Downloaded From
Downloaded From
Downloaded From
89q
Number: NSE4-5.4
Passing Score: 800
Time Limit: 120 min
File Version: 2.0
NSE4-5.4
Version 2.0
VCEConvert.com
Exam A
QUESTION 1
A FortiGate interface is configured with the following commands:
A. IPv6 clients connected to port1 can use SLAAC to generate their IPv6 addresses.
B. FortiGate can provide DNS settings to IPv6 clients.
C. FortiGate can send IPv6 router advertisements (RAs.)
D. FortiGate can provide IPv6 addresses to DHCPv6 client.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection?
(Choose two.)
A. SP3
B. CP8
C. NP4
D. NP6
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Under what circumstance would you enable LEARN as the Action on a firewall policy?
A. You want FortiGate to compile security feature activity from various security-related logs, such as virus and
attack logs.
B. You want FortiGate to monitor a specific security profile in a firewall policy, and provide recommendations
for that profile.
VCEConvert.com
C. You want to capture data across all traffic and security vectors, and receive learning logs and a report with
recommendations.
D. You want FortiGate to automatically modify your firewall policies as it learns your networking behavior.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
What methods can be used to deliver the token code to a user who is configured to use two-factor
authentication? (Choose three.)
A. Code blocks
B. SMS phone message
C. FortiToken
D. Browser pop-up window
E. Email
Explanation/Reference:
QUESTION 5
You are tasked to architect a new IPsec deployment with the following criteria:
- There are two HQ sites that all satellite offices must connect to.
- The satellite offices do not need to communicate directly with other satellite offices.
- No dynamic routing will be used.
- The design should minimize the number of tunnels being configured.
A. Redundant
B. Hub-and-spoke
C. Partial mesh
D. Fully meshed
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
View the exhibit.
VCEConvert.com
Which of the following statements are correct? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Which statements about DNS filter profiles are true? (Choose two.)
Correct Answer: CD
Section: (none)
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 8
An administrator needs to offload logging to FortiAnalyzer from a FortiGate with an internal hard drive. Which
statements are true? (Choose two.)
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Which of the following statements describe WMI polling mode for FSSO collector agent? (Choose two.)
A. The collector agent does not need to search any security event logs.
B. WMI polling can increase bandwidth usage with large networks.
C. The NetSessionEnum function is used to track user logoffs.
D. The collector agent uses a Windows API to query DCs for user logins.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
An administrator observes that the port1 interface cannot be configured with an IP address. What can be the
reasons for that? (Choose three.)
Explanation/Reference:
QUESTION 11
View the example routing table.
VCEConvert.com
Which route will be selected when trying to reach 10.20.30.254?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as
the source of the HTTP request?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
What is FortiGate’s behavior when local disk logging is disabled?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
VCEConvert.com
What traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)
Explanation/Reference:
QUESTION 15
Which statements about One-to-One IP pool are true? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Which statements correctly describe transparent mode operation? (Choose three.)
A. All interfaces of the transparent mode FortiGate device must be on different IP subnets.
B. The transparent FortiGate is visible to network hosts in an IP traceroute.
C. It permits inline traffic inspection and firewalling without changing the IP scheme of the network.
D. Ethernet packets are forwarded based on destination MAC addresses, not IP addresses.
E. The FortiGate acts as transparent bridge and forwards traffic at Layer-2.
Explanation/Reference:
QUESTION 17
View the exhibit.
VCEConvert.com
What is the effect of the Disconnect Cluster Member operation as shown in the exhibit? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
What step is required an SSL VPN to access to an internal server using port forward mode?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
View the exhibit.
VCEConvert.com
This is a sniffer output of a telnet connection request from 172.20.120.186 to the port1 interface of FGT1.
Assuming telnet service is enabled for port1, which of the following statements correctly describes why FGT1
is not responding?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
An administrator needs to be able to view logs for application usage on your network. What configurations are
required to ensure that FortiGate generates logs for application usage activity? (Choose two.)
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
A company needs to provide SSL VPN access to two user groups. The company also needs to display different
welcome messages on the SSL VPN login screen for both user groups.
VCEConvert.com
B. Different SSL VPN realms for each group
C. Different virtual SSLVPN IP addresses for each group
D. Two firewall policies with different captive portals
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Examine the routing database.
A. The port3 default route has the lowest metric, making it the best route.
B. There will be eight routes active in the routing table.
C. The port3 default has a higher distance than the port1 and port2 default routes.
D. Both port1 and port2 default routers are active in the routing table.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
View the exhibit.
When a user attempts to connect to an HTTPS site, what is the expected result with this configuration?
VCEConvert.com
A. The user is required to authenticate before accessing sites with untrusted SSL certificates.
B. The user is presented with certificate warnings when connecting to sites that have untrusted SSL
certificates.
C. The user is allowed access all sites with untrusted SSL certificates, without certificate warnings.
D. The user is blocked from connecting to sites that have untrusted SSL certificates (no exception provided).
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
View the exhibit.
A. The GUI provides all the configuration options available for the port1 interface.
B. You cannot configure a static IP address for the port1 interface because it allows only DHCP addressing
mode.
C. Firewall policies can be created from only the port1 interface to any interface.
D. The port1 interface is reserved for management only.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
Which statement is true regarding the policy ID numbers of firewall policies?
VCEConvert.com
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to
SSL VPN. How can this be achieved?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
Which traffic inspection features can be executed by a security processor (SP)? (Choose three.)
Explanation/Reference:
QUESTION 28
An administrator has configured two VLAN interfaces:
VCEConvert.com
A DHCP server is connected to the VLAN10 interface. A DHCP client is connected to the VLAN5 interface.
However, the DHCP client cannot get a dynamic IP address from the DHCP server. What is the cause of the
problem?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
View the exhibit.
VCEConvert.com
A user behind the FortiGate is trying to go to http://www.addictinggames.com (Addicting.Games).
Based on this configuration, which statement is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
What are the purposes of NAT traversal in IPsec? (Choose two.)
Correct Answer: AB
Section: (none)
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 31
Which statements about application control are true? (Choose two.)
A. Enabling application control profile in a security profile enables application control for all the traffic flowing
through the FortiGate.
B. It cannot take an action on unknown applications.
C. It can inspect encrypted traffic.
D. It can identify traffic from known applications, even when they are using non-standard TCP/UDP ports.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
View the exhibit.
The client cannot connect to the HTTP web server. The administrator run the FortiGate built-in sniffer and got
the following output:
A. Execute another sniffer in the FortiGate, this time with the filter “host 10.0.1.10”.
B. Run a sniffer in the web server.
C. Capture the traffic using an external sniffer connected to port1.
D. Execute a debug flow.
Correct Answer: D
Section: (none)
Explanation
VCEConvert.com
Explanation/Reference:
QUESTION 33
Which of the following statements about NTLM authentication are correct? (Choose two.)
A. It is useful when users log in to DCs that are not monitored by a collector agent.
B. It takes over as the primary authentication method when configured alongside FSSO.
C. Multi-domain environments require DC agents on every domain controller.
D. NTLM-enabled web browsers are required.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
What FortiGate feature can be used to allow IPv6 clients to connect to IPv4 servers?
A. IPv6-over-IPv4 IPsec
B. NAT64
C. IPv4-over-IPv6 IPsec
D. NAT66
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
A. It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.
B. ADVPN is only supported with IKEv2.
C. Tunnels are negotiated dynamically between spokes.
D. Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2
proposals are defined in advance.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
View the exhibit.
VCEConvert.com
Which statements about the exhibit are true? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Which statement about the firewall policy authentication timeout is true?
A. It is a hard timeout. The FortiGate removes the temporary policy for a user’s source IP address after this
times expires.
B. It is a hard timeout. The FortiGate removes the temporary policy for a user’s source MAC address after this
times expires.
C. It is an idle timeout. The FortiGate considers a user to be idle if it does not see any packets coming from the
user’s source MAC address.
D. It is an idle timeout. The FortiGate considers a user to be idle if it does not see any packets coming from the
user’s source IP.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
Which of the following settings and protocols can be used to provide secure and restrictive administrative
access to FortiGate? (Choose three.)
A. Trusted host
B. HTTPS
C. Trusted authentication
D. SSH
E. FortiTelemetry
VCEConvert.com
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate
take?
A. It blocks all future traffic for that IP address for a configured interval.
B. It archives the data for that IP address.
C. It provides a DLP block replacement page with a link to download the file.
D. It notifies the administrator by sending an email.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
How can a browser trust a web-server certificate signed by a third party CA?
A. The browser must have the CA certificate that signed the web-server certificate installed.
B. The browser must have the web-server certificate installed.
C. The browser must have the private key of CA certificate that signed the web-browser certificate installed.
D. The browser must have the public key of the web-server certificate installed.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
How does FortiGate verify the login credentials of a remote LDAP user?
A. FortiGate sends the user entered credentials to the LDAP server for authentication.
B. FortiGate re-generates the algorithm based on the login credentials and compares it against the algorithm
stored on the LDAP server.
C. FortiGate queries its own database for credentials.
D. FortiGate queries the LDAP server for credentials.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
An administrator has enabled proxy-based antivirus scanning and configured the following settings:
VCEConvert.com
Which statement about the above configuration is true?
A. Files bigger than 10 MB are not scanned for viruses and will be blocked.
B. FortiGate scans only the first 10 MB of any file.
C. Files bigger than 10 MB are sent to the heuristics engine for scanning.
D. FortiGate scans the files in chunks of 10 MB.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
Examine this output from the diagnose sys top command:
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
An administrator has created a custom IPS signature. Where does the custom IPS signature have to be
applied?
VCEConvert.com
A. In an IPS sensor
B. In an interface.
C. In a DoS policy.
D. In an application control profile.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
An administrator wants to configure a FortiGate as a DNS server. The FortiGate must use its DNS database
first, and then relay all irresolvable queries to an external DNS server. Which of the following DNS method must
you use?
A. Non-recursive
B. Recursive
C. Forward to primary and secondary DNS
D. Forward to system DNS
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
Which statements about high availability (HA) for FortiGates are true? (Choose two.)
A. Virtual clustering can be configured between two FortiGate devices with multiple VDOM.
B. Heartbeat interfaces are not required on the primary device.
C. HA management interface settings are synchronized between cluster members.
D. Sessions handled by UTM proxy cannot be synchronized.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
Which of the following statements about central NAT are true? (Choose two.)
A. IP tool references must be removed from existing firewall policies before enabling central NAT.
B. Central NAT can be enabled or disabled from the CLI only.
C. Source NAT, using central NAT, requires at least one central SNAT policy.
D. Destination NAT, using central NAT, requires a VIP object as the destination address in a firewall policy.
Correct Answer: AC
Section: (none)
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 48
Which statement about the FortiGuard services for the FortiGate is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
Which statements about antivirus scanning using flow-based full scan are true? (Choose two.)
A. The antivirus engine starts scanning a file after the last packet arrives.
B. It does not support FortiSandbox inspection.
C. FortiGate can insert the block replacement page during the first connection attempt only if a virus is
detected at the start of the TCP stream.
D. It uses the compact antivirus database.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
An administrator has configured a route-based IPsec VPN between two FortiGates. Which statement about this
IPsec VPN configuration is true?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
What information is flushed when the chunk-size value is changed in the config dlp settings?
VCEConvert.com
B. The supported file types in the DLP filters
C. The archived files and messages
D. The file name patterns in the DLP filters
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
How does FortiGate select the central SNAT policy that is applied to a TCP session?
A. It selects the SNAT policy specified in the configuration of the outgoing interface.
B. It selects the first matching central-SNAT policy from top to bottom.
C. It selects the central-SNAT policy with the lowest priority.
D. It selects the SNAT policy specified in the configuration of the firewall policy that matches the traffic.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
When using WPAD DNS method, what is the FQDN format that browsers use to query the DNS server?
A. wpad.<local-domain>
B. srv_tcp.wpad.<local-domain>
C. srv_proxy.<local-domain>/wpad.dat
D. proxy.<local-domain>.wpad
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
An administrator is using the FortiGate built-in sniffer to capture HTTP traffic between a client and a server,
however, the sniffer output shows only the packets related with TCP session setups and disconnections. Why?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
VCEConvert.com
QUESTION 55
Which of the following statements about advanced AD access mode for FSSO collector agent are true?
(Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
Which configuration objects can be selected for the Source filed of a firewall policy? (Choose two.)
A. FQDN address
B. IP pool
C. User or user group
D. Firewall service
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
Examine the exhibit, which contains a virtual IP and a firewall policy configuration.
VCEConvert.com
The WAN(port1) interface has the IP address 10.200.1.1/24. The LAN(port2) interface has the IP address
10.0.1.254/24.
The top firewall policy has NAT enabled using outgoing interface address. The second firewall policy configured
with a virtual IP (VIP) as the destination address.
Which IP address will be used to source NAT the Internet traffic coming from a workstation with the IP address
10.0.1.10/24?
A. 10.200.1.1
B. 10.0.1.254
C. Any available IP address in the WAN(port1) subnet 10.200.1.0/24
D. 10.200.1.10
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
Which statement about data leak prevention (DLP) on a FortiGate is true?
VCEConvert.com
A. Traffic shaping can be applied to DLP sensors.
B. It can be applied to a firewall policy in a flow-based VDOM.
C. Files can be sent to FortiSandbox for detecting DLP threats.
D. It can archive files and messages.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
Which statements about an IPv6-over-IPv4 IPsec configuration are correct? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 60
Which statements about IP-based explicit proxy authentication are true? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
View the Exhibit.
The administrator needs to confirm that FortiGate 2 is properly routing that traffic to the 10.0.1.0/24 subnet. The
administrator needs to confirm it by sending ICMP pings to FortiGate 2 from the CLI of FortiGate 1. What ping
VCEConvert.com
option needs to be enabled before running the ping?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
How can you format the FortiGate flash disk?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 63
How do you configure inline SSL inspection on a firewall policy? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 64
Which traffic sessions can be offloaded to a NP6 processor? (Choose two.)
A. IPv6
B. RIP
C. GRE
D. NAT64
Correct Answer: AD
Section: (none)
Explanation
VCEConvert.com
Explanation/Reference:
QUESTION 65
View the exhibit.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 66
An administrator has blocked Netflix login in a cloud access security inspection (CASI) profile. The
administrator has also applied the CASI profile to a firewall policy.
A. You must enable logging for security events on the firewall policy.
B. You must activate a FortiCloud account.
C. You must apply an application control profile to the firewall policy.
D. You must enable SSL inspection on the firewall policy.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
VCEConvert.com
QUESTION 67
How does FortiGate look for a matching firewall policy to process traffic?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
How do you configure a FortiGate to do traffic shaping of P2P traffic, such as BitTorrent?
A. Apply an application control profile allowing BitTorrent to a firewall policy and configure a traffic shaping
policy.
B. Enable the shape option in a firewall policy with service set to BitTorrent.
C. Apply a traffic shaper to a BitTorrent entry in the SSL/SSH inspection profile.
D. Apply a traffic shaper to a protocol options profile.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 69
Which file names will match the *.tiff file name pattern configured in a data leak prevention filter? (Choose
two.)
A. tiff.tiff
B. tiff.png
C. tiff.jpeg
D. gif.tiff
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 70
An administrator has configured a dialup IPsec VPN with XAuth. Which method statement best describes this
scenario?
VCEConvert.com
C. Phase 1 negotiations will skip pre-shared key exchange.
D. Dialup clients must provide their local ID during phase 2 negotiations.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
Examine this output from a debug flow:
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72
Which component of FortiOS performs application control inspection?
A. Kernel
B. Antivirus engine
C. IPS engine
D. Application control engine
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 73
Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)
VCEConvert.com
C. They require two firewall policies: one for each direction of traffic flow.
D. They support L2TP-over-IPsec.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 74
What statement describes what DNS64 does?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
What does the command diagnose debuf fsso-polling refresh-user do?
A. It refreshes user group information form any servers connected to the FortiGate using a collector agent.
B. It refreshes all users learned through agentless polling.
C. It displays status information and some statistics related with the polls done by FortiGate on each DC.
D. It enables agentless polling mode real-time debug.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
Why must you use aggressive mode when a local FortiGate IPsec gateway hosts multiple dialup tunnels?
A. The FortiGate is able to handle NATed connections only with aggressive mode.
B. FortiClient supports aggressive mode.
C. The remote peers are able to provide their peer IDs in the first message with aggressive mode.
D. Main mode does not support XAuth for user authentication.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
VCEConvert.com
QUESTION 77
An administrator has configured the following settings:
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 78
Which statements about FortiGate inspection modes are true? (Choose two.)
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 79
Examine the following interface configuration on a FortiGate in transparent mode:
VCEConvert.com
Which statement about this configuration is correct?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
Examine this PAC file configuration.
A. Browsers can be configured to retrieve this PAC file from the FortiGate.
B. Any web request to the 172.25.120.0/24 subnet is allowed to bypass the proxy.
C. All requests not made to Fortinet.com or the 172.25.120.0/24 subnet, have to go through altproxy.corp.com:
8060.
D. Any web request fortinet.com is allowed to bypass the proxy.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
In a high availability (HA) cluster operating in active-active mode, which of the following correctly describes the
path taken by the SYN packet of an HTTP session that is offloaded to a secondary FortiGate?
A. Client > primary FortiGate> secondary FortiGate> primary FortiGate> web server.
B. Client > secondary FortiGate> web server.
C. Client >secondary FortiGate> primary FortiGate> web server.
D. Client> primary FortiGate> secondary FortiGate> web server.
Correct Answer: D
VCEConvert.com
Section: (none)
Explanation
Explanation/Reference:
QUESTION 82
A FortiGate is operating in NAT/Route mode and configured with two virtual LAN (VLAN) sub-interfaces added
to the same physical interface.
A. The two VLAN sub-interfaces can have the same VLAN ID only if they belong to different VDOMs.
B. The two VLAN sub-interfaces must have different VLAN IDs.
C. The two VLAN sub-interfaces can have the same VLAN ID only if they have IP addresses in the same
subnet.
D. The two VLAN sub-interfaces can have the same VLAN ID only if they have IP addresses in different
subnets.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
Which of the following statements are true when using Web Proxy Auto-discovery Protocol (WPAD) with the
DHCP discovery method? (Choose two.)
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 84
What inspections are executed by the IPS engine? (Choose three.)
A. Application control
B. Flow-based data leak prevention
C. Proxy-based antispam
D. Flow-based web filtering
E. Proxy-based antivirus
Explanation/Reference:
VCEConvert.com
QUESTION 85
Examine the exhibit.
A client workstation is connected to FortiGate port2. The Fortigate port1 is connected to an ISP router. Port2
and port3 are both configured as a software switch.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
Which of the following statements about the FSSO collector agent timers is true?
A. The dead entry timeout interval is used to age out entries with an unverified status.
B. The workstation verify interval is used to periodically check if a workstation is still a domain member.
C. The user group cache expiry is used to age out the monitored groups.
D. The IP address change verify interval monitors the server IP address where the collector agent is installed,
and updates the collector agent configuration if it changes.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87
An administrator has enabled the DHCP Server on the port1 interface and configured the following based on
the exhibit.
VCEConvert.com
Which statement is correct based on this configuration?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
An administrator wants to create a policy-based IPsec VPN tunnel between two FortiGate devices.
Which configuration steps must be performed on both units to support this scenario? (Choose three.)
Explanation/Reference:
QUESTION 89
View the Exhibit.
VCEConvert.com
Which statements are correct based on this output? (Choose two.)
A. The global configuration is synchronized between the primary and secondary FortiGate.
B. The all VDOM is not synchronized between the primary and secondary FortiGate.
C. The root VDOM is not synchronized between the primary and secondary FortiGate.
D. The FortiGates have three VDOMs.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
VCEConvert.com