Fortinet NSE4-5.4 Exam Practice Questions (P. 4)
- Full Access (575 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
Which statements about application control are true? (Choose two.)
- AEnabling application control profile in a security profile enables application control for all the traffic flowing through the FortiGate.
- BIt cannot take an action on unknown applications.
- CIt can inspect encrypted traffic.
- DIt can identify traffic from known applications, even when they are using non-standard TCP/UDP ports.
Correct Answer:
CD
CD
send
light_mode
delete
Question #32
View the exhibit.

The client cannot connect to the HTTP web server. The administrator run the FortiGate built-in sniffer and got the following output:

What should be done next to troubleshoot the problem?

The client cannot connect to the HTTP web server. The administrator run the FortiGate built-in sniffer and got the following output:

What should be done next to troubleshoot the problem?
- AExecute another sniffer in the FortiGate, this time with the filter ג€host 10.0.1.10ג€.
- BRun a sniffer in the web server.
- CCapture the traffic using an external sniffer connected to port1.
- DExecute a debug flow.
Correct Answer:
B
B
send
light_mode
delete
Question #33
Which of the following statements about NTLM authentication are correct? (Choose two.)
- AIt is useful when users log in to DCs that are not monitored by a collector agent.
- BIt takes over as the primary authentication method when configured alongside FSSO.
- CMulti-domain environments require DC agents on every domain controller.
- DNTLM-enabled web browsers are required.
Correct Answer:
AD
AD
send
light_mode
delete
Question #34
What FortiGate feature can be used to allow IPv6 clients to connect to IPv4 servers?
- AIPv6-over-IPv4 IPsec
- BNAT64
- CIPv4-over-IPv6 IPsec
- DNAT66
Correct Answer:
B
Reference:
http://help.fortinet.com/fos50hlp/52data/Content/FortiOS/fortigate-firewall-52/Concepts/NAT%2064%20and%20NAT46.htm
B
Reference:
http://help.fortinet.com/fos50hlp/52data/Content/FortiOS/fortigate-firewall-52/Concepts/NAT%2064%20and%20NAT46.htm
send
light_mode
delete
Question #35
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
- AIt requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.
- BADVPN is only supported with IKEv2.
- CTunnels are negotiated dynamically between spokes.
- DEvery spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2 proposals are defined in advance.
Correct Answer:
AC
AC
send
light_mode
delete
Question #36
View the exhibit.

Which statements about the exhibit are true? (Choose two.)

Which statements about the exhibit are true? (Choose two.)
- Aport1-VLAN10 and port2-VLAN10 can be assigned to different VDOMs.
- Bport1-VLAN1 is the native VLAN for the port1 physical interface.
- CTraffic between port1-VLAN1 and port2-VLAN1 is allowed by default.
- DBroadcast traffic received in port1-VLAN10 will not be forwarded to port2-VLAN10.
Correct Answer:
AD
AD
send
light_mode
delete
Question #37
Which statement about the firewall policy authentication timeout is true?
- AIt is a hard timeout. The FortiGate removes the temporary policy for a user's source IP address after this times expires.
- BIt is a hard timeout. The FortiGate removes the temporary policy for a user's source MAC address after this times expires.
- CIt is an idle timeout. The FortiGate considers a user to be idle if it does not see any packets coming from the user's source MAC address.
- DIt is an idle timeout. The FortiGate considers a user to be idle if it does not see any packets coming from the user's source IP.
Correct Answer:
D
D
send
light_mode
delete
Question #38
Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
send
light_mode
delete
Question #39
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate take?
- AIt blocks all future traffic for that IP address for a configured interval.
- BIt archives the data for that IP address.
- CIt provides a DLP block replacement page with a link to download the file.
- DIt notifies the administrator by sending an email.
Correct Answer:
A
A
send
light_mode
delete
Question #40
How can a browser trust a web-server certificate signed by a third party CA?
- AThe browser must have the CA certificate that signed the web-server certificate installed.
- BThe browser must have the web-server certificate installed.
- CThe browser must have the private key of CA certificate that signed the web-browser certificate installed.
- DThe browser must have the public key of the web-server certificate installed.
Correct Answer:
A
A
send
light_mode
delete
All Pages