detection and prevention capabilities into a single platform but also works within themselves interdependently just like a piece of fabric.

Learn Fortinet to Unleash a Modern Career

Join Fortinet Training

Question 2 : What does Aware mean in Fortinet Security fabric?
Answer : Security Fabric behaves as a single entity from a Policy and Logging perspective, enabling end-to-end segmentation to lessen the risk from advanced threats. We not only need to see data that flows into and out of the network but how that data pass through the network once it is inside the perimeter. Fortinet Security Fabric enables end-to-end network segmentation for deep visibility and inspection of traffic traveling the network, and controls who and what gets to go where thereby minimizing the risk from advanced threats.

Question 3 : What is Threat Management?
Answer : Integrated threat management is a complete approach to network security issues that address multiple types of malware, as well as blended threats and spam, and protects from invasion not only at the gateway but also at the endpoint levels.

Question 4 : What are the different authentication and encryption mechanisms available in FortiGate Firewall?
Answer : Listed below are the methods in order of strength for authentication and encryption:

  • WPA2 – Enterprise 802.1x/EAP (Personal pre-shared key of 8-63 characters)
  • WPA – Enterprise 802.1x/EAP (Personal pre-shared key of 8-63 characters)
  • WEP128 (26 Hexadecimal digit key)
  • WEP64 (10 Hexadecimal digit key)
  • None

It is advisable to use WPA2 which is the strongest method for authentication and encryption.

Question 5 : What are some points to consider while configuring the network?
Answer : Don’t leave the backdoor to access the firewall.
Prepare network diagram consists of IP addressing, cabling, and network devices.

Question 6 : What is Security Fabric?
Answer : Security Fabric is a security solution to detect, monitor, block, and remediate cyber-attacks.

Question 7 : What is the FGCP cluster?
Answer : FGCP stands for FortiGate Clustering Protocol. It is a proprietary High Availability (HA) solution provided by Fortinet. FortiGate HA solution consists of a minimum of two firewalls configured for high availability operation.

Question 8 : What are the benefits of the scalable feature in Fortinet Fabric?
Answer : Fortinet Security Fabric protects any organization from IoT to the Cloud. A complete security strategy needs both in-depth performances and in deep inspection along with the breadth i.e. end to end. Security not only needs to scale to meet volume and performance demands, it needs to scale itself up laterally, seamlessly tracking and securing data from IoT and endpoints, across the distributed network and data center, and into the cloud. Fortinet Security Fabric provides seamless, protection across the distributed enterprise, as well as inspection of packet data, application protocols, and deep analysis of unstructured content at wire speeds.

Question 9 : How does Fortinet’s Security Fabric benefit Fortinet’s global partner network of distributors and solution providers?
Answer : Because of its significant and complex character, security continues to be one of the largest opportunities for the channel. Partners that can plan, design, deploy, and optimize an integrated security system are finding a growing demand for their skills. By combining the traditional security devices and emerging technologies into an integrated security fabric, associates can help their customers collect and respond to more actionable intelligence, synchronize risk responses, and centralize the creation, distribution, and orchestration of their security management and further investigation. This wide visibility and open-standards approach offered by the Fortinet Security Fabric allows the solution providers to implement more automation to focus on the alerts, which matters the most in today’s world.

Question 10 : Tell us something about Fortinet’s history
Answer : Ken and Michael Xie, each other’s siblings, founded Fortinet in 2000. Fortinet raised about $93 million in funding by 2004 and introduced ten FortiGate appliances. That same year was the beginning of a recurring patent dispute between Fortinet and Trend Micro. The company went public in 2009, raising $156 million through an initial public offering. Throughout the 2000s, Fortinet expanded its product lines, by adding products for wireless access points, sandboxing, and messaging security, among others.

Learn Fortinet to Unleash a Modern Career

Join Fortinet Training

Question 11 : What is your opinion of Fortinet’s FortiGate Firewall?
Answer : The rising tendency towards all-in-one products sounds a good marketing idea, but when it comes to performance, there is a big gap. It is believed that when it comes to security there should be no negotiation and concession. With all in one box, perfectly synchronized with each other working synergistically, the product is bound to be appreciated. FortiOS released by Fortinet with its range of appliances offers good routing and encryption features by enhancing support for RIP I & II and OSPF.

Question 12 : What do we mean by Actionable in Fortinet Security Fabric?
Answer : Big Data cloud systems correlate risk information and network data to deliver into Actionable Threat Intelligence in real time. It is not enough to sense bad traffic or block malware using distinct security devices. Network administrators need a common set of risk intelligence and centralized orchestration that allows the security to dynamically adapt as a risk is revealed anywhere, not just in our network, but also anywhere in the world. Fortinet’s Big Data cloud systems centralize and correlate risk information and network data and provide actionable threat intelligence to each and every single security device in the network’s security fabric in real time.

Question 13 : When using sender reputation on a FortiMail unit, which actions can be taken against a source IP address generating spam or invalid E-mail messages?
Answer :

  1. FortiMail Delays the email messages from that source IP address with a temporary failure.
  2. FortiMail Rejects the email messages from that source IP address with a permanent failure.
  3. FortiMail Quarantines all the email messages from that source IP address

Question 14 : How Can A Fortimail Administrator Retrieve Email Account Information From An LDAP Server Instead Of Configuring This Data Manually On The Unit?
Answer : Configure the LDAP profile sections “User query options” and “Authentication” then associate the profile to the domain that is locally configured.

Question 15 : What is Security fabric?
Answer : Security Fabric uses FortiTelemetry to connect different security sensors and tools together to collect, coordinate, and respond to malicious behavior anywhere it occurs on the network in real time. The core of a security fabric is an upstream FortiGate located at the edge of the network, with several FortiGates functioning as Internet Segmentation Firewalls (ISFWs). A security fabric is used to coordinate with the behavior of other Fortinet products in the network, including FortiAnalyzer, FortiManager, FortiClient, FortiClient EMS, FortiWeb, FortiSwitch, and FortiAP.

Question 16 : What Is One Reason For Deploying A Fortimail Unit In Transparent Mode?
Answer : DNS records do not necessarily have to be modified.

Question 17 : What is the Next Generation Firewall?
Answer : Next-Generation Firewall (NGFW) is the part of the third generation in firewall technology, combining a traditional firewall with other network device filtering functionalities, such as application firewall using in-line deep packet inspection system (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic examination, website filtering, QoS/bandwidth management, antivirus scrutiny, and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory)

Question 18 : Which Smtp Sessions Are Defined As Incoming?
Answer : SMTP sessions for the protected domain.

Question 19 : How is Fortinet’s Fabric Ready Partner program different from the partner programs we see other vendors promoting?
Answer : Like many other partner programs, Fortinet’s Fabric Ready Partner Program brings together best-in-class technology alliance partners. Unlike other approaches, Fortinet’s approach actually allows the partners to deliver pre-integrated, end-to-end security offerings ready for deployment in any organization.

Question 20 : In The Local Storage Structure Of The Fortimail Unit, What Does The Flash Memory Contain?
Answer : The Flash Memory Contain Firmware Image along with System Configuration and Certificates.

Learn Fortinet to Unleash a Modern Career

Join Fortinet Training

Question 21 : WAN optimization is, configured in active or passive mode, when will the remote peer accept an attempt to initiate a tunnel?
Answer : The attempt will be accepted when there is a matching WAN optimization passive rule.

Question 22 : Do you know about Fortinet as an Organization?
Answer : Fortinet is an American MNC with its headquarters in Sunnyvale, California. It develops and markets cybersecurity software, appliances, and services, such as firewalls, anti-virus, intrusion prevention, and endpoint security, among others. It is the fourth-largest network security company by revenue.

Question 23 : When inspecting and delivering email messages, what does a FortiMail unit do in a transparent mode?
Answer : First inspect viruses, then Inspect content of the message payload, then Inspect for spam, followed by performing a routing lookup to decide the next hop in MTA.

Question 24 : What does the security feature of Fortinet Security Fabric benefit us?
Answer : Global and local risk intelligence and lessening information can be shared across individual products to decrease time to protect. Not only does security need to include powerful security tools for the various places and functions in the network, but true visibility and control needs these distinct elements to work together as an integrated security system. Fortinet’s Security Fabric behaves as a single collaborative entity from a policy and logging perspective, allowing individual product elements to share global and local risk intelligence and risk mitigation information.

Question 25 : What do we understand by Open APIs in Fortinet Security Fabric?
Answer : Well defined, open APIs allows leading technology partners to become part of the fabric. Of course, a true security fabric lets us maximize our existing investment in security technologies. That is why Fortinet has developed a series of well defined, open APIs that allows technology partners to become a part of the Fortinet Security Fabric. Combined, the Fortinet Security Fabric is able to quickly adapt to the evolving network architecture as well as the changing the threat landscape.

Learn Fortinet to Unleash a Modern Career

Join Fortinet Training

Question 26 : When Inspecting And Delivering Mail Messages, Which Steps Could Be Taken By A Fortimail Unit Operating In Transparent Mode?
Answer :

  • Inspect for viruses.
  • Inspect content of the message payload.
  • Inspect for spam.
  • Perform a routing lookup to decide the next hop MTA.

Question 27 : What Is The Method Does The Fortigate Unit Use To Determine The Availability Of A Web Cache Using Web Cache Communication Protocol (wccp)?
Answer : The web cache sends an “I see you” message which is captured by the FortiGate unit.

Question 28 : Which back-end servers can be used to provide recipient verification?
Answer : LDAP servers, and SMTP servers.

Question 29 : An e-mail message, received by the FortiMail unit is subject to the bounce verification, Antispam check, under which circumstances?
Answer : The envelope MAIL FROM field contains a null reverse-path when a Bounce Verification key is created and activated.