New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE6_FSW-7.2 Exam - Topic 5 Question 19 Discussion

Actual exam question for Fortinet's NSE6_FSW-7.2 exam
Question #: 19
Topic #: 5
[All NSE6_FSW-7.2 Questions]

Which two statements about DHCP snooping enabled on a FortiSwitch VLAN are true? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Alayna
3 months ago
C is a bit surprising, I thought it would be more secure by default.
upvoted 0 times
...
Lisandra
3 months ago
D sounds right, I've only seen it in the CLI.
upvoted 0 times
...
Paulina
3 months ago
Wait, are all ports really set to forward by default?
upvoted 0 times
...
Rashida
4 months ago
I disagree with A, it doesn't work that way.
upvoted 0 times
...
Yuki
4 months ago
I think option B is definitely true.
upvoted 0 times
...
Cletus
4 months ago
I vaguely remember something about option 82 settings needing CLI configuration, but I can't remember if that's a strict rule or just a common practice.
upvoted 0 times
...
Arthur
4 months ago
I practiced a question similar to this, and I feel like option C might be true since untrusted ports usually forward requests by default.
upvoted 0 times
...
Christiane
4 months ago
I think option B sounds right because verifying the MAC address does help prevent attacks, but I can't recall if that's the exact command used.
upvoted 0 times
...
Bernardo
5 months ago
I remember studying DHCP snooping, but I'm not sure if enabling it really lets all servers see requests and replies. That seems a bit off.
upvoted 0 times
...
Shaquana
5 months ago
I remember learning about DHCP option 82 in class, but I'm not sure if that's relevant here. I'll have to read the question closely.
upvoted 0 times
...
Gilberto
5 months ago
Okay, let's see. I know DHCP snooping helps protect against DHCP attacks, so that's a good starting point.
upvoted 0 times
...
Louis
5 months ago
Hmm, I'm not too familiar with DHCP snooping on FortiSwitches. I'll need to think this through carefully.
upvoted 0 times
...
Luisa
5 months ago
This DHCP snooping question looks straightforward, I think I can handle it.
upvoted 0 times
...
Kenneth
5 months ago
The options mention things like verifying MAC addresses and forwarding DHCP requests. I'll need to make sure I understand how those features work.
upvoted 0 times
...
Pamella
9 months ago
With DHCP snooping, your network will be so secure, even the DHCP server won't know what's going on!
upvoted 0 times
...
Iraida
9 months ago
These DHCP snooping questions are like playing 'Where's Waldo' - gotta find the right answers hidden in all the noise!
upvoted 0 times
Alease
9 months ago
B) switch-controller-dhcp-snooping-verify-mac verifies the destination MAC address to protect against DHCP exhaustion attacks.
upvoted 0 times
...
Stefany
9 months ago
A) Enabling DHCP snooping on a FortiSwitch VLAN ensures requests and replies are seen by all DHCP servers.
upvoted 0 times
...
...
Gerald
9 months ago
C is wrong. By default, all FortiSwitch ports are set to untrusted, not forwarding client requests.
upvoted 0 times
Carmelina
9 months ago
B) switch-controller-dhcp-snooping-verify-mac verifies the destination MAC address to protect against DHCP exhaustion attacks.
upvoted 0 times
...
Milly
9 months ago
A) Enabling DHCP snooping on a FortiSwitch VLAN ensures requests and replies are seen by all DHCP servers.
upvoted 0 times
...
...
Jamey
10 months ago
A is incorrect. DHCP snooping only inspects DHCP traffic on the local VLAN, not all DHCP servers. But I like the idea of a 'DHCP eavesdropping' mode!
upvoted 0 times
Jill
9 months ago
switch-controller-dhcp-snooping-verify-mac verifies the destination MAC address to protect against DHCP exhaustion attacks.
upvoted 0 times
...
Reena
9 months ago
A is incorrect. DHCP snooping only inspects DHCP traffic on the local VLAN, not all DHCP servers.
upvoted 0 times
...
France
10 months ago
By default, all FortiSwitch ports are set to forward client DHCP requests to untrusted ports.
upvoted 0 times
...
Jerrod
10 months ago
Enabling DHCP snooping on a FortiSwitch VLAN ensures requests and replies are seen by all DHCP servers.
upvoted 0 times
...
...
Geoffrey
10 months ago
B and D are correct. DHCP snooping helps protect against DHCP exhaustion attacks, and option 82 settings are only configurable through the CLI.
upvoted 0 times
Nieves
10 months ago
That's good to know. It's important to have these security measures in place to protect the network.
upvoted 0 times
...
Deangelo
10 months ago
B and D are correct. DHCP snooping helps protect against DHCP exhaustion attacks, and option 82 settings are only configurable through the CLI.
upvoted 0 times
...
...
Buddy
10 months ago
I'm not sure about option B and D. Can someone explain why switch-controller-dhcp-snooping-verify-mac is used to protect against DHCP exhaustion attacks?
upvoted 0 times
...
Meghann
10 months ago
I agree with Gilma. Option C is also true because by default, all FortiSwitch ports forward client DHCP requests to untrusted ports.
upvoted 0 times
...
Gilma
11 months ago
I think option A is true because enabling DHCP snooping ensures requests and replies are seen by all DHCP servers.
upvoted 0 times
...

Save Cancel