New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Network Security Expert > NSE4_FGT_AD-7.6

NSE4_FGT_AD-7.6 Fortinet NSE 4 - FortiOS 7.6 Administrator Question and Answers

Question # 4

Refer to the exhibit.

The predefined deep-inspection and custom-deep-inspection profiles exclude some web categories from SSL inspection, as shown in the exhibit For which two reasons are these web categories exempted? (Choose two.)

A.

The resources utilization is optimized because these websites are in the trusted domain list on FortiGate.

B.

The legal regulation aims to prioritize user privacy and protect sensitive information for these websites.

C.

These websites are in an allowlist of reputable domain names maintained by FortiGuard.

D.

The FortiGate temporary certificate denies the browser's access to websites that use HTTP Strict Transport Security.

Full Access
Question # 5

Refer to the exhibits.

A diagram of a FortiGate device connected to the network VIP object and firewall policy configurations are shown.

The WAN (port2) interface has the IP address

100.65.0.101/24.

The LAN (port4) interface has the IP address

10.0.11.254/24.

If the host 100.65.1.111 sends a TCP SYN packet on port 443 to 100.65.0.200. what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?

A.

10.0.11.254, 100.65.0.200. and 443, respectively

B.

10.0.11.254, 10.0.15.50, and 4443. respectively

C.

100.65.1. ill, 10.0.11.50, and 4443. respectively

D.

100.65.1.111, 10.0.11.50. and 443. respectively

Full Access
Question # 6

Refer to the exhibit.

Which two ways can you view the log messages shown in the exhibit? (Choose two.)

A.

By right clicking the implicit deny policy

B.

Using the FortiGate CLI command diagnose log test

C.

By filtering by policy universally unique identifier (UUID) and application name in the log entry

D.

In the Forward Traffic section

Full Access
Question # 7

You have created a web filter profile named restrictmedia-profile with a daily category usage quota.

When you are adding the profile to the firewall policy, the restrict_media-profile is not listed in the available web profile drop down.

What could be the reason?

A.

The web filter profile is already referenced in another firewall policy.

B.

The firewall policy is in no-inspection mode instead of deep-inspection.

C.

The naming convention used in the web filter profile is restricting it in the firewall policy.

D.

The inspection mode in the firewall policy is not matching with web filter profile feature set.

Full Access
Question # 8

What are two features of collector agent advanced mode? (Choose two.)

A.

In advanced mode, security profiles can be applied only to user groups, not individual users.

B.

In advanced mode. FortiGate can be configured as an LDAP client and group filters can be configured on FortiGate.

C.

Advanced mode uses the Windows convention—NetBios: Domain\Username.

D.

Advanced mode supports nested or inherited groups.

Full Access
Question # 9

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name

FortiGate allows the traffic according to policy ID 1 placed at the top. This is the policy that allows SD-WAN traffic. Despite these settings, the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows

What could be the reason?

A.

SD-WAN rule names do not appear immediately. The administrator must refresh the page.

B.

There is no application control profile applied to the firewall policy.

C.

Destinations in the SD-WAN rules are configured for each application, but feature visibility is not enabled.

D.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

Full Access
Question # 10

An administrator has configured a dialup IPsec VPN on FortiGate with add-route enabled. However, the static route is not showing in the routing table. Which two statements about this scenario are correct? (Choose two.)

A.

The administrator must use a policy route instead of a static route for add-route to work properly.

B.

The administrator must ensure phase 2 is successfully established

C.

The administrator must define the remote network correctly in the phase 2 selectors.

D.

The administrator must enable a dynamic routing protocol on the dialup interface.

Full Access
Question # 11

Refer to the exhibit.

Why is the Antivirus scan switch grayed out when you are creating a new antivirus profile for FTP?

A.

Antivirus scan is disabled under System -> Feature visibility

B.

None of the inspected protocols are active in this profile.

C.

The Feature Set for the profile is Flow-based but it must be Proxy-based

D.

FortiGate. with less than 2 GB RAM. does not support the Antivirus scan feature.

Full Access
Question # 12

Refer to the exhibit.

An SD-WAN zone configuration on the FortiGate GUI is shown. Based on the exhibit, which statement is true?

A.

The Underlay zone contains no member.

B.

The virtual-wan-link and overlay zones can be deleted

C.

The Underlay zone is the zone by default.

D.

port2 and port3 are not assigned to a zone.

Full Access
Question # 13

There are multiple dialup IPsec VPNs configured in aggressive mode on the HQ FortiGate. The requirement is to connect dial-up users to their respective department VPN tunnels.

Which phase 1 setting you can configure to match the user to the tunnel?

A.

Local Gateway

B.

Dead Peer Detection

C.

Peer ID

D.

IKE Mode Config

Full Access
Question # 14

Refer to the exhibit.

Based on this partial configuration, what are the two possible outcomes when FortiGate enters conserve mode? (Choose two.)

A.

FortiGate drops new sessions requiring inspection.

B.

Administrators must restart FortiGate to allow new sessions.

C.

Administrators cannot change the configuration.

D.

FortiGate skips quarantine actions.

Full Access
Question # 15

Refer to the exhibits.

A diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device are shown.

Two PCs. PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.

Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

A.

In the system settings, set Multiple Interface Policies to enable.

B.

in the IP pool configuration, set end ipto 100.65.0.112.

C.

In the firewall policy, set match-vip to enable using CLI.

D.

In the IP pool configuration, set type to overload.

Full Access