Icon Créer jeu Créer jeu

1 - Fortinet NSE 4 30Quiz

Test

(1)
Examen

Téléchargez la version pour jouer sur papier

Âge recommandé: 18 ans
20 fois fait

Créé par

Spain

Top 10 résultats

  1. 1
    04:41
    temps
    100
    but
  2. 2
    23:42
    temps
    93
    but
Voulez-vous apparaître dans le Top 10 de ce jeu? pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

1 - Fortinet NSE 4 30QuizVersion en ligne

Examen

par Juana DeBarrios
1

Which two statements are true when FortiGate is in transparent mode? (Choose two.)

Choose one or more answers

2

What inspection mode does FortiGate use if it is configured as a policy-based next-generation firewall (NGFW)?

Choose one or more answers

3

Which two statements about IPsec authentication on FortiGate are correct? (Choose two.)

Choose one or more answers

4

Which scanning technique on FortiGate can be enabled only on the CLI?

5

Which two policies must be configured to allow traffic on a policy-based next-generation firewall (NGFW) FortiGate? (Choose two.)

Choose one or more answers

6

You have enabled logging on your FortiGate device for Event logs and all Security logs, and you have set up logging to use the FortiGate local disk. What is the default behavior when the local disk is full?

Choose one or more answers

7

Refer to the exhibit, which contains a Performance SLA configuration. An administrator has configured a performance SLA on FortiGate, which failed to generate any traffic. Why is FortiGate not generating any traffic for the performance SLA?

8

FortiGate is operating in NAT mode and is configured with two virtual LAN (VLAN) subinterfaces added to the same physical interface. In this scenario, which statement about VLAN IDs is true?

9

Users who use Apple FaceTime video conferences are unable to set up meetings. In this scenario, which statement is true?

10

What is the effect of enabling auto-negotiate on the phase 2 configuration of an IPsec tunnel?

Choose one or more answers

11

Which three security features require the intrusion prevention system (IPS) engine to function? (Choose three.)

Choose one or more answers

12

Given the security fabric topology shown in the exhibit, which two statements are true? (Choose two.)

Choose one or more answers

13

The HTTP inspection process in web filtering follows a specific order when multiple features are enabled in the web filter profile. What order must FortiGate use when the web filter profile has features enabled, such as safe search?

14

When a firewall policy is created, which attribute is added to the policy to support recording logs to a FortiAnalyzer or a FortiManager and improves functionality when a FortiGate is integrated with these devices?

15

Which statement is correct if well-known viruses are not being blocked?

16

Which statement is true about the session diagnostic output?

17

The exhibit shows proxy policies and proxy addresses, the authentication rule and authentication scheme, users, and firewall address. An explicit web proxy is configured for subnet range 10.0.1.0/24 with three explicit web proxy policies. The authentication rule is configured to authenticate HTTP requests for subnet range 10.0.1.0/24 with a form-based authentication scheme for the FortiGate local user database. Users will be prompted for authentication. How will FortiGate process the traffic when the HTTP request comes from a machine with the source IP 10.0.1.10 to the destination http:// www.fortinet.com? (Choose two.)

Choose one or more answers

18

The exhibit shows the configuration for the SD-WAN member, Performance SLA and SD-WAN Rule, as well as the output of diagnose sys virtual-wan- link health-check. Which interface will be selected as an outgoing interface?

19

What devices form the core of the security fabric?

20

Which three criteria can a FortiGate use to look for a matching firewall policy to process traffic? (Choose three.)

Choose one or more answers

21

Which two configuration settings are synchronized when FortiGate devices are in an active-active HA cluster? (Choose two.)

Choose one or more answers

22

Which security feature does FortiGate provide to protect servers located in the internal networks from attacks such as SQL injections?

23

Review the Intrusion Prevention System (IPS) profile signature settings. Which statement is correct in adding the FTP.Login.Failed signature to the IPS sensor profile?

24

How does FortiGate act when using SSL VPN in web mode?

25

The exhibit contains a network diagram, firewall policies, and a firewall address object configuration. An administrator created a Deny policy with default settings to deny Webserver access for Remote-user2. Remote-user2 is still able to access Webserver. Which two changes can the administrator make to deny Webserver access for Remote-User2? (Choose two.)

Choose one or more answers

26

Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)

Choose one or more answers

27

Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)

Choose one or more answers

28

Based on the output shown in the exhibit, which two statements are correct? (Choose two.)

Choose one or more answers

29

FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy. Which two other security profiles can you apply to the security policy? (Choose two.)

Choose one or more answers

30

Which two types of traffic are managed only by the management VDOM? (Choose two.)

Choose one or more answers

Feedback

https://docs.fortinet.com/document/fortigate/6.0.0/handbook/100552/using-xauth-authentication

educaplay suscripción