NSE4 - FGT-6.0 Februar 2020
NSE4 - FGT-6.0 Februar 2020
NSE4 - FGT-6.0 Februar 2020
126q
Number: NSE4_FGT-6.0
Passing Score: 800
Time Limit: 120 min
File Version: 3.3
NSE4_FGT-6.0
Version 3.3
Exam A
QUESTION 1
What files are sent to FortiSandbox for inspection in flow-based inspection mode?
A. All suspicious files that do not have their hash value in the FortiGuard antivirus signature database.
B. All suspicious files that are above the defined oversize limit value in the protocol options.
C. All suspicious files that match the name patterns defined in the antivirus profile.
D. All suspicious files that are allowed to be submitted to FortiSandbox in the antivirus profile.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which statements about a One-to-One IP pool are true? (Choose two.)
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which of the following FortiGate configuration tasks will create a route in the policy route table? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
A company needs to provide SSL VPN access to two user groups. The company also needs to display
different welcome messages on the SSL VPN login screen for both user groups.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
An administrator is investigating a report of users having intermittent issues with browsing the web. The
administrator ran diagnostics and received the output shown in the exhibit.
Examine the diagnostic output shown exhibit. Which of the following options is the most likely cause of this
issue?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
An administrator has configured central DNAT and virtual IPs. Which of the following can be selected in the
firewall policy Destination field?
A. A VIP group
B. The mapped IP address object of the VIP object
C. A VIP object
D. An IP pool
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
An administrator needs to strengthen the security for SSL VPN access. Which of the following statements are
best practices to do so? (Choose three.)
Explanation/Reference:
QUESTION 8
Which statement about FortiGuard services for FortiGate is true?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Which of the following route attributes must be equal for static routes to be eligible for equal cost multipath
(ECMP) routing? (Choose two.)
A. Priority
B. Metric
C. Distance
D. Cost
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
View the exhibit.
Based on this output, which statements are correct? (Choose two.)
A. The all VDOM is not synchronized between the primary and secondary FortiGate devices.
B. The root VDOM is not synchronized between the primary and secondary FortiGate devices.
C. The global configuration is synchronized between the primary and secondary FortiGate devices.
D. The FortiGate devices have three VDOMs.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
Which statement is true regarding the policy ID number of a firewall policy?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
An administrator wants to block HTTP uploads. Examine the exhibit, which contains the proxy address created
for that purpose.
Where must the proxy address be used?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
Which statement is true regarding SSL VPN timers? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Which of the following conditions must be met in order for a web browser to trust a web server certificate
signed by a third-party CA?
A. The public key of the web server certificate must be installed on the browser.
B. The web-server certificate must be installed on the browser.
C. The CA certificate that signed the web-server certificate must be installed on the browser.
D. The private key of the CA certificate that signed the browser certificate must be installed on the browser.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
When using SD-WAN, how do you configure the next-hop gateway address for a member interface so that
FortiGate can forward Internet traffic?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Which of the following services can be inspected by the DLP profile? (Choose three.)
A. NFS
B. FTP
C. IMAP
D. CIFS
E. HTTP-POST
Explanation/Reference:
QUESTION 17
Which of the following statements describe WMI polling mode for the FSSO collector agent? (Choose two.)
A. The NetSessionEnum function is used to track user logoffs.
B. WMI polling can increase bandwidth usage in large networks.
C. The collector agent uses a Windows API to query DCs for user logins.
D. The collector agent does not need to search any security event logs.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Which statements about DNS filter profiles are true? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
An administrator has configured a dialup IPsec VPN with XAuth. Which statement best describes what occurs
during this scenario?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
An administrator has configured two VLAN interfaces:
A DHCP server is connected to the VLAN10 interface. A DHCP client is connected to the VLAN5 interface.
However, the DHCP client cannot get a dynamic IP address from the DHCP server. What is the cause of the
problem?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Which of the following statements about virtual domains (VDOMs) are true? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
You are configuring the root FortiGate to implement the security fabric. You are configuring port10 to
communicate with a downstream FortiGate. View the default Edit Interface in the exhibit below:
When configuring the root FortiGate to communicate with a downstream FortiGate, which settings are required
to be configured? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
What FortiGate components are tested during the hardware test? (Choose three.)
A. Administrative access
B. HA heartbeat
C. CPU
D. Hard disk
E. Network interfaces
Explanation/Reference:
QUESTION 24
Which statements correctly describe transparent mode operation? (Choose three.)
A. All interfaces of the transparent mode FortiGate device must be on different IP subnets.
B. Ethernet packets are forwarded based on destination MAC addresses, not IP addresses.
C. The transparent FortiGate is visible to network hosts in an IP traceroute.
D. It permits inline traffic inspection and firewalling without changing the IP scheme of the network.
E. FortiGate acts as transparent bridge and forwards traffic at Layer 2.
Explanation/Reference:
QUESTION 25
View the exhibit.
A. This setup requires at least two firewall policies with the action set to IPsec.
B. Dead peer detection must be disabled to support this type of IPsec setup.
C. The TunnelB route is the primary route for reaching the remote site. The TunnelA route is used only if the
TunnelB VPN is down.
D. This is a redundant IPsec setup.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
Which one of the following processes is involved in updating IPS from FortiGuard?
A. FortiGate IPS update requests are sent using UDP port 443.
B. Protocol decoder update requests are sent to service.fortiguard.net.
C. IPS signature update requests are sent to update.fortiguard.net.
D. IPS engine updates can only be obtained using push updates.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
How does FortiGate select the central SNAT policy that is applied to a TCP session?
A. It selects the SNAT policy specified in the configuration of the outgoing interface.
B. It selects the first matching central SNAT policy, reviewing from top to bottom.
C. It selects the central SNAT policy with the lowest priority.
D. It selects the SNAT policy specified in the configuration of the firewall policy that matches the traffic.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
Which of the following conditions are required for establishing an IPsec VPN between two FortiGate devices?
(Choose two.)
A. If XAuth is enabled as a server in one peer, it must be enabled as a client in the other peer.
B. If the VPN is configured as route-based, there must be at least one firewall policy with the action set to
IPsec.
C. If the VPN is configured as DialUp User in one peer, it must be configured as either Static IP Address or
Dynamic DNS in the other peer.
D. If the VPN is configured as a policy-based in one peer, it must also be configured as policy-based in the
other peer.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Which of the following statements about conserve mode are true? (Choose two.)
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
View the exhibit.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Examine the network diagram and the existing FGT1 routing table shown in the exhibit, and then answer the
following question:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Which configuration objects can be selected for the Source field of a firewall policy? (Choose two.)
A. Firewall service
B. User or user group
C. IP Pool
D. FQDN address
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
View the exhibit.
Which users and user groups are allowed access to the network through captive portal?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
NGFW mode allows policy-based configuration for most inspection rules. Which security profile’s configuration
does not change when you enable policy-based inspection?
A. Web filtering
B. Antivirus
C. Web proxy
D. Application control
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
During the digital verification process, which security requirement satisfies comparing the original and fresh
hash results?
A. Authentication.
B. Data integrity.
C. Non-repudiation.
D. Signature verification.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
An administrator wants to throttle the total volume of SMTP sessions to their email server. Which of the
following DoS sensors can be used to achieve this?
A. tcp_port_scan
B. ip_dst_session
C. udp_flood
D. ip_src_session
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Why must you use aggressive mode when a local FortiGate IPsec gateway hosts multiple dialup tunnels?
A. In aggressive mode, the remote peers are able to provide their peer IDs in the first message.
B. FortiGate is able to handle NATed connections only in aggressive mode.
C. FortiClient only supports aggressive mode.
D. Main mode does not support XAuth for user authentication.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
Examine this output from a debug flow:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
View the exhibit:
The client cannot connect to the HTTP web server. The administrator ran the FortiGate built-in sniffer and got
the following output:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
An employee connects to https://example.com on the Internet using a web browser. The web server’s
certificate was signed by a private internal CA. The FortiGate that is inspecting this traffic is configured for full
SSL inspection.
This exhibit shows the configuration settings for the SSL/SSH inspection profile that is applied to the policy that
is invoked in this instance. All other settings are set to defaults. No certificates have been imported into
FortiGate. View the exhibit and answer the question that follows.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
Examine this FortiGate configuration:
How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires
authorization?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
Examine the exhibit, which shows the output of a web filtering real time debug.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
Which of the following statements are best practices for troubleshooting FSSO? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
When override is enabled, which of the following shows the process and selection criteria that are used to
elect the primary FortiGate in an HA cluster?
A. Connected monitored ports > HA uptime > priority > serial number
B. Priority > Connected monitored ports > HA uptime > serial number
C. Connected monitored ports > priority > HA uptime > serial number
D. HA uptime > priority > Connected monitored ports > serial number
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
Examine the IPS sensor configuration shown in the exhibit, and then answer the question below.
What are the expected actions if traffic matches this IPS sensor? (Choose two.)
A. The sensor will gather a packet log for all matched traffic.
B. The sensor will not block attackers matching the A32S.Botnet signature.
C. The sensor will block all attacks for Windows servers.
D. The sensor will reset all connections that match these signatures.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
How can you block or allow access to Twitter using a firewall policy?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
Which statements about HA for FortiGate devices are true? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
An administrator is configuring an antivirus profile on FortiGate and notices that Proxy Options is not listed
under Security Profiles on the GUI. What can cause this issue?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
An administrator has configured a route-based IPsec VPN between two FortiGate devices. Which statement
about this IPsec VPN configuration is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
Examine the exhibit, which shows the partial output of an IKE real-time debug.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
If the Issuer and Subject values are the same in a digital certificate, which type of entity was the certificate
issued to?
A. A CRL
B. A person
C. A subordinate CA
D. A root CA
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
What settings must you configure to ensure FortiGate generates logs for web filter activity on a firewall policy
called Full Access? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
View the exhibit:
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
An administrator is attempting to allow access to https://fortinet.com through a firewall policy that is
configured with a web filter and an SSL inspection profile configured for deep inspection. Which of the
following are possible actions to eliminate the certificate error generated by deep inspection? (Choose two.)
A. Implement firewall authentication for all users that need access to fortinet.com.
B. Manually install the FortiGate deep inspection certificate as a trusted CA.
C. Configure fortinet.com access to bypass the IPS engine.
D. Configure an SSL-inspection exemption for fortinet.com.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
How does FortiGate verify the login credentials of a remote LDAP user?
A. FortiGate regenerates the algorithm based on the login credentials and compares it to the algorithm stored
on the LDAP server.
B. FortiGate sends the user-entered credentials to the LDAP server for authentication.
C. FortiGate queries the LDAP server for credentials.
D. FortiGate queries its own database for credentials.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
Which actions can be applied to each filter in the application control profile?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
View the exhibit.
Based on the configuration shown in the exhibit, what statements about application control behavior are true?
(Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
HTTP Public Key Pinning (HPKP) can be an obstacle to implementing full SSL inspection. What solutions
could resolve this problem? (Choose two.)
A. Enable Allow Invalid SSL Certificates for the relevant security profile.
B. Change web browsers to one that does not support HPKP.
C. Exempt those web sites that use HPKP from full SSL inspection.
D. Install the CA certificate (that is required to verify the web server certificate) in the certificate stores of
users’ computers.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Reference: https://cookbook.fortinet.com/exempting-google-ssl-inspection/
QUESTION 60
View the exhibit.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
Which of the following statements are true when using WPAD with the DHCP discovery method? (Choose
two.)
A. If the DHCP method fails, browsers will try the DNS method.
B. The browser needs to be preconfigured with the DHCP server’s IP address.
C. The browser sends a DHCPINFORM request to the DHCP server.
D. The DHCP server provides the PAC file for download.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
Examine the routing database shown in the exhibit, and then answer the following question:
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 63
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does FortiGate take?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 64
An administrator is running the following sniffer command:
A. IP header
B. Ethernet header
C. Packet payload
D. Application header
E. Interface name
Explanation/Reference:
QUESTION 65
Which of the following statements about the FSSO collector agent timers is true?
A. The workstation verify interval is used to periodically check if a workstation is still a domain member.
B. The IP address change verify interval monitors the server IP address where the collector agent is
installed, and updates the collector agent configuration if it changes.
C. The user group cache expiry is used to age out the monitored groups.
D. The dead entry timeout interval is used to age out entries with an unverified status.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 66
A FortiGate device has multiple VDOMs. Which statement about an administrator account configured with the
default prof_admin profile is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 67
Which of the following features is supported by web filter in flow-based inspection mode with NGFW mode set
to profile-based?
A. FortiGuard Quotas
B. Static URL
C. Search engines
D. Rating option
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
Examine the exhibit, which contains a virtual IP and firewall policy configuration.
The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port2) interface has the IP
address 10.0.1.254/24.
The first firewall policy has NAT enabled on the outgoing interface address. The second firewall policy is
configured with a VIP as the destination address.
Which IP address will be used to source NAT the Internet traffic coming from a workstation with the IP
address 10.0.1.10/24?
A. 10.200.1.10
B. Any available IP address in the WAN (port1) subnet 10.200.1.0/24
C. 10.200.1.1
D. 10.0.1.254
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 69
By default, when logging to disk, when does FortiGate delete logs?
A. 30 days
B. 1 year
C. Never
D. 7 days
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 70
Examine the exhibit, which contains a session diagnostic output.
Which of the following statements about the session diagnostic output is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as
the source of the HTTP request?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72
Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are
true? (Choose two.)
A. Log downloads from the GUI are limited to the current filter view
B. Log backups from the CLI cannot be restored to another FortiGate.
C. Log backups from the CLI can be configured to upload to FTP as a scheduled time
D. Log downloads from the GUI are stored as LZ4 compressed files.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 73
Examine the network diagram shown in the exhibit, then answer the following question:
Which one of the following routes is the best candidate route for FGT1 to route traffic from the Workstation to
the Web server?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 74
A team manager has decided that while some members of the team need access to particular website, the
majority of the team does not. Which configuration option is the most effective option to support this request?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
Examine this output from a debug flow:
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
Which statements about antivirus scanning mode are true? (Choose two.)
A. In proxy-based inspection mode antivirus buffers the whole file for scarring before sending it to the client.
B. In flow-based inspection mode, you can use the CLI to configure antivirus profiles to use protocol option
profiles.
C. In proxy-based inspection mode, if a virus is detected, a replacement message may not be displayed
immediately.
D. In quick scan mode, you can configure antivirus profiles to use any of the available signature data bases.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 77
In a high availability (HA) cluster operating in active-active mode, which of the following correctly describes the
path taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?
A. Client > primary FortiGate> secondary FortiGate> primary FortiGate> web server.
B. Client > secondary FortiGate> web server.
C. Clinet >secondary FortiGate> primary FortiGate> web server.
D. Client> primary FortiGate> secondary FortiGate> web server.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 78
An administrator is configuring an IPsec between site A and siteB. The Remotes Gateway setting in both sites
has been configured as Static IP Address. For site A, the local quick mode selector is 192.168.1.0/24 and the
remote quick mode selector is 192.168.2.0/24. How must the administrator configure the local quick mode
selector for site B?
A. 192.168.3.0/24
B. 192.168.2.0/24
C. 192.168.1.0/24
D. 192.168.0.0/8
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 79
Which of the following are purposes of NAT traversal in IPsec? (Choose two.)
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
Examine the two static routes shown in the exhibit, then answer the following question.
Which of the following is the expected FortiGate behavior regarding these two routes to the same destination?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
Refer to the following exhibit.
Why is FortiGate not blocking the test file over FTP download?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 82
View the following exhibit, which shows the firewall policies and the object uses in the firewall policies.
The administrator is using the Policy Lookup feature and has entered the search create shown in the following
exhibit.
Which of the following will be highlighted based on the input criteria?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
An administrator wants to create a policy-based IPsec VPN tunnel betweeb two FortiGate devices. Which
configuration steps must be performed on both devices to support this scenario? (Choose three.)
Explanation/Reference:
QUESTION 84
Which of the following statements about NTLM authentication are correct? (Choose two.)
A. It is useful when users log in to DCs that are not monitored by a collector agent.
B. It takes over as the primary authentication method when configured alongside FSSO.
C. Multi-domain environments require DC agents on every domain controller.
D. NTLM-enabled web browsers are required.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 85
View the certificate shown to the exhibit, and then answer the following question:
A. A root CA
B. A person
C. A bridge CA
D. A subordinate CA
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
Why does FortiGate keep TCP sessions in the session table for some seconds even after both sides
(client and server) have terminated the session?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87
A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added to the
physical interface.
Which statements about the VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses
in different subnets.
A. The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different
subnets.
B. The two VLAN sub interfaces must have different VLAN IDs.
C. The two VLAN sub interfaces can have the same VLAN ID, only if they belong to different VDOMs.
D. The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in the same
subnet.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
You have tasked to design a new IPsec deployment with the following criteria:
There are two HQ sues that all satellite offices must connect to
The satellite offices do not need to communicate directly with other satellite offices
No dynamic routing will be used
The design should minimize the number of tunnels being configured.
A. Partial mesh
B. Hub-and-spoke
C. Fully meshed
D. Redundant
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 89
Which of the following statements is true regarding SSL VPN settings for an SSL VPN portal?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 90
An administrator has configured the following settings:
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 91
An administrator observes that the port1 interface cannot be configured with an IP address. What can be the
reasons for that? (Choose three.)
Explanation/Reference:
QUESTION 92
What information is flushed when the chunk-size value is changed in the config dlp settings?
A. The database for DLP document fingerprinting
B. The supported file types in the DLP filters
C. The archived files and messages
D. The file name patterns in the DLP filters
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 93
Which is the correct description of a hash result as it relates to digital certificates?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 94
Which Statements about virtual domains (VDOMs) arc true? (Choose two.)
A. Transparent mode and NAT/Route mode VDOMs cannot be combined on the same FortiGate.
B. Each VDOM can be configured with different system hostnames.
C. Different VLAN sub-interface of the same physical interface can be assigned to different VDOMs.
D. Each VDOM has its own routing table.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 95
On a FortiGate with a hard disk, how can you upload logs to FortiAnalyzer or FortiManager? (Choose two.)
A. hourly
B. real time
C. on-demand
D. store-and-upload
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 96
Examine this FortiGate configuration:
Based on the diagnostic outputs above, how is the FortiGate handling the traffic for new sessions that require
inspection?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 97
When using WPAD DNS method, which FQDN format do browsers use to query the DNS server?
A. srv_proxy.<local-domain>/wpad.dat
B. srv_tcp.wpad.<local-domain>
C. wpad.<local-domain>
D. proxy.<local-domain>.wpad
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 98
Examine the IPS sensor configuration shown in the exhibit, and then answer the question below.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 99
What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)
A. Traffic to botnetservers
B. Traffic to inappropriate web sites
C. Server information disclosure attacks
D. Credit card data leaks
E. SQL injection attacks
Explanation/Reference:
QUESTION 100
Which statement about DLP on FortiGate is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 101
Examine this PAC file configuration.
Which of the following statements are true? (Choose two.)
A. Browsers can be configured to retrieve this PAC file from the FortiGate.
B. Any web request to the 172.25.120.0/24 subnet is allowed to bypass the proxy.
C. All requests not sent to Fortinet.com or the 172.25.120.0/24 subnet, have to go through altproxy.corp.com:
8060.
D. Any web request fortinet.com is allowed to bypass the proxy.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 102
Which statements about the firmware upgrade process on an active-active HA cluster are true? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 103
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
A. It recommends the use of dynamic routing protocols so that spokes can learn the routes to other spokes.
B. ADVPN is only supported with IKEv2.
C. IPsec tunnels are negotiated dynamically between spokes.
D. Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2
proposals are defined in advance.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 104
An administrator needs to create an SSL-VPN connection for accessing an internal server using the bookmark
Port Forward. What step is required for this configuration?
A. Configure an SSL VPN realm for clients to use the port forward bookmark.
B. Configure the client application to forward IP traffic through FortiClient.
C. Configure the virtual IP address to be assigned to the SSL VPN users.
D. Configure the client application to forward IP traffic to a Java applet proxy.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 105
What FortiGate configuration is required to actively prompt users for credentials?
A. You must enable one or more protocols that support active authentication on a firewall policy.
B. You must position the firewall policy for active authentication before a firewall policy for passive
authentication
C. You must assign users to a group for active authentication
D. You must enable the Authentication setting on the firewall policy
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 106
Which statements are true regarding firewall policy NAT using the outgoing interface IP address with fixed port
disabled? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 107
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-
based mode?
A. It limits the scope of application control to the browser-based technology category only.
B. It limits the scope of application control to scan application traffic based on application category only.
C. It limits the scope of application control to scan application traffic using parent signatures only
D. It limits the scope of application control to scan application traffic on DNS protocol only.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 108
The FSSO Collector Agent set to advanced access mode for the Windows Active Directory uses which of the
following?
A. LDAP convention
B. NTLM convention
C. Windows convention – NetBios\Username
D. RSSO convention
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 109
Examine the following web filtering log.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 110
Which of the following SD-WAN load -balancing method use interface weight value to distribute traffic?
(Choose two.)
A. Source IP
B. Spillover
C. Volume
D. Session
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 111
Which is a requirement for creating an inter-VDOM link between two VDOMs?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 112
Which statement regarding the firewall policy authentication timeout is true?
A. It is an idle timeout. The FortiGate considers a user to be “idle” if it does not see any packets coming from
the user’s source IP.
B. It is a hard timeout. The FortiGate removes the temporary policy for a user’s source IP address after this
timer has expired.
C. It is an idle timeout. The FortiGate considers a user to be “idle” if it does not see any packets coming from
the user’s source MAC.
D. It is a hard timeout. The FortiGate removes the temporary policy for a user’s source MAC address after this
timer has expired.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 113
How do you format the FortiGate flash disk?
Explanation/Reference:
QUESTION 114
Which of the following are valid actions for FortiGuard category based filter in a web filter profile in proxy-based
inspection mode? (Choose two.)
A. Warning
B. Exempt
C. Allow
D. Learn
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 115
Examine the IPS sensor and DoS policy configuration shown in the exhibit, then answer the question below.
When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first?
A. SMTP.Login.Brute.Force
B. IMAP.Login.brute.Force
C. ip_src_session
D. Location: server Protocol: SMTP
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 116
An administrator wants to configure a FortiGate as a DNS server. FotiGate must use a DNS database first, and
then relay all irresolvable queries to an external DNS server. Which of the following DNS methods must you
use?
A. Recursive
B. Non-recursive
C. Forward to primary and secondary DNS
D. Forward to system DNS
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 117
Which statement about the IP authentication header (AH) used by IPsec is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 118
If the Services field is configured in a Virtual IP (VIP), which of the following statements is true when central
NAT is used?
A. The Services field removes the requirement of creating multiple VIPs for different services.
B. The Services field is used when several VIPs need to be bundled into VIP groups.
C. The Services field does not allow source NAT and destination NAT to be combined in the same policy.
D. The Services field does not allow multiple sources of traffic, to use multiple services, to connect to a single
computer.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 119
View the exhibit.
VDOM1 is operating in transparent mode VDOM2 is operating in NAT Route mode. There is an inteface
VDOM link between both VDOMs. A client workstation with the IP address 10.0.1.10/24 is connected to port2.
A web server with the IP address 10.200.1.2/24 is connected to port1.
What is required in the FortiGate configuration to route and allow connections from the client workstation to the
web server? (Choose two.)
A. A static or dynamic route in VDOM2 with the subnet 10.0.1.0/24 as the destination.
B. A static or dynamic route in VDOM1 with the subnet 10.200.1.0/24 as the destination.
C. One firewall policy in VDOM1 with port2 as the source interface and InterVDOM0 as the destination
interface.
D. One firewall policy in VDOM2 with InterVDOM1 as the source interface and port1 as the destination
interface.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 120
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)
Explanation/Reference:
QUESTION 121
Which of the following static routes are not maintained in the routing table?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 122
Examine the network diagram shown in the exhibit, and then answer the following question:
A firewall administrator must configure equal cost multipath (ECMP) routing on FGT1 to ensure both port1 and
port3 links are used at the same time for all traffic destined for 172.20.2.0/24. Which of the following static
routes will satisfy this requirement on FGT1? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 123
Which of the following statements about central NAT are true? (Choose two.)
A. IP tool references must be removed from existing firewall policies before enabling central NAT.
B. Central NAT can be enabled or disabled from the CLI only.
C. Source NAT, using central NAT does not require a central SNAT policy.
D. Destination NAT, using central NAT, requires a VIP object as the destination address in a firewall.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 124
Which of the following statements correctly describe FortiGates route lookup behavior when searching for a
suitable gateway? (Choose two)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 125
Examine this network diagram:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 126
View the exhibit.
A user behind the FortiGate is trying to go to http://www.addictinggames.com (Addicting Games). Based on
this configuration, which statement is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference: