Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Fortinet Fortinet Network Security Expert NSE4_FGT_AD-7.6 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

A network administrator is reviewing firewall policies in both Interface Pair View and By Sequence View. The policies appear in a different order in each view. Why is the policy order different in these two views?

Options:

A.

By Sequence View groups policies based on rule priority, while Interface Pair View always follows the order of traffic logs.


B.

The firewall dynamically reorders policies in Interface Pair View based on recent traffic patterns, but By Sequence View remains static.


C.

Interface Pair View sorts policies based on matching interfaces, while By Sequence View shows the actual processing order of rules.


D.

Policies in Interface Pair View are prioritized by security levels, while By Sequence View strictly follows the administrator ' s manual ordering.


Expert Solution
Questions # 2:

Refer to the exhibit.

Question # 2

What would be the impact of these settings on the Server certificate SNI check configuration on FortiGate?

Options:

A.

FortiGate will accept and use the CN in the server certificate for URL filtering if the SNI does not match the CN or SAN fields.


B.

FortiGate will accept the connection with a warning if the SNI does not match the CN or SAN fields.


C.

FortiGate will close the connection if the SNI does not match the CN or SAN fields.


D.

FortiGate will close the connection if the SNI does not match the CN and SAN fields


Expert Solution
Questions # 3:

Refer to the exhibits.

Question # 3

Question # 3

You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.

Which two factors can you observe from these configurations? (Choose two.)

Options:

A.

YouTube access is blocked based on Excessive-Bandwidth Application and Filter override settings.


B.

Facebook access is blocked based on the category filter settings.


C.

Facebook access is allowed but you cannot play Facebook videos based on Video/Audio category filter settings.


D.

YouTube search is allowed based on the Google Application and Filter override settings.


Expert Solution
Questions # 4:

Refer to the exhibit.

Question # 4

Which two statements about the FortiGuard connection are true? (Choose two.)

Options:

A.

The weight increases as the number of failed packets rises


B.

You can configure unreliable protocols to communicate with FortiGuard Server.


C.

FortiGate identified the FortiGuard Server using DNS lookup.


D.

FortiGate is using the default port for FortiGuard communication.


Expert Solution
Questions # 5:

An administrator configures FortiGuard servers as DNS servers on FortiGate using default settings.

What is true about the DNS connection to a FortiGuard server?

Options:

A.

It uses UDP 53.


B.

It uses DNS over HTTPS.


C.

It uses DNS over TLS.


D.

It uses UDP 8888.


Expert Solution
Questions # 6:

You have configured the below commands on a FortiGate.

Question # 6

What would be the impact of this configuration on FortiGate?

Options:

A.

FortiGate will enable strict RPF on all its interfaces and porti will be exempted from RPF checks.


B.

FortiGate will enable strict RPF on all its interfaces and porti will be enable for asymmetric routing.


C.

The global configuration will take precedence and FortiGate will enable strict RPF on all interfaces.


D.

Port1 will be enabled with flexible RPF. and all other interfaces will be enabled for strict RPF


Expert Solution
Questions # 7:

Refer to the exhibit.

Question # 7

An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

Options:

A.

The ABC Com is hitting the category Excessive-Bandwidth.


B.

The ABC.Com Type is set as Application instead of Filter.


C.

The ABC.Com is configured under application profile, which must be configured as a web filter profile.


D.

The ABC Com Action is set to Allow


Expert Solution
Questions # 8:

Refer to the exhibit.

Question # 8

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up.

Based on the phase 2 configuration shown in the exhibit, which two configuration changes will bring phase 2 up? (Choose two.)

Options:

A.

On BR1-FGT, set Remote Address to 10.0.11.0/255.255.255.0.


B.

On HQ-NGFW. enable Diffie-Hellman Group 2.


C.

On BR1-FGT. set Seconds to 43200


D.

On HQ-NGFW. set Encryption to AES256.


Expert Solution
Questions # 9:

Refer to the exhibit.

A RADIUS server configuration is shown.

Question # 9

An administrator added a configuration for a new RADIUS server While configuring, the administrator enabled Include in every user group What is the impact of enabling Include in every user group in a RADIUS configuration?

Options:

A.

This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group.


B.

This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case, is FortiAuthenticator.


C.

This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group.


D.

This option places all users into every RADIUS user group, including groups that are used for the LDAP server on FortiGate.


Expert Solution
Questions # 10:

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

Options:

A.

FortiGate uses the AD server as the collector agent.


B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.


C.

FortiGate does not support workstation check.


D.

FortiGate directs the collector agent to use a remote LDAP server.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions