Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Network Security Expert > NSE4_FGT_AD-7.6

NSE4_FGT_AD-7.6 Fortinet NSE 4 - FortiOS 7.6 Administrator Question and Answers

Question # 4

You are onboarding an agentless, secure web gateway (SWG) endpoint for secure internet access (SIA). What will happen to the user ' s nonweb traffic? (Choose one answer)

A.

All the nonweb traffic will bypass FortiSASE.

B.

The endpoint will use split tunneling to redirect nonweb traffic to FortiSASE.

C.

FortiSASE will use Firewall-as-a-Service (FWaaS) to redirect nonweb traffic.

D.

FortiSASE will use SWG to redirect nonweb traffic to FortiExtender.

Full Access
Question # 5

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

A.

Select port1 and port2 subnets in a single firewall policy.

B.

Create an Aggregate interface that includes port1 and port2 to create a single firewall policy.

C.

Replace port1 and port2 with the any interface in a single firewall policy.

D.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy.

Full Access
Question # 6

Refer to the exhibit.

Based on the routing table shown in the exhibit, which two statements are true? (Choose two.)

A.

A packet with the source IP address 10.0.13.10 arriving on port2 is allowed if strict RPF is disabled.

B.

A packet with the source IP address 10.100.110.10 arriving on port2 is allowed if strict RPF is enabled.

C.

A packet with the source IP address 10.100.110.10 arriving on port3 is allowed if strict RPF is disabled.

D.

A packet with the source IP address 10.10.10.10 arriving on port2 is allowed if strict RPF is enabled.

Full Access
Question # 7

An administrator wanted to configure an IPS sensor to block traffic that triggers the signature set number of times during a specific time period. How can the administrator achieve the objective?

A.

Use IPS group signatures, set rate-mode 60.

B.

Use IPS packet logging option with periodical filter option.

C.

Use IPS signatures, rate-mode periodical option.

D.

Use IPS filter, rate-mode periodical option.

Full Access
Question # 8

A new administrator is configuring FSSO authentication on FortiGate using DC Agent Mode. Which step is not part of the expected process?

A.

The DC agent sends login event data directly to FortiGate.

B.

FortiGate determines user identity based on the IP address in the FSSO list.

C.

The collector agent forwards login event data to FortiGate.

D.

The user logs into the windows domain.

Full Access
Question # 9

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile.

B.

The matching firewall policy is set to proxy inspection mode.

C.

The browser does not trust the certificate used by FortiGate for SSL inspection.

D.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

Full Access
Question # 10

Refer to the exhibit.

A partial cloud topology is shown.

You deployed a FortiGate Cloud-Native Firewall (CNF) in AWS.

During the deployment, which components must the FortiGate CNF create to handle traffic from the EC2 instance?

A.

The customer VPC and GWLBe

B.

The gateway load balancer endpoint (GWLBe) in the customer virtual private cloud (VPC)

C.

The CNF VPC. customer VPC. and GWLB

D.

The GWLB. GWLBe, and the internet gateway (IGW) in the customer VPC

Full Access
Question # 11

What are three key routing principles in SD-WAN? (Choose three answers)

A.

By default, SD-WAN rules are skipped if the included SD-WAN members do not have a valid route to the destination.

B.

SD-WAN rules have precedence over any other type of routes.

C.

Regular policy routes have precedence over SD-WAN rules.

D.

By default, SD-WAN rules are skipped if only one route to the destination is available.

E.

By default, SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member.

Full Access
Question # 12

An administrator configures FortiGuard servers as DNS servers on FortiGate using default settings.

What is true about the DNS connection to a FortiGuard server?

A.

It uses UDP 53.

B.

It uses DNS over HTTPS.

C.

It uses DNS over TLS.

D.

It uses UDP 8888.

Full Access
Question # 13

An administrator wants to address shadow IT visibility challenges and prevent users from sending sensitive files outside the organization without proper approval. Which FortiSASE method should the administrator implement to achieve these goals? (Choose one answer)

A.

Secure SD-WAN access (SSD-WAN)

B.

Secure private access (SPA)

C.

Secure SaaS access (SSA)

D.

Secure internet access (SIA)

Full Access
Question # 14

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.

Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

A.

On HQ-NGFW, disable Diffie-Hellman group 2.

B.

On HQ-NGFW, set IKE mode to Main (ID protection).

C.

On BR1-FGT, set port2 to Interface.

D.

On both FortiGate devices, set Dead Peer Detection to On Demand.

Full Access
Question # 15

Which two statements describe characteristics of automation stitches? (Choose two answers)

A.

Actions involve only devices included in the Security Fabric.

B.

An automation stitch can have multiple triggers.

C.

Multiple actions can run in parallel.

D.

Triggers can involve external connectors.

Full Access
Question # 16

Which two statements are true about an HA cluster? (Choose two answers)

A.

An HA cluster cannot have both in-band and out-of-band management interfaces at the same time.

B.

Link failover triggers a failover if the administrator sets the interface down on the primary device.

C.

When sniffing the heartbeat interface, the administrator must see the IP address 169.254.0.2.

D.

HA incremental synchronization includes FIB entries and IPsec SAs.

Full Access
Question # 17

Refer to the exhibit.

Based on this partial configuration, what are the two possible outcomes when FortiGate enters conserve mode? (Choose two.)

A.

FortiGate drops new sessions requiring inspection.

B.

Administrators must restart FortiGate to allow new sessions.

C.

Administrators cannot change the configuration.

D.

FortiGate skips quarantine actions.

Full Access
Question # 18

An administrator has configured the following settings.

config system settings

set ses-denied-traffic enable

end

config system global

set block-session-timer 30

end

What are the two results of this configuration? (Choose two.)

A.

The number of logs generated by denied traffic is reduced.

B.

A session for denied traffic is created.

C.

Denied users are blocked for 30 minutes.

D.

Session helpers are disabled for denied traffic.

Full Access
Question # 19

Refer to the exhibit.

What would be the impact of these settings on the Server certificate SNI check configuration on FortiGate?

A.

FortiGate will accept and use the CN in the server certificate for URL filtering if the SNI does not match the CN or SAN fields.

B.

FortiGate will accept the connection with a warning if the SNI does not match the CN or SAN fields.

C.

FortiGate will close the connection if the SNI does not match the CN or SAN fields.

D.

FortiGate will close the connection if the SNI does not match the CN and SAN fields

Full Access
Question # 20

Refer to the exhibit showing a debug flow output.

Which two conclusions can you make from the debug flow output? (Choose two answers)

A.

The default gateway is configured on port2.

B.

The RPF check fails.

C.

The debug flow is for UDP traffic.

D.

The matching firewall policy denies the traffic.

Full Access
Question # 21

Refer to the exhibit.

A routing table is shown

An administrator wants to create a new static route so the traffic to the subnet 172.20.1.0/24 is routed through port2 only. What are the two criteria that the administrator can use to achieve this objective? (Choose two.)

A.

The new static route must have the priority set to 3.

B.

The new static route must have the metric set to 1.

C.

The existing static route through port3 must have the distance set to 11.

D.

The new static route must have the distance set to 9

Full Access
Question # 22

You have created a web filter profile named restrictmedia-profile with a daily category usage quota.

When you are adding the profile to the firewall policy, the restrict_media-profile is not listed in the available web profile drop down.

What could be the reason?

A.

The web filter profile is already referenced in another firewall policy.

B.

The firewall policy is in no-inspection mode instead of deep-inspection.

C.

The naming convention used in the web filter profile is restricting it in the firewall policy.

D.

The inspection mode in the firewall policy is not matching with web filter profile feature set.

Full Access
Question # 23

Refer to the exhibits.

The exhibits show the system performance output and default configuration of high memory usage thresholds on a FortiGate device.

Based on the system performance output, what are the two possible outcomes? (Choose two.)

A.

FortiGate drops new sessions.

B.

Administrators can access FortiGate only through the console port.

C.

Administrators can change the configuration.

D.

FortiGate has entered conserve mode.

Full Access
Question # 24

Refer to the exhibits.

A web filter profile configuration and firewall policy configuration are shown.

You are trying to access www. facebook.com, but you are redirected to a FortiGuard web filtering block page.

Based on the exhibits, what is the possible cause of the issue?

A.

The web rating override configuration is incorrect.

B.

The web filter profile feature set is configured incorrectly.

C.

The firewall policy inspection mode is incorrect.

D.

For www. facebook. com. the URL filter action is incorrect.

Full Access
Question # 25

Which three statements explain a flow-based antivirus profile? (Choose three answers)

A.

FortiGate buffers the whole file but transmits to the client at the same time.

B.

Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.

C.

If a virus is detected, the last packet is delivered to the client.

D.

Flow-based inspection optimizes performance compared to proxy-based inspection.

E.

The IPS engine handles the process as a standalone.

Full Access
Question # 26

Refer to the exhibits.

The system performance output and default configuration of high memory usage thresholds on a FortiGate device are shown.

Based on the system performance output, what are the two possible outcomes? (Choose two.)

A.

Administrators can access FortiGate only through the console port.

B.

FortiGate has entered conserve mode.

C.

FortiGate drops new sessions.

D.

Administrators can change the configuration.

Full Access
Question # 27

Refer to the exhibit to view the firewall policy.

Why would the firewall policy not block a well-known virus, for example EICAR? (Choose one answer)

A.

The action on the firewall policy is not set to DENY.

B.

Web filter is not enabled, so the firewall policy does not complement the antivirus profile.

C.

The firewall policy is not configured in proxy-based inspection mode.

D.

The firewall policy does not apply deep content inspection.

Full Access