Fortinet Actualtests NSE4-FGT-6 0 v2019-02-06 by Perry 40q PDF
Fortinet Actualtests NSE4-FGT-6 0 v2019-02-06 by Perry 40q PDF
Fortinet Actualtests NSE4-FGT-6 0 v2019-02-06 by Perry 40q PDF
Number: NSE4_FGT-6.0
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
NSE4_FGT-6.0
VCEConvert.com
Exam A
QUESTION 1
A company needs to provide SSL VPN access to two user groups. The company also needs to display different
welcome messages on the SSL VPN login screen for both user groups.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
An administrator has configured central DNAT and virtual IPs. Which of the following can be selected in the
firewall policy Destination field?
A. A VIP group
B. The mapped IP address object of the VIP object
C. A VIP object
D. An IP pool
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which statement about FortiGuard services for FortiGate is true?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
View the exhibit.
VCEConvert.com
Based on this output, which statements are correct? (Choose two.)
A. The all VDOM is not synchronized between the primary and secondary FortiGate devices.
B. The root VDOM is not synchronized between the primary and secondary FortiGate devices.
C. The global configuration is synchronized between the primary and secondary FortiGate devices.
D. The FortiGate devices have three VDOMs.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
VCEConvert.com
Which statement is true regarding SSL VPN timers? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
When using SD-WAN, how do you configure the next-hop gateway address for a member interface so that
FortiGate can forward Internet traffic?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Which of the following statements describe WMI polling mode for the FSSO collector agent? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Which statements about DNS filter profiles are true? (Choose two.)
Correct Answer: CD
Section: (none)
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 9
An administrator has configured a dialup IPsec VPN with XAuth. Which statement best describes what occurs
during this scenario?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
An administrator has configured two VLAN interfaces:
A DHCP server is connected to the VLAN10 interface. A DHCP client is connected to the VLAN5 interface.
However, the DHCP client cannot get a dynamic IP address from the DHCP server. What is the cause of the
problem?
Correct Answer: A
Section: (none)
Explanation
VCEConvert.com
Explanation/Reference:
QUESTION 11
You are configuring the root FortiGate to implement the security fabric. You are configuring port10 to
communicate with a downstream FortiGate. View the default Edit Interface in the exhibit below:
When configuring the root FortiGate to communicate with a downstream FortiGate, which settings are required
to be configured? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
VCEConvert.com
QUESTION 12
Which statements correctly describe transparent mode operation? (Choose three.)
A. All interfaces of the transparent mode FortiGate device must be on different IP subnets.
B. Ethernet packets are forwarded based on destination MAC addresses, not IP addresses.
C. The transparent FortiGate is visible to network hosts in an IP traceroute.
D. It permits inline traffic inspection and firewalling without changing the IP scheme of the network.
E. FortiGate acts as transparent bridge and forwards traffic at Layer 2.
Explanation/Reference:
QUESTION 13
View the exhibit.
A. This setup requires at least two firewall policies with the action set to IPsec.
B. Dead peer detection must be disabled to support this type of IPsec setup.
C. The TunnelB route is the primary route for reaching the remote site. The TunnelA route is used only if the
TunnelB VPN is down.
D. This is a redundant IPsec setup.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
VCEConvert.com
Which one of the following processes is involved in updating IPS from FortiGuard?
A. FortiGate IPS update requests are sent using UDP port 443.
B. Protocol decoder update requests are sent to service.fortiguard.net.
C. IPS signature update requests are sent to update.fortiguard.net.
D. IPS engine updates can only be obtained using push updates.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
Which of the following conditions are required for establishing an IPSec VPN between two FortiGate devices?
(Choose two.)
A. If XAuth is enabled as a server in one peer, it must be enabled as a client in the other peer.
B. If the VPN is configured as route-based, there must be at least one firewall policy with the action set to
IPSec.
C. If the VPN is configured as DialUp User in one peer, it must be configured as either Static IP Address or
Dynamic DNS in the other peer.
D. If the VPN is configured as a policy-based in one peer, it must also be configured as policy-based in the
other peer.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
View the exhibit.
VCEConvert.com
Why is the administrator getting the error shown in the exhibit?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Examine the network diagram and the existing FGTI routing table shown in the exhibit, and then answer the
following question:
VCEConvert.com
An administrator has added the following static route on FGTI.
Since the change, the new static route is not showing up in the routing table. Given the information provided,
which of the following describes the cause of this problem?
Correct Answer: C
Section: (none)
Explanation
VCEConvert.com
Explanation/Reference:
QUESTION 18
View the exhibit.
Which users and user groups are allowed access to the network through captive portal?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
NGFW mode allows policy-based configuration for most inspection rules. Which security profile’s configuration
does not change when you enable policy-based inspection?
A. Web filtering
B. Antivirus
C. Web proxy
D. Application control
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
During the digital verification process, comparing the original and fresh hash results satisfies which security
requirement?
A. Authentication.
B. Data integrity.
C. Non-repudiation.
D. Signature verification.
Correct Answer: D
Section: (none)
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 21
Why must you use aggressive mode when a local FortiGate IPSec gateway hosts multiple dialup tunnels?
A. In aggressive mode, the remote peers are able to provide their peer IDs in the first message.
B. FortiGate is able to handle NATed connections only in aggressive mode.
C. FortiClient only supports aggressive mode.
D. Main mode does not support XAuth for user authentication.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
An employee connects to the https://example.com on the Internet using a web browser. The web server’s
certificate was signed by a private internal CA. The FortiGate that is inspecting this traffic is configured for full
SSL inspection.
This exhibit shows the configuration settings for the SSL/SSH inspection profile that is applied to the policy that
is invoked in this instance. All other settings are set to defaults. No certificates have been imported into
FortiGate. View the exhibit and answer the question that follows.
VCEConvert.com
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
Examine the exhibit, which shows the output of a web filtering real time debug.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
Which of the following statements are best practices for troubleshooting FSSO? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
When override is enabled, which of the following shows the process and selection criteria that are used to elect
the primary FortiGate in an HA cluster?
VCEConvert.com
A. Connected monitored ports > HA uptime > priority > serial number
B. Priority > Connected monitored ports > HA uptime > serial number
C. Connected monitored ports > priority > HA uptime > serial number
D. HA uptime > priority > Connected monitored ports > serial number
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
Examine the IPS sensor configuration shown in the exhibit, and then answer the question below.
What are the expected actions if traffic matches this IPS sensor? (Choose two.)
A. The sensor will gather a packet log for all matched traffic.
B. The sensor will not block attackers matching the A32S.Botnet signature.
C. The sensor will block all attacks for Windows servers.
D. The sensor will reset all connections that match these signatures.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
How can you block or allow to Twitter using a firewall policy?
VCEConvert.com
A. Configure the Destination field as Internet Service objects for Twitter.
B. Configure the Action field as Learn and select Twitter.
C. Configure the Service field as Internet Service objects for Twitter.
D. Configure the Source field as Internet Service objects for Twitter.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
An administrator has configured a route-based IPsec VPN between two FortiGate devices. Which statement
about this IPsec VPN configuration is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
If the Issuer and Subject values are the same in a digital certificate, which type of entity was the certificate
issued to?
A. A CRL
B. A person
C. A subordinate CA
D. A root CA
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
What settings must you configure to ensure FortiGate generates logs for web filter activity on a firewall policy
called Full Access? (Choose two.)
Correct Answer: BC
Section: (none)
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 31
View the exhibit:
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Which action can be applied to each filter in the application control profile?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
View the exhibit.
VCEConvert.com
Based on the configuration shown in the exhibit, what statements about application control behavior are true?
(Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
HTTP Public Key Pinning (HPKP) can be an obstacle to implementing full SSL inspection. What solutions could
resolve this problem? (Choose two.)
A. Enable Allow Invalid SSL Certificates for the relevant security profile.
B. Change web browsers to one that does not support HPKP.
C. Exempt those web sites that use HPKP from full SSL inspection.
D. Install the CA certificate (that is required to verify the web server certificate) stores of users’ computers.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
View the exhibit.
VCEConvert.com
What does this raw log indicate? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
Which of the following statements are true when using WPAD with the DHCP discovery method? (Choose two.)
A. If the DHCP method fails, browsers will try the DNS method.
B. The browser needs to be preconfigured with the DHCP server’s IP address.
C. The browser sends a DHCPONFORM request to the DHCP server.
D. The DHCP server provides the PAC file for download.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Which of the following statements about the FSSO collector agent timers is true?
VCEConvert.com
A. The workstation verify interval is used to periodically check of a workstation is still a domain member.
B. The IP address change verify interval monitors the server IP address where the collector agent is
installed, and the updates the collector agent configuration if it changes.
C. The user group cache expiry is used to age out the monitored groups.
D. The dead entry timeout interval is used to age out entries with an unverified status.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
A FortiGate device has multiple VDOMs. Which statement about an administrator account configured with the
default prof_admin profile is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
By default, when logging to disk, when does FortiGate delete logs?
A. 30 days
B. 1 year
C. Never
D. 7 days
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
Examine the exhibit, which contains a session diagnostic output.
VCEConvert.com
Which of the following statements about the session diagnostic output is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
VCEConvert.com