Fortinet Network Security Expert - FortiOS 5.4 v1.0 (NSE4_5.4)

Page:    1 / 39   
Total 584 questions

View the Exhibit.

The administrator needs to confirm that FortiGate 2 is properly routing that traffic to the subnet. The administrator needs to confirm it by sending ICMP pings to FortiGate 2 from the CLI of FortiGate 1. What ping option needs to be enabled before running the ping?

  • A. Execute ping-options source port1
  • B. Execute ping-options source
  • C. Execute ping-options source
  • D. Execute ping-options source

Answer : D

How can you format the FortiGate flash disk?

  • A. Load the hardware test (HQIP) image.
  • B. Execute the CLI command execute formatlogdisk.
  • C. Load a debug FortiOS image.
  • D. Select the format boot device option from the BIOS menu.

Answer : D

How do you configure inline SSL inspection on a firewall policy? (Choose two.)

  • A. Enable one or more flow-based security profiles on the firewall policy.
  • B. Enable the SSL/SSH Inspection profile on the firewall policy.
  • C. Execute the inline ssl inspection CLI command.
  • D. Enable one or more proxy-based security profiles on the firewall policy.

Answer : AB

Which traffic sessions can be offloaded to a NP6 processor? (Choose two.)

  • A. IPv6
  • B. RIP
  • C. GRE
  • D. NAT64

Answer : AD

View the exhibit.

Based on this output, which statements are correct? (Choose two.)

  • A. FortiGate generated an event log for system conserve mode.
  • B. FortiGate has entered in to system conserve mode.
  • C. By default, the FortiGate blocks new sessions.
  • D. FortiGate changed the global av-failopen settings to idledrop.

Answer : BC

An administrator has blocked Netflix login in a cloud access security inspection (CASI) profile. The administrator has also applied the CASI profile to a firewall policy.
What else is required for the CASI profile to work properly?

  • A. You must enable logging for security events on the firewall policy.
  • B. You must activate a FortiCloud account.
  • C. You must apply an application control profile to the firewall policy.
  • D. You must enable SSL inspection on the firewall policy.

Answer : D

How does FortiGate look for a matching firewall policy to process traffic?

  • A. From top to bottom, based on the sequence numbers.
  • B. Based on best match.
  • C. From top to bottom, based on the policy ID numbers.
  • D. From lower to higher, based on the priority value.

Answer : A

How do you configure a FortiGate to do traffic shaping of P2P traffic, such as BitTorrent?

  • A. Apply an application control profile allowing BitTorrent to a firewall policy and configure a traffic shaping policy.
  • B. Enable the shape option in a firewall policy with service set to BitTorrent.
  • C. Apply a traffic shaper to a BitTorrent entry in the SSL/SSH inspection profile.
  • D. Apply a traffic shaper to a protocol options profile.

Answer : A

Which file names will match the *.tiff file name pattern configured in a data leak prevention filter? (Choose two.)

  • A. tiff.tiff [1]
  • C. tiff.jpeg
  • D. gif.tiff

Answer : AD

An administrator has configured a dialup IPsec VPN with XAuth. Which method statement best describes this scenario?

  • A. Only digital certificates will be accepted as an authentication method in phase 1.
  • B. Dialup clients must provide a username and password for authentication.
  • C. Phase 1 negotiations will skip pre-shared key exchange.
  • D. Dialup clients must provide their local ID during phase 2 negotiations.

Answer : B

View the exhibit.

VDOM1 is operating is transparent mode VDOM2 is operating in NAT Route mode. There is an inter-VDOM link between both VDOMs. A client workstation with the IP address is connected to port2. A web server with the IP address is connected to port1.
What is required in the FortiGate configuration to route and allow connections from the client workstation to the web server? (Choose two.)

  • A. A static or dynamic route in VDOM2 with the subnet as the destination.
  • B. A static or dynamic route in VDOM1 with the subnet as the destination.
  • C. One firewall policy in VDOM1 with port2 as the source interface and InterVDOM0 as the destination interface.
  • D. One firewall policy in VDOM2 with InterVDOM1 as the source interface and port1 as the destination interface.

Answer : AC

Which component of FortiOS performs application control inspection?

  • A. Kernel
  • B. Antivirus engine
  • C. IPS engine
  • D. Application control engine

Answer : C

Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)

  • A. They support GRE-over-IPsec.
  • B. They can be configured in both NAT/Route and transparent operation modes.
  • C. They require two firewall policies: one for each direction of traffic flow.
  • D. They support L2TP-over-IPsec.

Answer : BD

What statement describes what DNS64 does?

  • A. Converts DNS A record lookups to AAAA record lookups.
  • B. Translates the destination IPv6 address of the DNS traffic to an IPv4 address.
  • C. Synthesizes DNS AAAA records from A records.
  • D. Translates the destination IPv4 address of the DNS traffic to an IPv6 address.

Answer : B

What does the command diagnose debug fsso-polling refresh-user do?

  • A. It refreshes user group information form any servers connected to the FortiGate using a collector agent.
  • B. It refreshes all users learned through agentless polling.
  • C. It displays status information and some statistics related with the polls done by FortiGate on each DC.
  • D. It enables agentless polling mode real-time debug.

Answer : B

Page:    1 / 39   
Total 584 questions