Pass the Fortinet NSE4 NSE4_FGT-7.2 Questions and answers with CertsForce

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two statements describe how the RPF check is used? (Choose two.)

Options:

A.

The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.


B.

The RPF check is run on the first sent and reply packet of any new session.


C.

The RPF check is run on the first sent packet of any new session.


D.

The RPF check is run on the first reply packet of any new session.


Expert Solution
Questions # 2:

34

The HTTP inspection process in web filtering follows a specific order when multiple features are enabled in the web filter profile. What order must FortiGate use when the web filter profile has features enabled, such as safe search?

Options:

A.

DNS-based web filter and proxy-based web filter


B.

Static URL filter, FortiGuard category filter, and advanced filters


C.

Static domain filter, SSL inspection filter, and external connectors filters


D.

FortiGuard category filter and rating filter


Expert Solution
Questions # 3:

87

Which of the following are valid actions for FortiGuard category based filter in a web filter profile ui proxy-based inspection mode? (Choose two.)

Options:

A.

Warning


B.

Exempt


C.

Allow


D.

Learn


Expert Solution
Questions # 4:

87

Which of the following are valid actions for FortiGuard category based filter in a web filter profile ui proxy-based inspection mode? (Choose two.)

Options:

A.

Warning


B.

Exempt


C.

Allow


D.

Learn


Expert Solution
Questions # 5:

Refer to the exhibit.

Question # 5

Examine the intrusion prevention system (IPS) diagnostic command.

Which statement is correct If option 5 was used with the IPS diagnostic command and the outcome was a decrease in the CPU usage?

Options:

A.

The IPS engine was inspecting high volume of traffic.


B.

The IPS engine was unable to prevent an intrusion attack .


C.

The IPS engine was blocking all traffic.


D.

The IPS engine will continue to run in a normal state.


Expert Solution
Questions # 6:

6

Which three options are the remote log storage options you can configure on FortiGate? (Choose three.)

Options:

A.

FortiCache


B.

FortiSIEM


C.

FortiAnalyzer


D.

FortiSandbox


E.

FortiCloud


Expert Solution
Questions # 7:

An administrator must disable RPF check to investigate an issue.

Which method is best suited to disable RPF without affecting features like antivirus and intrusion prevention system?

Options:

A.

Enable asymmetric routing, so the RPF check will be bypassed.


B.

Disable the RPF check at the FortiGate interface level for the source check.


C.

Disable the RPF check at the FortiGate interface level for the reply check .


D.

Enable asymmetric routing at the interface level.


Expert Solution
Questions # 8:

Refer to the exhibit.

Question # 8

Question # 8

Question # 8

Question # 8

The exhibit contains a network diagram, central SNAT policy, and IP pool configuration.

The WAN (port1) interface has the IP address 10.200. 1. 1/24.

The LAN (port3) interface has the IP address 10.0. 1.254/24.

A firewall policy is configured to allow to destinations from LAN (port3) to WAN (port1).

Central NAT is enabled, so NAT settings from matching Central SNAT policies will be applied.

Which IP address will be used to source NAT the traffic, if the user on Local-Client (10.0. 1. 10) pings the IP address of Remote-FortiGate (10.200.3. 1)?

Options:

A.

10.200. 1. 149


B.

10.200. 1. 1


C.

10.200. 1.49


D.

10.200. 1.99


Expert Solution
Questions # 9:

Which statement is correct regarding the use of application control for inspecting web applications?

Options:

A.

Application control can identity child and parent applications, and perform different actions on them.


B.

Application control signatures are organized in a nonhierarchical structure.


C.

Application control does not require SSL inspection to identity web applications.


D.

Application control does not display a replacement message for a blocked web application.


Expert Solution
Questions # 10:

An administrator has configured the following settings:

Question # 10

What are the two results of this configuration? (Choose two.)

Options:

A.

Device detection on all interfaces is enforced for 30 minutes.


B.

Denied users are blocked for 30 minutes.


C.

A session for denied traffic is created.


D.

The number of logs generated by denied traffic is reduced.


Expert Solution
Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions