NSE 4 7.0 Sample Questions Attempt Review
NSE 4 7.0 Sample Questions Attempt Review
NSE 4 7.0 Sample Questions Attempt Review
1 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
FCP - FortiGate Security 7.0 and FortiGate Infrastructure 7.0 Sample Questions
Started on Saturday, January 6, 2024, 11:07 AM
State Finished
Completed on Saturday, January 6, 2024, 12:49 PM
Time taken 1 hour 41 mins
Points 31/35
Grade 87 out of 100
Question 1
Partially correct
1 points out of 1
An administrator wants to monitor their network for any probing attempts aimed to exploit existing vulnerabilities in their servers.
Which two items must they configure on their FortiGate to accomplish this? (Choose two.)
Question 2
Correct
1 points out of 1
Which statement best describes the role of a DC agent in an FSSO DC agent mode solution?
Select one:
It captures the login and logoff events and forwards them to the collector agent.
It captures the user IP address and workstation name and forwards them to FortiGate.
It captures the login events and forwards them to FortiGate.
It captures the login events and forwards them to the collector agent.
Question 3
Correct
1 points out of 1
Which load balancing method is not supported in equal cost multipath (ECMP) load balancing, but is supported in SD-WAN?
Select one:
Volume based
Weight based
Source-destination IP based
Source IP based
Question 4
Correct
1 points out of 1
2 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Select one:
It reboots FortiGate.
You must configure override settings manually and separately for each cluster member.
It synchronizes device priority on all cluster members.
It enables monitored ports.
Question 5
Correct
1 points out of 1
Select one:
You must configure SNAT for each firewall policy.
SNAT can automatically apply to multiple firewall policies, based on SNAT policies.
DNAT can automatically apply to multiple firewall policies, based on DNAT rules.
DNAT is not supported.
Question 6
Incorrect
0 points out of 1
A client workstation is connected to FortiGate port2. FortiGate port1 is connected to an ISP router. port2 and port3 are both configured as a
software switch.
Select one:
The router IP address
The FortiGate management IP address
The port2 IP address
The software switch interface IP address
Question 7
Correct
1 points out of 1
An administrator needs to create a tunnel mode SSL-VPN to access an internal web server from the internet. The web server is connected to
port1. The internet is connected to port2. Both interfaces belong to the VDOM named Corporation.
What interface must be used as the source for the firewall policy that will allow this traffic?
Select one:
ssl.Corporation
3 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
ssl.Corporation
ssl.root
port2
port1
Question 8
Incorrect
0 points out of 1
Which two statements about the log are correct? (Choose two.)
Question 9
Correct
1 points out of 1
Which two statements about the SD-WAN feature on FortiGate are true? (Choose two.)
Question 10
Correct
1 points out of 1
Select one:
It is an IPsec extension that authenticates remote VPN peers using a preshared key.
It is an IPsec extension that authenticates remote VPN peers using digital certificates.
It is an IPsec extension that forces remote VPN users to authenticate using their local ID.
It is an IPsec extension that forces remote VPN users to authenticate using their credentials (username and password).
Question 11
Correct
1 points out of 1
View the exhibit.
4 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Which two behaviors result from this full (deep) SSL configuration? (Choose two.)
Question 12
Correct
1 points out of 1
Which two statements about advanced AD access mode for the FSSO collector agent are true? (Choose two.)
Question 13
Correct
1 points out of 1
Examine the exhibit, which shows a FortiGate with two VDOMs: VDOM1 and VDOM2.
Both VDOMs are operating in NAT/route mode. The subnet 10.0.1.0/24 is connected to VDOM1. The subnet 10.0.2.0/24 is connected to
VDOM2. There is an inter-VDOM link between VDOM1 and VDOM2. Also, necessary firewall policies are configured in VDOM1 and VDOM2.
Which two static routes are required in the FortiGate configuration to route traffic between both subnets through an inter-VDOM link? (Choose
two.)
5 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Question 14
Correct
1 points out of 1
FortiGate has been configured for firewall authentication. When attempting to access an external website, the user is not presented with a login
prompt.
Select one:
The user is using a guest account profile.
The user is using a super admin account.
The user was authenticated using passive authentication.
No matching user account exists for this user.
Question 15
Correct
1 points out of 1
Which three methods can be used to deliver the token code to a user who is configured to use two-factor authentication? (Choose three.)
Question 16
Correct
1 points out of 1
Examine this partial output from the diagnose sys session list
CLI command:
Select one:
proto_state=05 means there is only one-way traffic.
6 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Question 17
Correct
1 points out of 1
Select one:
The settings are invalid. The administrator settings and the SSL-VPN settings cannot use the same port.
When a remote user accesses http://10.200.1.1:443, the SSL-VPN login page opens.
When a remote user accesses https://10.200.1.1:443, the SSL-VPN login page opens.
When a remote user accesses https://10.200.1.1:443, the FortiGate login page opens.
Question 18
Correct
1 points out of 1
Which two statements about incoming and outgoing interfaces in firewall policies are true? (Choose two.)
Question 19
Correct
1 points out of 1
What two settings must you configure when FortiGate is being deployed as a root FortiGate in a Security Fabric topology? (Choose two.)
7 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Fabric name
FortiManager IP address
Pre-authorize downstream FortiGate devices
Question 20
Correct
1 points out of 1
Question 21
Correct
1 points out of 1
Select one:
They are allowed and inspected.
They are dropped.
They are allowed, but with no inspection.
They are allowed and inspected as long as no additional proxy-based inspection is required.
Question 22
Correct
1 points out of 1
Which three actions are valid for static URL filtering? (Choose three.)
8 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Exempt
Allow
Block
Question 23
Correct
1 points out of 1
Which two statements about FortiGate antivirus databases are true? (Choose two.)
Question 24
Correct
1 points out of 1
Select one:
10.20.30.0/26 [10/0] via 172.20.168.254, port2
Question 25
Correct
1 points out of 1
Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
Question 26
9 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Question
Correct
1 points out of 1
Select one:
The SYN packet from the client always arrives at the primary device first.
The ACK from the client is received on the physical MAC address of the primary device.
The secondary device responds to the primary device with a SYN/ACK, and then the primary device forwards the SYN/ACK to the client.
All FortiGate devices are assigned the same virtual MAC addresses for the HA heartbeat interfaces to redistribute to the sessions.
Question 27
Correct
1 points out of 1
An administrator configured antivirus profile in a firewall policy set to flow-based inspection mode. While testing the configuration, the
administrator noticed that eicar.com test files can be downloaded using HTTPS protocol only.
Select one:
The test file is larger than the oversize limit.
Full content inspection for HTTPS is disabled.
HTTPS protocol is not enabled under Inspected Protocols.
Hardware acceleration is in use.
Question 28
Correct
1 points out of 1
Which two statements best describe how the FortiGate will perform reverse path forwarding (RPF) checks on this traffic? (Choose two.)
10 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Question 29
Correct
1 points out of 1
Which two statements correctly describe the differences between IPsec main mode and IPsec aggressive mode? (Choose two.)
Question 30
Correct
1 points out of 1
Which two statements about the application control profile mode are true? (Choose two.)
Question 31
Correct
1 points out of 1
Question 32
Incorrect
0 points out of 1
11 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Select one:
The mapped IP address object of the VIP object
A VIP object
A VIP group
An IP pool
Question 33
Correct
1 points out of 1
Examine the exhibit, which shows a firewall policy configured with multiple security profiles.
Which two security profiles are handled by the IPS engine? (Choose two.)
Question 34
Incorrect
0 points out of 1
Which two statements about antivirus scanning in a firewall policy set to proxy-based inspection mode are true? (Choose two.)
12 of 13 1/6/24, 13:50
NSE 4 7.0 Sample Questions: Attempt review https://training.fortinet.com/mod/quiz/review.php?att...
Question 35
Correct
1 points out of 1
Select one:
It refreshes all users learned through agentless polling.
It refreshes user group information from any servers connected to FortiGate using a collector agent.
It enables agentless polling mode real-time debug.
It displays status information and some statistics related to the polls done by FortiGate on each DC.
13 of 13 1/6/24, 13:50