Fortinet - Actualtests.nse4.study - Guide.2021 Apr 01.by - Les.237q.vce
Fortinet - Actualtests.nse4.study - Guide.2021 Apr 01.by - Les.237q.vce
Fortinet - Actualtests.nse4.study - Guide.2021 Apr 01.by - Les.237q.vce
Fortinet
Exam Questions NSE4
Fortinet Network Security Expert 4 Written Exam (400)
NEW QUESTION 1
What protocol cannot be used with the active authentication type?
A. Local
B. RADIUS
C. LDAP
D. RSSO
Answer: D
NEW QUESTION 2
Review the exhibit of an explicit proxy policy configuration.
If there is a proxy connection attempt coming from the IP address 10.0.1.5, and from a user that has not authenticated yet, what action does the FortiGate proxy
take?
Answer: D
NEW QUESTION 3
How is traffic routed onto an SSL VPN tunnel from the FortiGate unit side?
A. A static route must be configured by the administrator using the ssl.root interface as the outgoing interface.
B. Assignment of an IP address to the client causes a host route to be added to the FortiGate unit's kernel routing table.
C. A route back to the SSLVPN IP pool is automatically created on the FortiGate unit.
D. The FortiGate unit adds a route based upon the destination address in the SSL VPN firewall policy.
Answer: B
NEW QUESTION 4
Which of the following settings can be configured per VDOM? (Choose three)
Answer: ABE
NEW QUESTION 5
A FortiGate administrator with the super_admin profile configures a virtual domain (VDOM) for a new customer. After creating the VDOM, the administrator is
unable to reassign the dmz interface to the new VDOM as the option is greyed out in the GUI in the management VDOM.
What would be a possible cause for this problem?
A. The administrator does not have the proper permissions the dmz interface.
B. The dmz interface is referenced in the configuration of another VDOM.
C. Non-management VDOMs cannot reference physical interfaces
D. The dmz interface is in PPPoE or DHCP mode.
Answer: B
NEW QUESTION 6
Your Linux email server runs on a non-standard port number, port 2525. Which statement is true?
A. IPS cannot scan that traffic for SMTP anomalies because of the non-standard port numbe
Answer: B
NEW QUESTION 7
A new version of FortiOS firmware has just been released. When you upload new firmware, which is true?
A. If you upload the firmware image via the boot loader's menu from a TFTP server, it will not preserve the configuratio
B. But if you upload new firmware via the GUI or CLI, as long as you are following a supported upgrade path, FortiOS will attempt to convert the existing
configuration to be valid with any new or changed syntax.
C. No settings are preserve
D. You must completely reconfigure.
E. No settings are preserve
F. After the upgrade, you must upload a configuration backup fil
G. FortiOS will ignore any commands that are not valid in the new O
H. In those cases, you must reconfigure settings that are not compatible with the new firmware.
I. You must use FortiConverter to convert a backup configuration file into the syntax required by the new FortiOS, then upload it to FortiGate.
Answer: A
NEW QUESTION 8
Review to the network topology in the exhibit.
The workstation, 172.16.1.1/24, connects to port2 of the FortiGate device, and the ISP router, 172.16.1.2, connects to port1. Without changing IP addressing,
which configuration changes are required to properly forward users traffic to the Internet? (Choose two)
A. At least one firewall policy from port2 to port1 to allow outgoing traffic.
B. A default route configured in the FortiGuard devices pointing to the ISP's router.
C. Static or dynamic IP addresses in both ForitGate interfaces port1 and port2.
D. The FortiGate devices configured in transparent mode.
Answer: AD
NEW QUESTION 9
FSSO provides a single sign on solution to authenticate users transparently to a FortiGate unit using credentials stored in Windows active directory.
Which of the following statements are correct regarding FSSO in a Windows domain environment when DC-agent mode is used? (Choose two.)
Answer: BD
NEW QUESTION 10
A FortiGate is configured with the 1.1.1.1/24 address on the wan2 interface and HTTPS Administrative Access, using the default tcp port, is enabled for that
interface. Given the SSL VPN settings in the exhibit.
Which of the following SSL VPN login portal URLs are valid? (Choose two.)
A. http://1.1.1.1:443/Training
B. https://1.1.1.1:443/STUDENTS
C. https://1.1.1.1/login
D. https://1.1.1.1/
Answer: BD
NEW QUESTION 10
Which two statements are true regarding firewall policy disclaimers? (Choose two.)
Answer: CD
NEW QUESTION 12
Which statements are correct regarding virtual domains (VDOMs)? (Choose two)
A. VDOMs divide a single FortiGate unit into two or more virtual units that each have dedicated memory and CPUs.
B. A management VDOM handles SNMP, logging, alert email and FDN-based updates.
C. VDOMs share firmware versions, as well as antivirus and IPS databases.
D. Different time zones can be configured in each VDOM.
Answer: BC
NEW QUESTION 13
Which of the following protocols are defined in the IPsec Standard? (Choose two)
A. AH
B. GRE
C. SSL/TLS
D. ESP
Answer: AD
NEW QUESTION 14
Examine the output below from the diagnose sys top command:
Which statements are true regarding the output above (Choose two.)
Answer: AD
NEW QUESTION 19
Where are most of the security events logged?
A. Security log
B. Forward Traffic log
C. Event log
D. Alert log
E. Alert Monitoring Console
Answer: C
NEW QUESTION 21
Which of the following statements describes the objectives of the gratuitous ARP packets sent by an HA cluster?
A. To synchronize the ARp tables in all the FortiGate Unis that are part of the HA cluster.
B. To notify the network switches that a new HA master unit has been elected.
C. To notify the master unit that the slave devices are still up and alive.
D. To notify the master unit about the physical MAC addresses of the slave units.
Answer: B
NEW QUESTION 25
Which statements are true regarding the use of a PAC file to configure the web proxy settings in an Internet browser? (Choose two.)
Answer: CD
NEW QUESTION 30
Which of the following are benefits of using web caching? (Choose three.)
Answer: ABE
NEW QUESTION 34
Regarding the header and body sections in raw log messages, which statement is correct?
A. The header and body section layouts change depending on the log type.
B. The header section layout is always the same regardless of the log typ
C. The body section layout changes depending on the log type.
D. Some log types include multiple body sections.
E. Some log types do not include a body section.
Answer: B
NEW QUESTION 38
Which statements are true regarding traffic shaping that is applied in an application sensor, and associated with the firewall policy? (Choose two.)
Answer: BC
NEW QUESTION 40
Which statement is not correct regarding SSL VPN Tunnel mode?
Answer: C
NEW QUESTION 44
Which of the following statement correct describes the use of the "diagnose sys ha reset- uptime" command?
Answer: A
NEW QUESTION 49
What determines whether a log message is generated or not?
Answer: A
NEW QUESTION 52
In a Crash log, what does a status of 0 indicate?
Answer: D
NEW QUESTION 56
Regarding tunnel-mode SSL VPN, which three statements are correct? (Choose three.)
Answer: ABE
NEW QUESTION 57
A FortiGate unit has multiple VDOMs in NAT/route mode with multiple VLAN interfaces in each VDOM. Which of the following statements is correct regarding the
IP addresses
assigned to each VLAN interface?
A. Different VLANs can share the same IP address as long as they have different VLAN IDs.
B. Different VLANs can share the same IP address as long as they are in different physical interface.
C. Different VLANs can share the same IP address as long as they are in different VDOMs.
D. Different VLANs can never share the same IP addresses.
Answer: C
NEW QUESTION 60
Which is not a FortiGate feature?
A. Database auditing
B. Intrusion prevention
C. Web filtering
D. Application control
Answer: A
NEW QUESTION 64
Which of the following statements best describes what a Certificate Signing Request (CSR) is?
A. A message sent by the Certificate Authority (CA) that contains a signed digital certificate.
B. An enquiry submitted to a Certificate Authority (CA) to request a root CA certificate
C. An enquiry submitted to a Certificate Authority (CA) to request a signed digital certificate
D. An enquiry submitted to a Certificate Authority (CA) to request a Certificate Revocation List (CRL)
Answer: B
NEW QUESTION 67
Which of the following are possible actions for FortiGuard web category filtering? (Choose three.)
A. Allow
B. Block
C. Exempt
D. Warning
E. Shape
Answer: ABD
NEW QUESTION 71
Examine the following spanning tree configuration on a FortiGate in transparent mode:
config system interface edit <interface name> set stp-forward enable end
Which statement is correct for the above configuration?
Answer: B
NEW QUESTION 76
Which TCP states does the global setting ‘tcp-half-open-timer’ applies to? (Choose two.)
A. SYN SENT
B. SYN & SYN/ACK
C. FIN WAIT
D. TIME WAIT
Answer: AD
NEW QUESTION 78
Which statement best describes the objective of the SYN proxy feature available in SP processors?
Answer: D
NEW QUESTION 81
Which statement describes what the CLI command diagnose debug authd fsso list is used for?
A. Monitors communications between the FSSO collector agent and FortiGate unit.
B. Displays which users are currently logged on using FSSO.
C. Displays are listing of all connected FSSO collector agents.
D. Lists all DC Agents installed on all domain controllers.
Answer: B
NEW QUESTION 84
Which best describe the mechanism of a TCP SYN flood?
A. The attacker keeps open many connections with slow data transmission so that other clients cannot start new connections.
B. The attacker sends a packet designed to "sync" with the FortiGate.
C. The attacker sends a specially crafted malformed packet, intended to crash the target by exploiting its parser.
D. The attacker starts many connections, but never acknowledges to fully form them.
Answer: D
NEW QUESTION 87
Which statements are correct regarding an IPv6 over IPv4 IPsec configuration? (Choose two.)
Answer: BC
NEW QUESTION 89
Review the IPsec phase 2 configuration shown in the exhibit; then answer the question below.
Answer: AB
NEW QUESTION 94
Which of the following statements are true about the SSL Proxy certificate that must be used for SSL Content Inspection? (Choose two.)
Answer: CD
NEW QUESTION 95
Which two statements are true about IPsec VPNs and SSL VPNs? (Choose two.)
Answer: AD
Answer: A
A. POP3
B. SNMP
C. IPsec
D. SMTP
E. HTTP
Answer: ADE
A. Irix
B. QNIX
C. Linux
D. Mac OS
E. BSD
Answer: CDE
A. NAT/PAT is shown in the central NAT table, not the session table.
B. It shows TCP connection states.
C. It shows IP, SSL, and HTTP sessions.
D. It does not show UDP or ICMP connection state codes, because those protocols are connectionless.
Answer: B
A. 192.168.11.100
B. 192.168.11.251
C. 192.168.10.100
D. 192.168.10.251
Answer: AB
A. ARP cache
B. Physical MAC address
C. Errors and collisions
D. Listening TCP ports
Answer: BC
Answer: CDE
A. Policy-based only.
B. Route-based only.
C. Either policy-based or route-based VPN.
D. GRE-based only.
Answer: B
A. The DC agents get each user IP address from the event logs and forward that information to the collector agent
B. The collector agent does not know, and does not need, each user IP addres
C. Only workstation names are known by the collector agent.
D. The collector agent frequently polls the AD domain controllers to get each user IP address.
E. The DC agent learns the workstation name from the event logs and DNS is then used to translate those names to the respective IP addresses.
Answer: D
Answer: AC
Answer: A
A. IP address pool.
B. Virtual IP address.
C. IP address.
D. IP address group.
E. MAC address.
Answer: BCD
A. FortiGate devices,from the FGT/FWF 60D and above, all support VDOMS.
B. All FortiGate devices scale to 250 VDOMS.
C. Each VDOM requires its own FortiGuard license.
D. FortiGate devices support more NAT/route VDOMs than Transparent Mode VDOMs.
Answer: A
A. Grayware
B. Virus
C. Sandbox
D. Heuristic
Answer: C
A. Request: internal host; slave FortiGate; master FortiGate; Internet; web server.
B. Request: internal host; slave FortiGate; Internet; web server.
C. Request: internal host; slave FortiGate; master FortiGate; Internet; web server.
D. Request: internal host; master FortiGate; slave FortiGate; Internet; web server.
Answer: D
Answer: AB
Answer: A
Answer: AD
A. The workstation fails to reply to the polls frequently done by the collector agent.
B. The DC agent captures the log off event from the event logs, which it forwards to the collector agent.
C. The work station notifies the DC agent that the user has logged off.
D. The collector agent gets the logoff events when polling the respective domain controller.
Answer: D
Answer: BD
Which of the following statements best describes the green status indicators that appear next to the different FortiGuard Distribution Network services as illustrated
in the exhibit?
A. They indicate that the FortiGate unit is able to connect to the FortiGuard Distribution Network.
B. They indicate that the FortiGate unit has the latest updates that are available from the FortiGuard Distribution Network.
C. They indicate that updates are available and should be downloaded from the FortiGuard Distribution Network to the FortiGate unit.
D. They indicate that the FortiGate unit is in the process of downloading updates from the FortiGuard Distribution Network.
Answer: A
A. HTTPS
B. FTP
C. TFTP
D. HTTP
Answer: D
A. The whole VDOM is a single broadcast domain even when multiple VLAN are used.
B. Each VLAN is a separate broadcast domain.
C. Interfaces configured with the same VLAN ID can belong to different broadcast domains.
D. All the interfaces in the same broadcast domain must use the same VLAN ID.
Answer: BC
Answer: C
Answer: A
Answer: AC
A. 5
B. 3
C. 2
D. 6
Answer: D
A. 192.168.1.99
B. 192.168.1.253
C. 192.168.1.65
D. 192.168.1.66
Answer: C
A. SMTP
B. HTTP-POST
C. AIM
D. MAPI
E. ICQ
Answer: ABD
A. The quick mode selectors negotiated between both IPsec VPN peers is 0.0.0.0/32 for both source and destination addresses.
B. The output corresponds to a phase 2 negotiation
C. NAT-T enabled and there is third device in the path performing NAT of the traffic between both IPsec VPN peers.
D. The IP address of the remote IPsec VPN peer is 172.20.187.114
Answer: BD
A. The name of the virtual network adapter required in each user's PC for SSL VPN Tunnel mode.
B. The name of a virtual interface in the root VDOM where all the SSL VPN user traffic comes from.
C. A Firewall Address object that contains the IP addresses assigned to SSL VPN users.
D. The virtual interface in the root VDOM that the remote SSL VPN tunnels connect to.
Answer: B
Answer: AC
A. CHAP
B. MSCHAP2
C. PAP
D. FSSO
Answer: D
A. In the GUI, the log entry was located under “Log & Report > Event Log > User”.
B. In the GUI, the log entry was located under “Log & Report > Event Log > System”.
C. In the GUI, the log entry was located under “Log & Report > Traffic Log > Local Traffic”.
D. The connection was encrypted.
E. The connection was unencrypted.
F. The IP of the FortiGate interface that “admin” connected to was 192.168.1.112.
G. The IP of the computer that “admin” connected from was 192.168.1.112.
Answer: BEG
Answer: C
Answer: BC
A. Forward log
B. Traffic log
C. Syslog
D. Event log
E. Security log
Answer: BDE
Answer: A
A. Asymmetric Keys
B. CA root digital certificates
C. RSA signature
D. Pre-shared keys
Answer: CD
A. Warn
B. Allow
C. Block
D. Traffic Shaping
E. Quarantine
Answer: BCD
Answer: AB
Exhibit B:
Which one of the following is the most likely reason that the cluster fails to form?
A. Password
B. HA mode
C. Hearbeat
D. Override
Answer: B
Answer: C
A. The allowed actions for URL filtering include allow, block, monitor and exempt.
B. The allow actions for URL filtering and Allow and Block only.
C. URL filters may be based on patterns using simple text, wildcards and regular expressions.
D. URL filters are based on simple text only and require an exact match.
Answer: AC
A. Users are required to manually enter their credentials each time they connect to a different web site.
B. Proxy users are authenticated via FSSO.
C. There are multiple users sharing the same IP address.
D. Proxy users are authenticated via RADIUS.
Answer: C
A. Split tunneling can be enabled when using tunnel mode SSL VPN.
B. Client software is required to be able to use a tunnel mode SSL VPN.
C. Users attempting to create a tunnel mode SSL VPN connection must be authenticated by at least one SSL VPN policy.
D. The source IP address used by the client for the tunnel mode SSL VPN is assigned by the FortiGate unit.
Answer: ABCD
* NSE4 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* NSE4 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year