NSE6_FSW-7.2 Fortinet Practice Test Questions and Exam Dumps


Question No 1:

Refer to the diagnostic output: Two entries in the exhibit show that the same MAC address has been used in two different VLANs. Which MAC address is shown in the above output?

A. It is a MAC address of FortiLink interface on FortiGate.
B. It is a MAC address of a switch that accepts multiple VLANs.
C. It is a MAC address of an upstream FortiSwitch.
D. It is a MAC address of FortiGate in HA configuration.

Answer: C

Explanation:

When you see the same MAC address used in two different VLANs in the diagnostic output, it's important to consider the network architecture and how MAC addresses are typically managed in such environments.

The MAC address shown in the output most likely belongs to a FortiSwitch. Specifically, an upstream FortiSwitch is responsible for handling traffic for multiple VLANs, and it may have interfaces that support these multiple VLANs simultaneously. In these cases, the MAC address for the switch's interface handling the VLANs can appear in multiple VLAN contexts.

Here’s why C is the correct answer:

  • FortiLink interface on FortiGate (A): While FortiLink interfaces connect FortiGate devices to FortiSwitches, the MAC addresses you would expect to see for FortiLink interfaces are typically not seen across multiple VLANs in the manner described in the output. FortiLink interfaces typically have a single MAC address for the dedicated interface in use, not shared across multiple VLANs.

  • A switch that accepts multiple VLANs (B): This is plausible, but the MAC address wouldn't typically be the same across VLANs unless the switch is in a trunking or aggregation configuration, and the device involved is a FortiSwitch. In this case, it's more likely to be the FortiSwitch rather than a generic switch handling multiple VLANs.

  • Upstream FortiSwitch (C): A FortiSwitch, particularly when configured with multiple VLANs, may show the same MAC address across different VLAN interfaces. This is due to the way the switch manages traffic for multiple VLANs on its trunk or aggregated interface. A single interface on the FortiSwitch can handle traffic for many VLANs and will show up in the MAC address table under each of these VLANs, making this the most likely scenario for the given output.

  • FortiGate in HA configuration (D): High Availability (HA) configurations for FortiGate devices typically involve unique MAC addresses per unit in the HA cluster. In an HA setup, a single MAC address should not appear across different VLANs unless there’s a specific setup for virtual MAC addresses used in HA, but even then, the appearance of the same MAC address in multiple VLANs is more likely to be a result of switch behavior, not the HA configuration itself.

Therefore, the MAC address appearing in multiple VLANs is most likely that of the upstream FortiSwitch, which handles traffic for these VLANs and appears in the MAC address table for each VLAN. Hence, the correct answer is C.

Question No 2:

Core-1 and Access-1 are managed and authorized by FortiGate-1, which uses port4 as the FortLink interface. After FortiGate authorizes and manages Core-2, port1 status becomes STP discarding. 

Why is port1 in the discarding state?

A. port1 on Core-2 is discarding only management traffic.
B. Core-1 and Core-2 do not have MCLAG configuration.
C. Access-1 is the root bridge and can only have one root port.
D. Core-2 has the lowest bridge priority.

Correct Answer: B

Explanation:

The Spanning Tree Protocol (STP) is used to prevent loops in network topologies by selectively blocking certain paths. When a port is in the discarding state, it means that the port is temporarily blocked from forwarding traffic in order to avoid a loop in the network topology. Let’s break down the potential causes for why port1 on Core-2 is in the STP discarding state:

Option A: port1 on Core-2 is discarding only management traffic.

This option is not correct because STP operates on the entire traffic path, not just on management traffic. When a port is in the discarding state due to STP, it means that it is blocked for all types of traffic (not limited to management traffic). This is part of the loop-prevention mechanism, which applies across all traffic.

Option B: Core-1 and Core-2 do not have MCLAG configuration.

This is the correct answer. MCLAG (Multi-Chassis Link Aggregation) is a configuration used to create redundancy between two devices (in this case, Core-1 and Core-2). Without an MCLAG configuration, Core-1 and Core-2 may appear as two separate root bridges to the network. In such a case, STP will block certain ports to prevent loops, and in this scenario, port1 on Core-2 is likely being blocked because it is part of a potential loop caused by the lack of MCLAG. The absence of MCLAG means that the network topology is being managed by standard STP rules, where ports are put into a discarding state to break the loop.

Option C: Access-1 is the root bridge and can only have one root port.

While it's true that the root bridge has one root port, this is not the main reason for the discarding state of port1 on Core-2. STP designates a single root port on a non-root bridge (like Core-2), but if there is redundancy in the network, there are mechanisms like STP to manage the alternate paths. The issue is more about the lack of proper redundancy (like MCLAG) than the root port being limited to one.

Option D: Core-2 has the lowest bridge priority.

The bridge priority in STP determines which switch becomes the root bridge. However, the lowest priority does not directly result in a port being in the discarding state. If Core-2 has the lowest bridge priority, it would make Core-2 the root bridge, but the issue here is related to how the network topology is being managed (especially the lack of MCLAG), not the priority of Core-2 in the STP calculation.

The correct reason why port1 on Core-2 is in the discarding state is due to the lack of MCLAG configuration between Core-1 and Core-2. Without MCLAG, the network topology causes STP to block port1 on Core-2 to prevent a loop. Therefore, B is the correct answer.

Question No 3:

Which two statements about the FortiLink authorization process are true? (Choose two.)

A. The administrator must manually pre-authorize FortiGate on FortiSwitch by adding the FortiGate serial number.
B. FortiSwitch requires a reboot to complete the authorization process.
C. FortiLink frame is sent by FortiGate to FortiSwitch to complete the authorization.
D. FortiLink authorization sets the FortiSwitch management mode to FortiLink.

Correct answer: C, D

Explanation:

In the FortiLink authorization process, the goal is to authorize the FortiSwitch to be managed by the FortiGate device through the FortiLink protocol. Let's break down the two correct statements:

Option C: FortiLink frame is sent by FortiGate to FortiSwitch to complete the authorization.

This is a correct statement. FortiGate sends a FortiLink frame to the FortiSwitch to establish a communication link and complete the authorization process. This frame helps FortiSwitch recognize the FortiGate as its management device and ensures that the proper management connection is set up. The FortiLink frame is an essential part of this process, as it allows FortiGate to control and manage the FortiSwitch through the FortiLink interface.

Option D: FortiLink authorization sets the FortiSwitch management mode to FortiLink.

This is another correct statement. During the FortiLink authorization process, the management mode of the FortiSwitch is set to FortiLink, meaning that the FortiSwitch will be managed and controlled by the FortiGate device through the FortiLink protocol. This mode allows the FortiGate to handle the configuration and management tasks for the FortiSwitch.

Option A: The administrator must manually pre-authorize FortiGate on FortiSwitch by adding the FortiGate serial number.

This is incorrect. In the FortiLink authorization process, manual pre-authorization by adding the serial number of the FortiGate is typically not required. The process is automated, and FortiSwitch will automatically discover and communicate with the FortiGate to complete the authorization. The administrator might configure settings like VLANs or interfaces but doesn't typically need to manually add the FortiGate serial number.

Option B: FortiSwitch requires a reboot to complete the authorization process.

This is incorrect. FortiSwitch does not require a reboot to complete the authorization process. The FortiLink authorization process involves the FortiGate and FortiSwitch communicating and configuring each other, but it doesn't necessitate a reboot of the FortiSwitch. The process is designed to be seamless and does not require downtime or reboots for authorization to take effect.

The correct answers are C and D. These statements accurately describe the FortiLink authorization process, where FortiGate sends a FortiLink frame to the FortiSwitch, and the FortiSwitch management mode is set to FortiLink for centralized management.

Question No 4:

Traffic arriving on port2 on FortiSwitch is tagged with VLAN ID 10 and destined for PC1 connected on port1. PC1 expects to receive traffic untagged from port1 on FortiSwitch. 

Which two configurations can you perform on FortiSwitch to ensure PC1 receives untagged traffic on port1? (Choose two.)

A. Add the MAC address of PC1 as a member of VLAN 10.
B. Add VLAN ID 10 as a member of the untagged VLANs on port1.
C. Remove VLAN 10 from the allowed VLANs and add it to untagged VLANs on port1.
D. Enable Private VLAN on VLAN 10 and add VLAN 20 as an isolated VLAN.

Correct Answer: B, C

Explanation:

To ensure that PC1 receives untagged traffic on port1, we need to ensure that the traffic on port1 is untagged, even if it's arriving tagged on port2. Here's a breakdown of the configurations and why the correct answers are B and C:

  • A. Add the MAC address of PC1 as a member of VLAN 10.
    This option is incorrect because adding a MAC address as a member of a VLAN does not relate to how the traffic is tagged or untagged. VLAN membership typically refers to physical or virtual ports and not individual devices' MAC addresses in this context. The task is to configure the switch ports to handle the traffic in the way that PC1 expects it, not to associate MAC addresses with VLANs.

  • B. Add VLAN ID 10 as a member of the untagged VLANs on port1.
    This option is correct. In FortiSwitch, configuring a port to allow traffic for a particular VLAN as untagged means that the traffic arriving at that port will be untagged even if it's tagged with the VLAN ID on other ports. By adding VLAN 10 as a member of the untagged VLANs on port1, we ensure that PC1, which expects untagged traffic, receives it as such, even though the traffic from port2 may be tagged.

  • C. Remove VLAN 10 from the allowed VLANs and add it to untagged VLANs on port1.
    This option is correct. By removing VLAN 10 from the allowed VLANs on port1 and explicitly adding it to the untagged VLANs, you ensure that the traffic on port1 will be treated as untagged, which is what PC1 expects. This approach ensures that the traffic arriving on port2, tagged with VLAN ID 10, will be untagged when it reaches port1.

  • D. Enable Private VLAN on VLAN 10 and add VLAN 20 as an isolated VLAN.
    This option is incorrect. Enabling Private VLANs (PVLANs) is typically used for isolating traffic between devices within the same VLAN. It does not directly affect whether traffic is tagged or untagged on specific ports. Private VLAN configurations are usually more relevant for managing isolation within a single VLAN rather than addressing the issue of untagged traffic.

In conclusion, the correct way to ensure PC1 receives untagged traffic is to configure port1 to handle VLAN 10 as an untagged VLAN. Both B and C help achieve this configuration by making sure the traffic is untagged on port1, allowing PC1 to receive the traffic as expected.

Question No 5:

Port1 and port2 are the only ports configured with the same native VLAN 10. What are two reasons that can trigger port1 to shut down? (Choose two.)

A. port1 was shut down by loop guard protection.
B. STP triggered a loop and applied loop guard protection on port1.
C. An endpoint sent a BPDU on port1 that it received from another interface.
D. Loop guard frame sourced from port1 was received on port1.

Answer: B, C

Explanation:

To answer this question, we need to understand the role of Loop Guard protection and Spanning Tree Protocol (STP) in network topology. Let’s break down each of the options to see why B and C are the correct answers.

  • A. port1 was shut down by loop guard protection.
    This option is misleading because Loop Guard itself does not directly shut down a port. Loop Guard is designed to prevent a port from transitioning to the loop inconsistent state in a network that might be affected by a STP failure. However, Loop Guard does not actually shut down a port; instead, it prevents a port from becoming part of a topology loop by blocking it if it detects that no BPDUs are received, which is a potential sign of a loop. Therefore, this answer is incorrect because Loop Guard does not typically trigger a shutdown on the port itself.

  • B. STP triggered a loop and applied loop guard protection on port1.
    This is a correct answer because if Spanning Tree Protocol (STP) detects a loop in the network, it may use Loop Guard to block the port that is suspected of being involved in the loop. If STP sees a topology change that could create a loop, it might block or disable ports to break the loop. Loop Guard would then prevent the port from becoming part of the loop by applying protection to the port, which can lead to the port shutting down to avoid the network instability caused by the loop. Thus, B is a valid reason for port1 to shut down.

  • C. An endpoint sent a BPDU on port1 that it received from another interface.
    This option is also a correct answer. In normal network conditions, an endpoint device should not send BPDUs, as BPDUs are typically sent by network switches for spanning tree purposes. If an endpoint mistakenly sends a BPDU on port1, it can cause an STP protocol violation. In such a case, if the switch detects that a BPDU has been received on a port where it should not be originating from (such as a port connected to an endpoint device), it will trigger an STP topology change and potentially shut down the port to protect the network from instability. This is a condition known as BPDU guard or BPDU filtering, which can shut down the port upon detection of such an event. Therefore, this is a valid reason for port1 to shut down.

  • D. Loop guard frame sourced from port1 was received on port1.
    This option is not correct. Loop Guard protects a port by preventing it from transitioning into the inconsistent state if it no longer receives BPDUs. However, Loop Guard does not involve "loop guard frames" being sourced from the port itself. If a loop guard frame is received on port1 from another port or device, it would not typically result in the port shutting down. Instead, the port would be protected from loops, but not shut down directly due to the receipt of a Loop Guard frame.

In summary, the correct answers are B (STP triggered a loop and applied loop guard protection on port1) and C (An endpoint sent a BPDU on port1 that it received from another interface) because these conditions can cause port1 to shut down due to network instability and protocol violations.

Question No 6:

What makes the use of the sniffer command on the FortiSwitch CLI unreliable on port 23?

A. The types of packets captured is limited.
B. Just the port egress payloads are printed on CLI.
C. Only untagged VLAN traffic can be captured.
D. The switch port might be used as a trunk member.

Answer: D

Explanation:

In networking, sniffer commands are used to capture and analyze network traffic, which can be helpful for troubleshooting or understanding how data flows through a network. The FortiSwitch CLI provides tools for running sniffer commands to capture packets on specific ports, allowing users to inspect traffic for various purposes.

In the given context, the sniffer command on port 23 might be unreliable due to a few potential reasons. Let’s examine each option to identify the correct cause:

  • A. The types of packets captured is limited.
    This could be a valid reason for certain sniffer tools not capturing all traffic, but it’s not the primary cause of the unreliability of the sniffer command on port 23. While sniffer tools may have limitations in terms of the types of packets they can capture, this is not a specific issue tied to port 23. The question suggests there is something unique about port 23 that makes the sniffer command unreliable, which is more likely due to a configuration issue with the port rather than a limitation of the sniffer itself.

  • B. Just the port egress payloads are printed on CLI.
    This option suggests that only outgoing (egress) traffic on the port is captured and displayed by the sniffer command. While this could limit the visibility of incoming traffic, it does not specifically explain why port 23 would behave differently than other ports. The limitation described here is not inherently tied to port 23, so it is unlikely the main cause of the issue.

  • C. Only untagged VLAN traffic can be captured.
    This option suggests that the sniffer can only capture traffic from untagged VLANs. While this could be a limitation in certain situations, port 23 might still be able to capture other types of traffic, including tagged VLAN traffic, depending on the configuration. So, this limitation is unlikely to explain why port 23’s sniffer command would be unreliable.

  • D. The switch port might be used as a trunk member.
    This is the most likely cause of the unreliability. If port 23 is configured as a trunk port, it can carry traffic for multiple VLANs, including both tagged and untagged traffic. When a port is set as a trunk, it may not forward all traffic to the sniffer command in a way that’s easy to capture, especially if the sniffer is not specifically configured to handle trunked VLAN traffic. A trunk port sends traffic for multiple VLANs, and some of this traffic might not be visible or accessible without further configuration of the sniffer command, leading to unreliable results. This explains why the sniffer might not work properly on port 23 if it’s a trunk port.

Thus, the answer is D, as the use of a trunk port on port 23 makes the sniffer command unreliable due to the complexity of handling multiple VLANs, especially when the sniffer is not set up to properly capture traffic from all these VLANs.

Question No 7:

Which interfaces on FortiSwitch send out FortiLink discovery frames by default in order to detect a FortiGate with an enabled FortiLink interface?

A. All ports have auto-discovery enabled by default
B. No ports are enabled by default for auto-discovery. This must be configured under config switch interface
C. The ports with auto-discovery enabled by default are dependent upon the FortiSwitch model
D. The last four switch ports on FortiSwitch have auto-discovery by default

Answer: C

Explanation:

FortiSwitches are part of the Fortinet network equipment ecosystem that integrates tightly with FortiGate devices. One of the features of this integration is the FortiLink interface, which is used to link FortiSwitch devices to a FortiGate for centralized management and security.

The FortiLink discovery process is initiated by the FortiSwitch to find and establish a connection with the FortiGate, and this process is facilitated by sending out FortiLink discovery frames. These frames help the FortiSwitch identify a FortiGate device that has an enabled FortiLink interface. However, not all ports on the FortiSwitch send out these discovery frames by default.

Now, let's review the options:

  • A. All ports have auto-discovery enabled by default: This is not accurate. By default, not all ports on the FortiSwitch are configured to send FortiLink discovery frames. The feature is more selective and depends on the FortiSwitch model, so this option is incorrect.

  • B. No ports are enabled by default for auto-discovery. This must be configured under config switch interface: This statement is also not correct. While it is true that you may need to configure some settings manually depending on the setup, FortiSwitches do have certain ports configured by default for auto-discovery without needing to configure them manually from the start.

  • C. The ports with auto-discovery enabled by default are dependent upon the FortiSwitch model: This is the correct answer. The ports on a FortiSwitch that send out FortiLink discovery frames are determined by the FortiSwitch model. Different models of FortiSwitch may have different ports pre-configured for this feature. The exact ports that are configured for auto-discovery can vary based on the specific FortiSwitch model, making this option the most accurate.

  • D. The last four switch ports on FortiSwitch have auto-discovery by default: This statement is not generally true. The configuration for FortiLink discovery is not strictly tied to the last four ports on the switch, so this answer is incorrect.

In summary, the correct answer is C, as the specific ports that send out FortiLink discovery frames by default depend on the FortiSwitch model in use. This allows FortiLink integration to work effectively out of the box on many FortiSwitch devices.

Question No 8:

Which LLDP-MED Type-Length-Values does FortiSwitch collect from endpoints to track network devices and determine their characteristics?

A. Network policy
B. Power management
C. Location
D. Inventory management

Answer: D

Explanation:

LLDP-MED (Link Layer Discovery Protocol - Media Endpoint Discovery) is an extension of LLDP (Link Layer Discovery Protocol) that is specifically designed for managing media devices in a network, such as VoIP phones and other network endpoints. It allows network devices to share important information about themselves, helping network administrators to monitor and manage devices more effectively. FortiSwitch, like other managed switches, uses LLDP-MED to gather a variety of Type-Length-Value (TLV) information from endpoints connected to the network.

LLDP-MED defines several TLVs, and each TLV provides specific types of information about network devices. The four options in the question represent different types of information that can be communicated using LLDP-MED:

  • Network Policy (A): This TLV typically includes information related to the network configuration policies for devices, such as VLAN and Quality of Service (QoS) settings. However, FortiSwitch primarily focuses on other TLVs for tracking devices and their characteristics.

  • Power Management (B): The Power Management TLV is used to communicate power-related information, such as the power requirements of a device, especially important for devices like VoIP phones that rely on Power over Ethernet (PoE). This is important, but not the primary focus of FortiSwitch when tracking devices for their characteristics.

  • Location (C): This TLV contains information related to the location of the device, which can be useful for physical network mapping. However, location tracking is not typically a core focus for FortiSwitch when it comes to gathering information about endpoints.

  • Inventory Management (D): The Inventory Management TLV is specifically used to track and manage the inventory of devices connected to the network. This includes information like device IDs, serial numbers, model numbers, and capabilities. This TLV is critical for network administrators to track devices and determine their characteristics, such as hardware details and versioning, making it the key TLV for FortiSwitch in managing and monitoring endpoints.

Given that inventory management is the most relevant for tracking network devices and determining their characteristics, the correct answer is D: Inventory management.

Question No 9:

What two conclusions can be made regarding DHCP snooping configuration? (Choose two.)

A. Maximum value to accept clients DHCP request is configured as per DHCP server range.
B. Fortiswitch is configured to trust DHCP replies coming on FortLink interface.
C. DHCP clients that are trusted by DHCP snooping configured is only one.
D. Global configuration for DHCP snooping is set to forward DHCP client requests on all ports in the VLAN.

Answer: B, D

Explanation:

When configuring DHCP snooping, the goal is to prevent unauthorized devices from issuing DHCP replies to clients within a network, which can lead to malicious attacks or network misconfigurations. There are several key conclusions one can draw about how the configuration of DHCP snooping impacts the network.

Option A: "Maximum value to accept clients DHCP request is configured as per DHCP server range" – This statement is incorrect. DHCP snooping doesn’t set the maximum value to accept client DHCP requests based on the DHCP server's range. Instead, DHCP snooping primarily ensures that only valid DHCP servers can respond to requests by inspecting and filtering DHCP messages, typically based on trust settings for specific interfaces.

Option B: "Fortiswitch is configured to trust DHCP replies coming on FortLink interface" – This statement is correct. When configuring DHCP snooping, certain interfaces are configured as "trusted" while others are set to "untrusted." Trusted interfaces are those where legitimate DHCP servers are expected to respond to clients (like the FortLink interface, in this case). DHCP snooping allows for the configuration of trust relationships on specific ports to ensure that only trusted DHCP replies are accepted from trusted sources.

Option C: "DHCP clients that are trusted by DHCP snooping configured is only one" – This statement is incorrect. DHCP snooping does not limit trusted DHCP clients to only one. Instead, it configures trusted interfaces and ensures that only legitimate DHCP servers, not clients, are allowed to send DHCP offers. The concept of a "trusted client" doesn't apply directly within the DHCP snooping configuration since the focus is on trusting servers, not individual clients.

Option D: "Global configuration for DHCP snooping is set to forward DHCP client requests on all ports in the VLAN" – This statement is correct. By default, DHCP snooping is enabled globally and is typically configured to inspect and forward DHCP requests from all ports within a particular VLAN, unless specified otherwise. The configuration ensures that DHCP requests and offers are processed and monitored across the network to prevent unauthorized DHCP servers from responding.

In summary, DHCP snooping helps safeguard the network by enforcing trust levels for interfaces and by limiting which DHCP servers are allowed to respond, ensuring that only legitimate DHCP servers assign IP addresses to clients. Hence, the correct answers are B and D.

Question No 10:

What are two reasons why time synchronization between FortiGate and its managed FortiSwitch is critical in switch management? (Choose two.)

A. FortiSwitch does not retain its time after a reboot, which gets reset after each reboot.
B. FortiSwitch will not be able to become an NTP server for downstream devices.
C. FortiSwitch cannot complete the DTLS handshake used in the CAPWAP tunnel.
D. FortiSwitch will not allow other FortiSwitch devices in the chain be discovered by FortiGate.

Correct answer: A, C

Explanation:

Time synchronization between FortiGate and FortiSwitch is essential for several reasons related to device management, security protocols, and operational functionality.

  1. FortiSwitch does not retain its time after a reboot, which gets reset after each reboot (A):
    When FortiSwitch reboots, it resets its internal clock if time synchronization is not established. This can cause various issues, as accurate timestamps are crucial for logging, event correlation, and maintaining proper operation schedules. Without proper time, logs cannot be reliably used for troubleshooting or auditing, and any time-sensitive configurations (e.g., scheduled tasks) may fail to execute correctly. Therefore, maintaining accurate time synchronization between FortiGate and FortiSwitch ensures that the switch operates efficiently after rebooting and avoids misalignment in time-based processes.

  2. FortiSwitch cannot complete the DTLS handshake used in the CAPWAP tunnel (C):
    In the context of network security, FortiGate and FortiSwitch often communicate over a CAPWAP (Control and Provisioning of Wireless Access Points) tunnel, which relies on secure communication protocols like DTLS (Datagram Transport Layer Security). DTLS, like other cryptographic protocols, depends on synchronized time to establish valid certificates and perform secure handshakes. If the times between FortiGate and FortiSwitch are not aligned, the DTLS handshake could fail, leading to a disruption in secure communication and management capabilities between the devices. Therefore, time synchronization is critical for maintaining secure and effective communication within the network.

The other options do not directly relate to time synchronization:

  • FortiSwitch will not be able to become an NTP server for downstream devices (B): This statement is incorrect because the FortiSwitch can function as an NTP server regardless of whether it is synchronized with FortiGate. NTP (Network Time Protocol) servers on switches or other network devices do not rely on FortiGate synchronization to provide time to downstream devices.

  • FortiSwitch will not allow other FortiSwitch devices in the chain be discovered by FortiGate (D): This option is unrelated to time synchronization. The discovery of other FortiSwitch devices by FortiGate typically involves network connectivity and configuration settings, not time synchronization. While time synchronization is important for overall device performance, it does not directly impact the discovery process of switches in the management chain.

In conclusion, accurate time synchronization between FortiGate and FortiSwitch ensures proper functioning of security protocols and consistent device behavior, particularly after reboots and during encrypted communications.


UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.