Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Network Security Expert > NSE4_FGT_AD-7.6

NSE4_FGT_AD-7.6 Fortinet NSE 4 - FortiOS 7.6 Administrator Question and Answers

Question # 4

Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity. What must the administrator configure to answer this specific request from the NOC team?

A.

Increase the admintimeout value under config system accprofile noc Access.

B.

increase the of line value of the override idle Timeout parameter in the NOC_Access admin profile.

C.

Move NOC_Access to the top of the list to ensure all profile settings take effect.

D.

Ensure that all NOC_Access users are assigned the super_admin role to guarantee access.

Full Access
Question # 5

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

A.

FortiGate uses the AD server as the collector agent.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.

FortiGate does not support workstation check.

D.

FortiGate directs the collector agent to use a remote LDAP server.

Full Access
Question # 6

When configuring firewall policies which of the following is true regarding the policy ID? (Choose two.)

A.

A firewall policy ID identifies the order of policy execution in firewall policies.

B.

A policy ID cannot be modified once a policy is created.

C.

You can create a policy in CLI with policy ID 0

D.

It is mandatory to provide a policy ID while creating a firewall policy regardless of GUI or CLI.

Full Access
Question # 7

Refer to the exhibit.

An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

A.

The ABC Com is hitting the category Excessive-Bandwidth.

B.

The ABC.Com Type is set as Application instead of Filter.

C.

The ABC.Com is configured under application profile, which must be configured as a web filter profile.

D.

The ABC Com Action is set to Allow

Full Access
Question # 8

Which three statements about SD-WAN performance SLAs are true? (Choose three.)

A.

They rely on session loss and jitter.

B.

They monitor the state of the FortiGate device.

C.

All the SLA targets can be configured.

D.

They are applied in a SD-WAN rule lowest cost strategy.

E.

They can be measured actively or passively.

Full Access
Question # 9

There are multiple dialup IPsec VPNs configured in aggressive mode on the HQ FortiGate. The requirement is to connect dial-up users to their respective department VPN tunnels.

Which phase 1 setting you can configure to match the user to the tunnel?

A.

Local Gateway

B.

Dead Peer Detection

C.

Peer ID

D.

IKE Mode Config

Full Access
Question # 10

A network administrator is reviewing firewall policies in both Interface Pair View and By Sequence View. The policies appear in a different order in each view. Why is the policy order different in these two views?

A.

By Sequence View groups policies based on rule priority, while Interface Pair View always follows the order of traffic logs.

B.

The firewall dynamically reorders policies in Interface Pair View based on recent traffic patterns, but By Sequence View remains static.

C.

Interface Pair View sorts policies based on matching interfaces, while By Sequence View shows the actual processing order of rules.

D.

Policies in Interface Pair View are prioritized by security levels, while By Sequence View strictly follows the administrator ' s manual ordering.

Full Access
Question # 11

When configuring the connection between FortiGate and FortiAnalyzer, which option indicates that reliable traffic is enabled? (Choose one answer)

A.

The connection status shows a green check icon

B.

The interface status is set to up

C.

A padlock icon appears in the connection settings

D.

The logging mode is set to real-time

Full Access
Question # 12

The FortiGate device HQ-NGFW-1 with the IP address 10.0.13.254 sends logs to the FortiAnalyzer device with the IP address 10.0.13.125. The administrator wants to verify that reliable logging is enabled on HQ-NGFW-1.

Which exhibit helps with the verification?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

FortiGate is integrated with FortiAnalyzer and FortiManager.

When creating a firewall policy, which attribute must an administrator include to enhance functionality and enable log recording on FortiAnalyzer and FortiManager?

A.

Universally Unique Identifier

B.

Policy ID

C.

Sequence ID

D.

Log ID

Full Access
Question # 14

You have configured the below commands on a FortiGate.

What would be the impact of this configuration on FortiGate?

A.

FortiGate will enable strict RPF on all its interfaces and porti will be exempted from RPF checks.

B.

FortiGate will enable strict RPF on all its interfaces and porti will be enable for asymmetric routing.

C.

The global configuration will take precedence and FortiGate will enable strict RPF on all interfaces.

D.

Port1 will be enabled with flexible RPF. and all other interfaces will be enabled for strict RPF

Full Access
Question # 15

A network administrator enabled antivirus and selected an SSL inspection profile on a firewall policy. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and does not block the file, allowing it to be downloaded. The administrator confirms that the traffic matches the configured firewall policy. What are two reasons for the failed virus detection by FortiGate? (Choose two answers)

A.

The selected SSL inspection profile has certificate inspection enabled.

B.

The website is exempted from SSL inspection.

C.

The EICAR test file exceeds the protocol options oversize limit.

D.

The browser does not trust the FortiGate self-signed CA certificate.

Full Access
Question # 16

Refer to the exhibits.

A diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device are shown.

Two PCs. PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.

Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

A.

In the system settings, set Multiple Interface Policies to enable.

B.

in the IP pool configuration, set end ipto 100.65.0.112.

C.

In the firewall policy, set match-vip to enable using CLI.

D.

In the IP pool configuration, set type to overload.

Full Access
Question # 17

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name

FortiGate allows the traffic according to policy ID 1 placed at the top. This is the policy that allows SD-WAN traffic. Despite these settings, the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows

What could be the reason?

A.

SD-WAN rule names do not appear immediately. The administrator must refresh the page.

B.

There is no application control profile applied to the firewall policy.

C.

Destinations in the SD-WAN rules are configured for each application, but feature visibility is not enabled.

D.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

Full Access
Question # 18

Exhibits:

You are asked to implement an antivirus profile for files downloaded through FTP, HTTP, and HTTPS.

While testing, you are successful with HTTP and FTP protocols, but FortiGate does not block the file download over HTTPS.

What could be the cause?

A.

The feature set in the antivirus profile is not set to Flow-based.

B.

Web filter is not enabled on the firewall policy to complement the antivirus profile.

C.

The action on the firewall policy is not set to deny.

D.

The SSL inspection mode in the firewall policy is not deep content inspection.

Full Access
Question # 19

An administrator wanted to configure an IPS sensor to block traffic that triggers the signature set number of times during a specific time period. How can the administrator achieve the objective?

A.

Use IPS group signatures, set rate-mode 60.

B.

Use IPS packet logging option with periodical filter option.

C.

Use IPS signatures, rate-mode periodical option.

D.

Use IPS filter, rate-mode periodical option.

Full Access
Question # 20

Refer to the exhibit

A firewall policy to enable active authentication is shown.

When attempting to access an external website using an active authentication method, the user is not presented with a login prompt. What is the most likely reason for this situation?

A.

No matching user account exists for this user.

B.

The Remote-users group must be set up correctly in the FSSO configuration.

C.

The Remote-users group is not added to the Destination

D.

The Service DNS is required in the firewall policy.

Full Access
Question # 21

Refer to the exhibit.

A RADIUS server configuration is shown.

An administrator added a configuration for a new RADIUS server While configuring, the administrator enabled Include in every user group What is the impact of enabling Include in every user group in a RADIUS configuration?

A.

This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group.

B.

This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case, is FortiAuthenticator.

C.

This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group.

D.

This option places all users into every RADIUS user group, including groups that are used for the LDAP server on FortiGate.

Full Access
Question # 22

Refer to the exhibit.

Which two ways can you view the log messages shown in the exhibit? (Choose two.)

A.

By right clicking the implicit deny policy

B.

Using the FortiGate CLI command diagnose log test

C.

By filtering by policy universally unique identifier (UUID) and application name in the log entry

D.

In the Forward Traffic section

Full Access
Question # 23

Refer to the exhibit.

An administrator has created a new firewall address to use as the destination for a static route. Why is the administrator not able to select the new address in the Destination field of the new static route? (Choose one answer)

A.

In the new static route, the administrator must select Named Address.

B.

In the new firewall address, the FQDN address must first be resolved.

C.

In the new static route, the administrator must first set the interface to port2.

D.

In the new firewall address, Routing configuration must be enabled.

Full Access
Question # 24

Refer to the exhibit.

Why is the Antivirus scan switch grayed out when you are creating a new antivirus profile for FTP?

A.

Antivirus scan is disabled under System - > Feature visibility

B.

None of the inspected protocols are active in this profile.

C.

The Feature Set for the profile is Flow-based but it must be Proxy-based

D.

FortiGate. with less than 2 GB RAM. does not support the Antivirus scan feature.

Full Access
Question # 25

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three answers)

A.

Lowest Cost (SLA) without load balancing

B.

Manual with load balancing

C.

Lowest Quality (SLA) with load balancing

D.

Lowest Cost (SLA) with load balancing

E.

Best Quality with load balancing

Full Access
Question # 26

What are three key routing principles in SD-WAN? (Choose three answers)

A.

By default, SD-WAN rules are skipped if the included SD-WAN members do not have a valid route to the destination.

B.

SD-WAN rules have precedence over any other type of routes.

C.

Regular policy routes have precedence over SD-WAN rules.

D.

By default, SD-WAN rules are skipped if only one route to the destination is available.

E.

By default, SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member.

Full Access