Fortinet NSE6_FAC-6.4 - Fortinet NSE 6 - FortiAuthenticator 6.4 Exam

Question #1 (Topic: Exam A)
Examine the screenshot shown in the exhibit.

Which two statements regarding the configuration are true? (Choose two.)
A. Guest users must fill in all the fields on the registration form. B. All accounts registered through the guest portal must be validated through email. C. All guest accounts created using the account registration feature will be placed under the Guest_Portal_Users group. D. Guest user account will expire after eight hours.
Answer: BC
Question #2 (Topic: Exam A)
An administrator is integrating FortiAuthenticator with an existing RADIUS server with the intent of eventually replacing the RADIUS server with FortiAuthenticator.
How can FortiAuthenticator help facilitate this process?
A. By configuring the RADIUS accounting proxy B. By enabling automatic REST API calls from the RADIUS server C. By enabling learning mode in the RADIUS server configuration D. By importing the RADIUS user records
Answer: A
Question #3 (Topic: Exam A)
You are an administrator for a large enterprise and you want to delegate the creation and management of guest users to a group of sponsors.
How would you associate the guest accounts with individual sponsors?
A. As an administrator, you can assign guest groups to individual sponsors. B. Guest accounts are associated with the sponsor that creates the guest account. C. You can automatically add guest accounts to groups associated with specific sponsors. D. Select the sponsor on the guest portal, during registration.
Answer: B
Question #4 (Topic: Exam A)
You are a Wi-Fi provider and host multiple domains.
How do you delegate user accounts, user groups and permissions per domain when they are authenticating on a single FortiAuthenticator device?
A. Create realms. B. Create user groups. C. Create multiple directory trees on FortiAuthenticator. D. Automatically import hosts from each domain as they authenticate.
Answer: C
Question #5 (Topic: Exam A)
You have implemented two-factor authentication to enhance security to sensitive enterprise systems.
How could you bypass the need for two-factor authentication for users accessing form specific secured networks?
A. Create an admin realm in the authentication policy. B. Specify the appropriate RADIUS clients in the authentication policy. C. Enable Adaptive Authentication in the portal policy. D. Enable the Resolve user geolocation from their IP address option in the authentication policy.
Answer: B
Download Exam
Page: 1 / 6
Total 30 questions