NSE4 Dumps Fortinet Network Security Expert 4 Written Exam
NSE4 Dumps Fortinet Network Security Expert 4 Written Exam
NSE4 Dumps Fortinet Network Security Expert 4 Written Exam
NSE4 Dumps
https://www.certleader.com/NSE4-dumps.html
NEW QUESTION 1
Review the exhibit of an explicit proxy policy configuration.
If there is a proxy connection attempt coming from the IP address 10.0.1.5, and from a user that has not authenticated yet, what action does the FortiGate proxy
take?
Answer: D
NEW QUESTION 2
Which of the following statements are true regarding DLP File Type Filtering? (Choose two.)
Answer: BC
NEW QUESTION 3
Which of the following settings can be configured per VDOM? (Choose three)
Answer: ABE
NEW QUESTION 4
Which protocols can you use for secure administrative access to a FortiGate? (Choose two)
A. SSH
B. Telnet
C. NTLM
D. HTTPS
Answer: AD
NEW QUESTION 5
Examine the exhibit; then answer the question below.
The Vancouver FortiGate initially had the following information in its routing table:
S 172.20.0.0/16 [10/0] via 172.21.1.2, port2
C 172.21.0.0/16 is directly connected, port2
C 172.11.11.0/24 is directly connected, port1
Afterwards, the following static route was added:
config router static edit 6
set dst 172.20.1.0 255.255.255.0
set priority 0
set device port1
A. The subnet 172.20.1.0/24 is overlapped with the subnet of one static route that is already in the routing table (172.20.0.0/16), so, we need to enable allow-
subnet-overlap first.
B. The 'gateway' IP address is NOT in the same subnet as the IP address of port1.
C. The priority is 0, which means that the route will remain inactive.
D. The static route configuration is missing the distance setting.
Answer: B
NEW QUESTION 6
A new version of FortiOS firmware has just been released. When you upload new firmware, which is true?
A. If you upload the firmware image via the boot loader's menu from a TFTP server, it will not preserve the configuratio
B. But if you upload new firmware via the GUI or CLI, as long as you are following a supported upgrade path, FortiOS will attempt to convert the existing
configuration to be valid with any new or changed syntax.
C. No settings are preserve
D. You must completely reconfigure.
E. No settings are preserve
F. After the upgrade, you must upload a configuration backup fil
G. FortiOS will ignore any commands that are not valid in the new O
H. In those cases, you must reconfigure settings that are not compatible with the new firmware.
I. You must use FortiConverter to convert a backup configuration file into the syntax required by the new FortiOS, then upload it to FortiGate.
Answer: A
NEW QUESTION 7
Which statement best describes what the FortiGate hardware acceleration processors main
task is?
Answer: A
NEW QUESTION 8
Review to the network topology in the exhibit.
The workstation, 172.16.1.1/24, connects to port2 of the FortiGate device, and the ISP router, 172.16.1.2, connects to port1. Without changing IP addressing,
which configuration changes are required to properly forward users traffic to the Internet? (Choose two)
A. At least one firewall policy from port2 to port1 to allow outgoing traffic.
B. A default route configured in the FortiGuard devices pointing to the ISP's router.
C. Static or dynamic IP addresses in both ForitGate interfaces port1 and port2.
D. The FortiGate devices configured in transparent mode.
Answer: AD
NEW QUESTION 9
Which statements are correct for port pairing and forwarding domains? (Choose two.)
Answer: AD
NEW QUESTION 10
A user logs into a SSL VPN portal and activates the tunnel mode. The exhibit shows the firewall policy and the user's SSL VPN portal configuration:
Given that the user authenticates against the SSL VPN policy shown in the image below, which statement below identifies the route that is added to the client's
routing table.
Answer: A
NEW QUESTION 10
A FortiGate is configured with the 1.1.1.1/24 address on the wan2 interface and HTTPS Administrative Access, using the default tcp port, is enabled for that
interface. Given the SSL VPN settings in the exhibit.
Which of the following SSL VPN login portal URLs are valid? (Choose two.)
A. http://1.1.1.1:443/Training
B. https://1.1.1.1:443/STUDENTS
C. https://1.1.1.1/login
D. https://1.1.1.1/
Answer: BD
NEW QUESTION 15
Which two statements are true regarding firewall policy disclaimers? (Choose two.)
Answer: CD
NEW QUESTION 16
Which of the following fields contained in the IP/TCP/UDP headers can be used to make a routing decision when using policy-based routing? (Choose three)
A. Source IP address.
B. TCP flags
C. Source TCP/UDP ports
D. Type of service.
E. Checksum
Answer: ACD
NEW QUESTION 18
Which of the following protocols are defined in the IPsec Standard? (Choose two)
A. AH
B. GRE
C. SSL/TLS
D. ESP
Answer: AD
NEW QUESTION 22
Which of the following statements are true regarding application control? (Choose two.)
Answer: CD
NEW QUESTION 24
Which of the following statements is true regarding the use of a PAC file to configure the web proxy settings in an Internet browser? (Choose two.)
Answer: BC
NEW QUESTION 26
For data leak prevention, which statement describes the difference between the block and quarantine actions?
Answer: A
NEW QUESTION 29
Which statements are true regarding local user authentication? (Choose two.)
Answer: AD
NEW QUESTION 32
Which of the following authentication methods can be used for SSL VPN authentication? (Choose three.)
Answer: ABC
NEW QUESTION 36
What log type would indicate whether a VPN is going up or down?
A. Event log
B. Security log
C. Forward log
D. Syslog
Answer: A
NEW QUESTION 39
Which antivirus inspection mode must be used to scan SMTP, FTP, POP3 and SMB protocols?
A. Proxy-based.
B. DNS-based.
C. Flow-based.
D. Man-in-the-middle.
Answer: C
NEW QUESTION 43
How do application control signatures update on a FortiGate device?
Answer: A
NEW QUESTION 45
Review the IPsec diagnostics output of the command diagnose vpn tunnel list shown in the exhibit below.
Answer: AB
NEW QUESTION 47
You are creating a custom signature. Which has incorrect syntax?
Answer: A
NEW QUESTION 51
When an administrator attempts to manage FortiGate from an IP address that is not a trusted host, what happens?
A. FortiGate will still subject that person's traffic to firewall policies; it will not bypass them.
B. FortiGate will drop the packets and not respond.
C. FortiGate responds with a block message, indicating that it will not allow that person to log in.
D. FortiGate responds only if the administrator uses a secure protoco
E. Otherwise, it does not respond
Answer: B
NEW QUESTION 54
A FortiGate unit has multiple VDOMs in NAT/route mode with multiple VLAN interfaces in each VDOM. Which of the following statements is correct regarding the
IP addresses
assigned to each VLAN interface?
A. Different VLANs can share the same IP address as long as they have different VLAN IDs.
B. Different VLANs can share the same IP address as long as they are in different physical interface.
C. Different VLANs can share the same IP address as long as they are in different VDOMs.
D. Different VLANs can never share the same IP addresses.
Answer: C
NEW QUESTION 56
In "diag debug flow" output, you see the message “Allowed by Policy-1: SNAT”. Which is true?
A. The packet matched the topmost policy in the list of firewall policies.
B. The packet matched the firewall policy whose policy ID is 1.
C. The packet matched a firewall policy, which allows the packet and skips UTM checks
D. The policy allowed the packet and applied session NAT.
Answer: B
NEW QUESTION 57
Which is not a FortiGate feature?
A. Database auditing
B. Intrusion prevention
C. Web filtering
D. Application control
Answer: A
NEW QUESTION 61
What attributes are always included in a log header? (Choose three.)
A. policyid
B. level
C. user
D. time
E. subtype
F. duration
Answer: BDE
NEW QUESTION 66
Which of the following statements best describes what a Certificate Signing Request (CSR) is?
A. A message sent by the Certificate Authority (CA) that contains a signed digital certificate.
B. An enquiry submitted to a Certificate Authority (CA) to request a root CA certificate
C. An enquiry submitted to a Certificate Authority (CA) to request a signed digital certificate
D. An enquiry submitted to a Certificate Authority (CA) to request a Certificate Revocation List (CRL)
Answer: B
NEW QUESTION 67
A FortiGate is operating in NAT/Route mode and configured with two virtual LAN (VLAN) sub-interfaces added to the same physical interface.
Which one of the following statements is correct regarding the VLAN IDs in this scenario?
A. The two VLAN sub-interfaces can have the same VLAN ID only if they have IP addresses in different subnets.
B. The two VLAN sub-interfaces must have different VLAN IDs.
C. The two VLAN sub-interfaces can have the same VLAN ID only if they belong to different VDOMs.
D. The two VLAN sub-interfaces can have the same VLAN ID if they are connected to different L2 IEEE 802.1Q compliant switches.
Answer: B
NEW QUESTION 72
Which changes to IPS will reduce resource usage and improve performance? (Choose three)
A. In custom signature, remove unnecessary keywords to reduce how far into the signature tree that FortiGate must compare in order to determine whether the
packet matches.
B. In IPS sensors, disable signatures and rate based statistics (anomaly detection) for protocols, applications and traffic directions that are not relevant.
C. In IPS filters, switch from 'Advanced' to 'Basic' to apply only the most essential signatures.
D. In firewall policies where IPS is not needed, disable IPS.
E. In firewall policies where IPS is used, enable session start logs.
Answer: ABD
NEW QUESTION 77
Which of the following actions can be used to back up the keys and digital certificates in a FortiGate device? (Choose two.)
Answer: AD
NEW QUESTION 82
Which TCP states does the global setting ‘tcp-half-open-timer’ applies to? (Choose two.)
A. SYN SENT
B. SYN & SYN/ACK
C. FIN WAIT
D. TIME WAIT
Answer: AD
NEW QUESTION 83
Which of the following items does NOT support the Logging feature?
A. File Filter
B. Application control
C. Session timeouts
D. Administrator activities
E. Web URL filtering
Answer: C
NEW QUESTION 84
In transparent mode, forward-domain is a CLI setting associated with .
A. a static route.
B. a firewall policy.
C. an interface.
D. a virtual domain.
Answer: C
NEW QUESTION 88
A backup file begins with this line:
#config-version=FGVM64-5.02-FW-build589-140613:opmode=0:vdom=0:user=admin
#conf_file_ver=3881503152630288414 #buildno=0589 #global_vdom=1
Can you restore it to a FortiWiFi 60D?
A. Yes
B. Yes, but only if you replace the "#conf_file_ver" line so that it contains the serial number of that specific FortiWiFi 60D.
C. Yes, but only if it is running the same version of FortiOS, or a newer compatible version.
D. No
Answer: D
NEW QUESTION 93
Which is the following statement are true regarding application control? (choose two)
Answer: CD
NEW QUESTION 97
Which statement best describes the objective of the SYN proxy feature available in SP processors?
Answer: D
NEW QUESTION 99
Which statement describes what the CLI command diagnose debug authd fsso list is used for?
A. Monitors communications between the FSSO collector agent and FortiGate unit.
B. Displays which users are currently logged on using FSSO.
C. Displays are listing of all connected FSSO collector agents.
D. Lists all DC Agents installed on all domain controllers.
Answer: B
Which statement describes the green status indicators that appear next to the different FortiGuard Distribution Network services as illustrated in the exhibit?
A. They indicate that the FortiGate has the latest updates available from the FortiGuard Distribution Network.
B. They indicate that updates are available and should be downloaded from the FortiGuard Distribution Network to the FortiGate unit.
C. They indicate that the FortiGate is in the process of downloading updates from the FortiGuard Distribution Network.
D. They indicate that the FortiGate is able to connect to the FortiGuard Distribution Network.
Answer: D
A. HTTP
B. SSL
C. DNS
D. RSS
E. HTTPS
Answer: ACE
Answer: C
Answer: CD
Answer: AD
A. Captures the login events and forward them to the collector agent.
B. Captures the user IP address and workstation name and forward that information to the FortiGate devices.
C. Captures the login and logoff events and forward them to the collector agent.
D. Captures the login events and forward them to the FortiGate devices.
Answer: C
A. Irix
B. QNIX
C. Linux
D. Mac OS
E. BSD
Answer: CDE
Answer: A
A. ARP cache
B. Physical MAC address
C. Errors and collisions
D. Listening TCP ports
Answer: BC
A. Notification, Emergency
B. Information, Critical
C. Error, Critical
D. Information, Emergency
E. Information, Alert
Answer: D
Answer: CDE
A. Main mode mist be used when there is no more than one IPsec dialup VPN configured on the same FortiGate device.
B. A FortiGate device with an IPsec VPN configured as dialup can initiate the tunnel connection to any remote IP address.
C. Peer ID must be used when there is more than one aggressive-mode IPsec dialup VPN on the same FortiGate device.
D. The FortiGate will automatically add a static route to the source quick mode selector address received from each remote peer.
Answer: CD
A. SMTP
B. WINS
C. HTTP
D. Telnet
E. SSH
Answer: CDE
A. Policy-based only.
B. Route-based only.
C. Either policy-based or route-based VPN.
D. GRE-based only.
Answer: B
Answer: AB
Answer: A
Answer: B
A. Request: internal host; slave FortiGate; master FortiGate; Internet; web server.
B. Request: internal host; slave FortiGate; Internet; web server.
C. Request: internal host; slave FortiGate; master FortiGate; Internet; web server.
D. Request: internal host; master FortiGate; slave FortiGate; Internet; web server.
Answer: D
A. Intrusion detected.
B. Successful firewall authentication.
C. Oversized file detected.
D. DHCP address assigned.
E. FortiGuard Web Filtering rating error detected.
Answer: A
A. 00
B. 11
C. 01
D. 05
Answer: AC
A. The workstation fails to reply to the polls frequently done by the collector agent.
B. The DC agent captures the log off event from the event logs, which it forwards to the collector agent.
C. The work station notifies the DC agent that the user has logged off.
D. The collector agent gets the logoff events when polling the respective domain controller.
Answer: D
Answer: BD
A. The default web filtering profile is applied to the first firewall policy.
B. The 'Port1' or 'Internal' interface has the IP address 192.168.1.99.
C. The implicit firewall policy action is ACCEPT.
D. The 'Port1' or 'Internal' interface has a DHCP server set up and enabled (on device models that support DHCP servers).
E. Default login uses the username: admin (all lowercase) and no password.
Answer: BDE
Answer: AD
Answer: CD
A. The quick mode selector in the remote site must also be 0.0.0.0/0 for the source and destination addresses.
B. Only remote peers with the peer ID 'fortinet' will be able to establish a VPN.
C. The FortiGate device will automatically add a static route to the source quick mode selector address received from each remote VPN peer.
D. The configuration will work only to establish FortiClient-to-FortiGate tunnel
E. A FortiGate tunnel requires a different configuration.
Answer: CD
Answer: BC
A. HTTPS
B. FTP
C. TFTP
D. HTTP
Answer: D
Answer: C
A. All the aggressive mode dialup VPNs MUST accept connections from the same peer ID.
B. Each peer ID MUST match the FQDN of each remote peer.
C. Each aggressive mode dialup MUST accept connections from different peer ID.
D. The peer ID setting must NOT be used.
Answer: C
Answer: B
Answer: D
Answer: AC
A. Firewall addresses
B. DHCP servers
C. FortiGuard Distribution Network configuration.
D. System hostname.
Answer: AB
Answer: BD
A. Aggressive mode
B. Quick mode
C. Main mode
D. Fast mode
Answer: B
Answer: BCE
Which of the following statements are correct regarding logging to memory on a FortiGate unit?
A. When the system has reached its capacity for log messages, the FortiGate unit will stop logging to memory.
B. When the system has reached its capacity for log messages, the FortiGate unit overwrites the oldest messages.
C. If the FortiGate unit is reset or loses power, log entries captured to memory will be lost.
D. None of the above.
Answer: BC
A. Main mode.
B. Quick mode.
C. Aggressive mode.
D. IKEv2 mode.
Answer: C
Answer: BC
Answer: B
A. Antivirus
B. VPN
C. IPS
D. Web Filtering
Answer: D
A. Bob will use his private key to encrypt the file and Alice will use her private key to decrypt the file.
B. Bob will use his public key to encrypt the file and Alice will use Bob’s private key to decrypt the file.
C. Bob will use Alice’s public key to encrypt the file and Alice will use her private key to decrypt the file.
D. Bob will use his public key to encrypt the file and Alice will use her private key to decrypt the file.
Answer: C
Answer: BC
Answer: B
Which routes will be used to route the packets to the destination IP address 172.20.168.1?
Answer: D
Answer: A
Answer: AB
Answer: A
A. Warn
B. Allow
C. Block
D. Traffic Shaping
E. Quarantine
Answer: BCD
Exhibit B:
What is the correct behavior when the email attachment is detected as a virus by the FortiGate antivirus engine?
A. The FortiGate unit will remove the infected file and deliver the email with a replacement message to alert the recipient that the original attachment was infected.
B. The FortiGate unit will reject the infected email and the sender will receive a failed delivery message.
C. The FortiGate unit will remove the infected file and add a replacement messag
D. Both sender and recipient are notified that the infected file has been removed.
E. The FortiGate unit will reject the infected email and notify the sender.
Answer: B
Answer: C
A. Create firewall policies to allow and control traffic between the source and destination IP addresses.
B. Configure the appropriate user groups to allow users access to the tunnel.
C. Set the operating mode to IPsec VPN mode.
D. Define the phase 2 parameters.
E. Define the Phase 1 parameters.
Answer: ADE
Answer: B
A. Syslog
B. FortiAnalyzer
C. Hard drive
D. Memory
E. FortiCloud
Answer: ABE
Which of the following statements correctly describes this static routing configuration? (choose two)
Answer: CD
A. MIB
B. SMS
C. Alert Emails
D. SNMP
E. FortiAnalyzer
F. Alert Message Console
Answer: CDF
100% Pass Your NSE4 Exam with Our Prep Materials Via below:
https://www.certleader.com/NSE4-dumps.html