Nse4 - FGT-6.4 V13.02
Nse4 - FGT-6.4 V13.02
Nse4 - FGT-6.4 V13.02
http://www.ittest.es/
The safer , easier way to help you pass any IT exams.
Exam : NSE4_FGT-6.4
Version : V13.02
1 / 62
The safer , easier way to help you pass any IT exams.
2.Which three authentication timeout types are availability for selection on FortiGate? (Choose three.)
A. hard-timeout
B. auth-on-demand
C. soft-timeout
D. new-session
E. Idle-timeout
Answer: A,D,E
Explanation:
https://kb.fortinet.com/kb/documentLink.do?externalID=FD37221
3.FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering
and application control directly on the security policy.
Which two other security profiles can you apply to the security policy? (Choose two.)
A. Antivirus scanning
B. File filter
C. DNS filter
D. Intrusion prevention
Answer: A,D
4.When a firewall policy is created, which attribute is added to the policy to support recording logs to a
FortiAnalyzer or a FortiManager and improves functionality when a FortiGate is integrated with these
devices?
A. Log ID
B. Universally Unique Identifier
C. Policy ID
D. Sequence ID
Answer: B
2 / 62
The safer , easier way to help you pass any IT exams.
Explanation:
Reference: https://docs.fortinet.com/document/fortigate/6.0.0/handbook/554066/firewall-policies
5.Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL
certificate inspection is enabled? (Choose three.)
A. The subject field in the server certificate
B. The serial number in the server certificate
C. The server name indication (SNI) extension in the client hello message
D. The subject alternative name (SAN) field in the server certificate
E. The host field in the HTTP header
Answer: ACD
Explanation:
Reference: https://checkthefirewall.com/blogs/fortinet/ssl-inspection
6.Which three CLI commands can you use to troubleshoot Layer 3 issues if the issue is in neither the
physical layer nor the link layer? (Choose three.)
A. diagnose sys top
B. execute ping
C. execute traceroute
D. diagnose sniffer packet any
E. get system arp
Answer: BCD
3 / 62
The safer , easier way to help you pass any IT exams.
B. Antivirus
C. Web proxy
D. Application control
Answer: B
9.Which of the following statements about backing up logs from the CLI and downloading logs from the GUI
are true? (Choose two.)
A. Log downloads from the GUI are limited to the current filter view
B. Log backups from the CLI cannot be restored to another FortiGate.
C. Log backups from the CLI can be configured to upload to FTP as a scheduled time
D. Log downloads from the GUI are stored as LZ4 compressed files.
Answer: A,B
10.Which two statements are true about the FGCP protocol? (Choose two.)
A. Not used when FortiGate is in Transparent mode
B. Elects the primary FortiGate device
C. Runs only over the heartbeat links
D. Is used to discover FortiGate devices in different HA groups
Answer: BC
12.Which CLI command will display sessions both from client to the proxy and from the proxy to the
servers?
A. diagnose wad session list
B. diagnose wad session list | grep hook-pre&&hook-out
C. diagnose wad session list | grep hook=pre&&hook=out
D. diagnose wad session list | grep "hook=pre"&"hook=out"
Answer: D
13.What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose
three.)
A. Traffic to botnetservers
B. Traffic to inappropriate web sites
C. Server information disclosure attacks
D. Credit card data leaks
4 / 62
The safer , easier way to help you pass any IT exams.
14.If Internet Service is already selected as Source in a firewall policy, which other configuration objects can
be added to the Source filed of a firewall policy?
A. IP address
B. Once Internet Service is selected, no other object can be added
C. User or User Group
D. FQDN address
Answer: C
The exhibit shows a CLI output of firewall policies, proxy policies, and proxy addresses.
How does FortiGate process the traffic sent to http://www.fortinet.com?
A. Traffic will be redirected to the transparent proxy and it will be allowed by proxy policy ID 3.
B. Traffic will not be redirected to the transparent proxy and it will be allowed by firewall policy ID 1.
C. Traffic will be redirected to the transparent proxy and It will be allowed by proxy policy ID 1.
D. Traffic will be redirected to the transparent proxy and it will be denied by the proxy implicit deny policy.
Answer: D
5 / 62
The safer , easier way to help you pass any IT exams.
17.Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)
6 / 62
The safer , easier way to help you pass any IT exams.
A. SSH
B. HTTPS
C. FTM
D. FortiTelemetry
Answer: A,B
Explanation:
Reference:
https://docs.fortinet.com/document/fortigate/6.4.0/hardening-your-fortigate/995103/buildingsecurity-into-f
ortios
The exhibit contains the configuration for an SD-WAN Performance SLA, as well as the output of
diagnose sys virtual-wan-link health-check.
Which interface will be selected as an outgoing interface?
A. port2
B. port4
C. port3
D. port1
Answer: D
7 / 62
The safer , easier way to help you pass any IT exams.
A. It is an idle timeout. The FortiGate considers a user to be “idle” if it does not see any packets coming from
the user’s source IP.
B. It is a hard timeout. The FortiGate removes the temporary policy for a user’s source IP address after this
timer has expired.
C. It is an idle timeout. The FortiGate considers a user to be “idle” if it does not see any packets coming from
the user’s source MAC.
D. It is a hard timeout. The FortiGate removes the temporary policy for a user’s source MAC address after
this timer has expired.
Answer: A
20.Which of the following statements about central NAT are true? (Choose two.)
A. IP tool references must be removed from existing firewall policies before enabling central NAT.
B. Central NAT can be enabled or disabled from the CLI only.
C. Source NAT, using central NAT, requires at least one central SNAT policy.
D. Destination NAT, using central NAT, requires a VIP object as the destination address in a firewall.
Answer: A,B
8 / 62
The safer , easier way to help you pass any IT exams.
23.An administrator has configured two-factor authentication to strengthen SSL VPN access.
Which additional best practice can an administrator implement?
A. Configure Source IP Pools.
B. Configure split tunneling in tunnel mode.
C. Configure different SSL VPN realms.
D. Configure host check.
Answer: D
24.Which two types of traffic are managed only by the management VDOM? (Choose two.)
A. FortiGuard web filter queries
B. PKI
C. Traffic shaping
D. DNS
Answer: A,D
25.If the Services field is configured in a Virtual IP (VIP), which statement is true when central NAT is
used?
A. The Services field prevents SNAT and DNAT from being combined in the same policy.
B. The Services field is used when you need to bundle several VIPs into VIP groups.
C. The Services field removes the requirement to create multiple VIPs for different services.
D. The Services field prevents multiple sources of traffic from using multiple services to
connect to a single computer.
Answer: C
9 / 62
The safer , easier way to help you pass any IT exams.
Based on the raw logs shown in the exhibit, which statement is correct?
A. Social networking web filter category is configured with the action set to authenticate.
B. The action on firewall policy ID 1 is set to warning.
C. Access to the social networking web filter category was explicitly blocked to all users.
D. The name of the firewall policy is all_users_web.
Answer: B
27.Which of the following statements correctly describes FortiGates route lookup behavior when
searching for a suitable gateway? (Choose two)
A. Lookup is done on the first packet from the session originator
B. Lookup is done on the last packet sent from the responder
C. Lookup is done on every packet, regardless of direction
D. Lookup is done on the trust reply packet from the responder
Answer: A,D
10 / 62
The safer , easier way to help you pass any IT exams.
The Root and To_Internet VDOMs are configured in NAT mode. The DMZ and Local VDOMs are
configured in transparent mode.
The Root VDOM is the management VDOM. The To_Internet VDOM allows LAN users to access internet.
The To_lnternet VDOM is the only VDOM with internet access and is directly connected to ISP modem.
Which two statements are true? (Choose two.)
A. Inter-VDOM links are required to allow traffic between the Local and Root VDOMs.
B. A static route is required on the To_Internet VDOM to allow LAN users to access the internet.
C. Inter-VDOM links are required to allow traffic between the Local and DMZ VDOMs.
D. Inter-VDOM links are not required between the Root and To_Internet VDOMs because the Root VDOM
is used only as a management VDOM.
11 / 62
The safer , easier way to help you pass any IT exams.
Answer: A,B
30.Which CLI command allows administrators to troubleshoot Layer 2 issues, such as an IP address
conflict?
A. get system status
B. get system performance status
C. diagnose sys top
D. get system arp
Answer: D
31.Which of the following statements is true regarding SSL VPN settings for an SSL VPN portal?
A. By default, FortiGate uses WINS servers to resolve names.
B. By default, the SSL VPN portal requires the installation of a client’s certificate.
C. By default, split tunneling is enabled.
D. By default, the admin GUI and SSL VPN portal use the same HTTPS port.
Answer: D
32.Which three statements about a flow-based antivirus profile are correct? (Choose three.)
A. IPS engine handles the process as a standalone.
B. FortiGate buffers the whole file but transmits to the client simultaneously.
C. If the virus is detected, the last packet is delivered to the client.
D. Optimized performance compared to proxy-based inspection.
E. Flow-based inspection uses a hybrid of scanning modes available in proxy-based inspection.
Answer: B,D,E
Given the interfaces shown in the exhibit. which two statements are true? (Choose two.)
A. Traffic between port2 and port2-vlan1 is allowed by default.
B. port1-vlan10 and port2-vlan10 are part of the same broadcast domain.
C. port1 is a native VLAN.
12 / 62
The safer , easier way to help you pass any IT exams.
D. port1-vlan and port2-vlan1 can be assigned in the same VDOM or to different VDOMs.
Answer: C,D
Based on the output shown in the exhibit, which two statements are correct? (Choose two.)
A. A local FortiManager is one of the servers FortiGate communicates with.
B. One server was contacted to retrieve the contract information.
C. There is at least one server that lost packets consecutively.
D. FortiGate is using default FortiGuard communication settings.
Answer: B,D
13 / 62
The safer , easier way to help you pass any IT exams.
In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The
administrator runs the FortiGate built-in sniffer and gets the output as shown in the exhibit.
What should the administrator do next to troubleshoot the problem?
A. Run a sniffer on the web server.
B. Capture the traffic using an external sniffer connected to port1.
C. Execute another sniffer in the FortiGate, this time with the filter “host 10.0.1.10”
D. Execute a debug flow.
Answer: D
37.Which statements about the firmware upgrade process on an active-active HA cluster are true?
(Choose two.)
A. The firmware image must be manually uploaded to each FortiGate.
B. Only secondary FortiGate devices are rebooted.
C. Uninterruptable upgrade is enabled by default.
D. Traffic load balancing is temporally disabled while upgrading the firmware.
Answer: C,D
39.Which two statements about IPsec authentication on FortiGate are correct? (Choose two.)
A. For a stronger authentication, you can also enable extended authentication (XAuth) to request the
remote peer to provide a username and password
B. FortiGate supports pre-shared key and signature as authentication methods.
14 / 62
The safer , easier way to help you pass any IT exams.
C. Enabling XAuth results in a faster authentication because fewer packets are exchanged.
D. A certificate is not required on the remote peer when you set the signature as the authentication method.
Answer: A,B
Explanation:
Reference:
https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/913287/ipsec-vpn-authenticating-aremote-fo
rtigate-peer-with-a-pre-shared-key
40.An administrator is configuring an Ipsec between site A and siteB. The Remotes Gateway setting in both
sites has been configured as Static IP Address. For site A, the local quick mode selector is 192.16.1.0/24 and
the remote quick mode selector is 192.16.2.0/24.
How must the administrator configure the local quick mode selector for site B?
A. 192.168.3.0/24
B. 192.168.2.0/24
C. 192.168.1.0/24
D. 192.168.0.0/8
Answer: B
41.How does FortiGate act when using SSL VPN in web mode?
A. FortiGate acts as an FDS server.
B. FortiGate acts as an HTTP reverse proxy.
C. FortiGate acts as DNS server.
D. FortiGate acts as router.
Answer: B
15 / 62
The safer , easier way to help you pass any IT exams.
Based on the administrator profile settings, what permissions must the administrator set to run the
diagnose firewall auth list CLI command on FortiGate?
A. Custom permission for Network
B. Read/Write permission for Log & Report
C. CLI diagnostics commands permission
D. Read/Write permission for Firewall
Answer: C
16 / 62
The safer , easier way to help you pass any IT exams.
43.Examine the exhibit, which contains a virtual IP and firewall policy configuration.
The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port2) interface has the IP
address 10.0.1.254/24.
The first firewall policy has NAT enabled on the outgoing interface address. The second firewall policy is
configured with a VIP as the destination address.
Which IP address will be used to source NAT the Internet traffic coming from a workstation with the IP
17 / 62
The safer , easier way to help you pass any IT exams.
address 10.0.1.10/24?
A. 10.200.1.10
B. Any available IP address in the WAN (port1) subnet 10.200.1.0/24
C. 10.200.1.1
D. 10.0.1.254
Answer: C
18 / 62
The safer , easier way to help you pass any IT exams.
19 / 62
The safer , easier way to help you pass any IT exams.
The SSL VPN connection fails when a user attempts to connect to it.
What should the user do to successfully connect to SSL VPN?
A. Change the SSL VPN port on the client.
B. Change the Server IP address.
C. Change the idle-timeout.
D. Change the SSL VPN portal to the tunnel.
Answer: A
Explanation:
Reference: https://docs.fortinet.com/document/fortigate/5.4.0/cookbook/150494
45.Which two protocol options are available on the CLI but not on the GUI when configuring an SD-WAN
Performance SLA? (Choose two.)
A. DNS
B. ping
C. udp-echo
D. TWAMP
Answer: C,D
47.Examine the IPS sensor configuration shown in the exhibit, and then answer the question below.
20 / 62
The safer , easier way to help you pass any IT exams.
21 / 62
The safer , easier way to help you pass any IT exams.
The exhibit contains a network diagram, central SNAT policy, and IP pool configuration.
The WAN (port1) interface has the IP address 10.200.1.1/24.
The LAN (port3) interface has the IP address 10.0.1.254/24.
A firewall policy is configured to allow to destinations from LAN (port3) to WAN (port1).
22 / 62
The safer , easier way to help you pass any IT exams.
Central NAT is enabled, so NAT settings from matching Central SNAT policies will be
applied.
Which IP address will be used to source NAT the traffic, if the user on Local-Client (10.0.1.10) pings the IP
address of Remote-FortiGate (10.200.3.1)?
A. 10.200.1.149
B. 10.200.1.1
C. 10.200.1.49
D. 10.200.1.99
Answer: D
23 / 62
The safer , easier way to help you pass any IT exams.
Users who use Apple FaceTime video conferences are unable to set up meetings.
In this scenario, which statement is true?
A. Apple FaceTime belongs to the custom monitored filter.
B. The category of Apple FaceTime is being monitored.
C. Apple FaceTime belongs to the custom blocked filter.
D. The category of Apple FaceTime is being blocked.
Answer:A
24 / 62
The safer , easier way to help you pass any IT exams.
How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires
authorization?
A. It always authorizes the traffic without requiring authentication.
B. It drops the traffic.
C. It authenticates the traffic using the authentication scheme SCHEME2.
D. It authenticates the traffic using the authentication scheme SCHEME1.
Answer: D
Explanation:
“What happens to traffic that requires authorization, but does not match any authentication rule? The
active and passive SSO schemes to use for those cases is defined under config authentication setting”
54.An administrator has configured a route-based IPsec VPN between two FortiGate devices.
Which statement about this IPsec VPN configuration is true?
A. A phase 2 configuration is not required.
B. This VPN cannot be used as part of a hub-and-spoke topology.
C. A virtual IPsec interface is automatically created after the phase 1 configuration is completed.
D. The IPsec firewall policies must be placed at the top of the list.
Answer: C
Explanation:
In a route-based configuration, FortiGate automatically adds a virtual interface eith the VPN name
(Infrastructure Study Guide, 206)
55.Which three methods are used by the collector agent for AD polling? (Choose three.)
A. FortiGate polling
B. NetAPI
C. Novell API
D. WMI
E. WinSecLog
Answer: B,D,E
25 / 62
The safer , easier way to help you pass any IT exams.
Explanation:
Reference: https://kb.fortinet.com/kb/documentLink.do?externalID=FD47732
56.Why does FortiGate keep TCP sessions in the session table for some seconds even after both sides
(client and server) have terminated the session?
A. To remove the NAT operation.
B. To generate logs
C. To finish any inspection operations.
D. To allow for out-of-order packets that could arrive after the FIN/ACK packets.
Answer: A
57.If the Issuer and Subject values are the same in a digital certificate, which type of entity was the
certificate issued to?
A. A CRL
B. A person
C. A subordinate CA
D. A root CA
Answer: D
58.An administrator observes that the port1 interface cannot be configured with an IP address.
What can be the reasons for that? (Choose three.)
A. The interface has been configured for one-arm sniffer.
B. The interface is a member of a virtual wire pair.
C. The operation mode is transparent.
D. The interface is a member of a zone.
E. Captive portal is enabled in the interface.
Answer: A,B,C
Explanation:
https://help.fortinet.com/fos50hlp/54/Content/FortiOS/fortigate-whats-new-54/Top_VirtualWirePair.htm
59.Which two policies must be configured to allow traffic on a policy-based next-generation firewall
(NGFW) FortiGate? (Choose two.)
A. Firewall policy
B. Policy rule
C. Security policy
D. SSL inspection and authentication policy
Answer: CD
Explanation:
Reference: https://docs.fortinet.com/document/fortigate/5.6.0/cookbook/38324/ngfw-policy-based-mode
26 / 62
The safer , easier way to help you pass any IT exams.
The exhibit contains a network diagram, virtual IP, IP pool, and firewall policies configuration.
The WAN (port1) interface has the IP address 10.200.1.1/24.
The LAN (port3) interface has the IP address 10 .0.1.254. /24.
The first firewall policy has NAT enabled using IP Pool.
The second firewall policy is configured with a VIP as the destination address.
Which IP address will be used to source NAT the internet traffic coming from a workstation with the IP
address 10.0.1.10?
A. 10.200.1.1
B. 10.200.3.1
C. 10.200.1.100
D. 10.200.1.10
Answer: A
61.Which two attributes are required on a certificate so it can be used as a CA certificate on SSL
27 / 62
The safer , easier way to help you pass any IT exams.
62.A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any
HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser
does not report errors.
What is the reason for the certificate warning errors?
A. The browser requires a software update.
B. FortiGate does not support full SSL inspection when web filtering is enabled.
C. The CA certificate set on the SSL/SSH inspection profile has not been imported into the browser.
D. There are network connectivity issues.
Answer: C
Explanation:
Reference: https://kb.fortinet.com/kb/documentLink.do?externalID=FD41394
63.Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
A. It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.
B. ADVPN is only supported with IKEv2.
C. Tunnels are negotiated dynamically between spokes.
D. Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2
proposals are defined in advance.
Answer: A,C
64.Which of the following are purposes of NAT traversal in IPsec? (Choose two.)
A. To delete intermediary NAT devices in the tunnel path.
B. To dynamically change phase 1 negotiation mode aggressive mode.
C. To encapsulation ESP packets in UDP packets using port 4500.
D. To force a new DH exchange with each phase 2 rekey.
Answer: A,C
65.A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added
to the physical interface.
Which statements about the VLAN sub interfaces can have the same VLAN ID, only if they have IP
addresses in different subnets.
A. The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different
subnets.
B. The two VLAN sub interfaces must have different VLAN IDs.
C. The two VLAN sub interfaces can have the same VLAN ID, only if they belong to different VDOMs.
D. The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in the same
subnet.
28 / 62
The safer , easier way to help you pass any IT exams.
Answer: B
Explanation:
FortiGate_Infrastructure_6.0_Study_Guide_v2-Online.pdf –> page 147 “Multiple VLANs can coexist in the
same physical interface, provide they have different VLAN ID”
66.You have enabled logging on your FortiGate device for Event logs and all Security logs, and you have set
up logging to use the FortiGate local disk.
What is the default behavior when the local disk is full?
A. Logs are overwritten and the only warning is issued when log disk usage reaches the threshold of 95%.
B. No new log is recorded until you manually clear logs from the local disk.
C. Logs are overwritten and the first warning is issued when log disk usage reaches the threshold of 75%.
D. No new log is recorded after the warning is issued when log disk usage reaches the threshold of 95%.
Answer: C
Explanation:
Reference: https://docs.fortinet.com/document/fortigate/6.4.0/cli-reference/462620/log-disk-setting
According to the certificate values shown in the exhibit, which type of entity was the certificate issued to?
A. A user
B. A root CA
C. A bridge CA
D. A subordinate
Answer: A
68.Which two actions can you perform only from the root FortiGate in a Security Fabric? (Choose two.)
A. Shut down/reboot a downstream FortiGate device.
B. Disable FortiAnalyzer logging for a downstream FortiGate device.
C. Log in to a downstream FortiSwitch device.
D. Ban or unban compromised hosts.
Answer: AB
29 / 62
The safer , easier way to help you pass any IT exams.
69.Which three statements about security associations (SA) in IPsec are correct? (Choose three.)
A. Phase 2 SAs are used for encrypting and decrypting the data exchanged through the tunnel.
B. An SA never expires.
C. A phase 1 SA is bidirectional, while a phase 2 SA is directional.
D. Phase 2 SA expiration can be time-based, volume-based, or both.
E. Both the phase 1 SA and phase 2 SA are bidirectional.
Answer: A,C,D
30 / 62
The safer , easier way to help you pass any IT exams.
31 / 62
The safer , easier way to help you pass any IT exams.
32 / 62
The safer , easier way to help you pass any IT exams.
The exhibit contains a network interface configuration, firewall policies, and a CLI console configuration.
How will FortiGate handle user authentication for traffic that arrives on the LAN interface?
A. If there is a full-through policy in place, users will not be prompted for authentication.
B. Users from the Sales group will be prompted for authentication and can authenticate successfully with
the correct credentials.
C. Authentication is enforced at a policy level; all users will be prompted for authentication.
D. Users from the HR group will be prompted for authentication and can authenticate successfully with
the correct credentials.
Answer: C
73.Examine the two static routes shown in the exhibit, then answer the following question.
Which of the following is the expected FortiGate behavior regarding these two routes to the same
destination?
A. FortiGate will load balance all traffic across both routes.
B. FortiGate will use the port1 route as the primary candidate.
C. FortiGate will route twice as much traffic to the port2 route
D. FortiGate will only actuate the port1 route in the routing table
33 / 62
The safer , easier way to help you pass any IT exams.
Answer: B
Explanation:
“If multiple static routes have the same distance, they are all active; however, only the one with the lowest
priority is considered the best path.”
74.Which security feature does FortiGate provide to protect servers located in the internal networks from
attacks such as SQL injections?
A. Denial of Service
B. Web application firewall
C. Antivirus
D. Application control
Answer: B
Explanation:
Reference: https://docs.fortinet.com/document/fortiweb/6.3.3/administration-guide/60895/introduction
75.When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is
used as the source of the HTTP request?
A. remote user’s public IP address
B. The public IP address of the FortiGate device.
C. The remote user’s virtual IP address.
D. The internal IP address of the FortiGate device.
Answer: D
Explanation:
Source IP seen by the remote resources is FortiGate’s internal IP address and not the user’s IP address
76.Which statement correctly describes NetAPI polling mode for the FSSO collector agent?
A. The collector agent uses a Windows API to query DCs for user logins.
B. NetAPI polling can increase bandwidth usage in large networks.
C. The collector agent must search security event logs.
D. The NetSessionEnum function is user] to track user logouts.
Answer: B
Explanation:
Reference: https://kb.fortinet.com/kb/documentLink.do?externalID=FD34906
77.Examine the IPS sensor and DoS policy configuration shown in the exhibit, then answer the question
below.
34 / 62
The safer , easier way to help you pass any IT exams.
When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first?
A. SMTP.Login.Brute.Force
B. IMAP.Login.brute.Force
C. ip_src_session
D. Location: server Protocol: SMTP
Answer: B
78.What inspection mode does FortiGate use if it is configured as a policy-based next-generation firewall
(NGFW)?
A. Full Content inspection
B. Proxy-based inspection
C. Certificate inspection
D. Flow-based inspection
Answer: D
35 / 62
The safer , easier way to help you pass any IT exams.
79.Which three statements are true regarding session-based authentication? (Choose three.)
A. HTTP sessions are treated as a single user.
B. IP sessions from the same source IP address are treated as a single user.
C. It can differentiate among multiple clients behind the same source IP address.
D. It requires more resources.
E. It is not recommended if multiple users are behind the source NAT
Answer: A,C,D
Given the security fabric topology shown in the exhibit, which two statements are true? (Choose two.)
A. There are five devices that are part of the security fabric.
B. Device detection is disabled on all FortiGate devices.
C. This security fabric topology is a logical topology view.
D. There are 19 security recommendations for the security fabric.
Answer: B,D
81.Which two statements are true about collector agent standard access mode? (Choose two.)
A. Standard mode uses Windows convention-NetBios: Domain\Username.
B. Standard mode security profiles apply to organizational units (OU).
C. Standard mode security profiles apply to user groups.
D. Standard access mode supports nested groups.
Answer: AC
Explanation:
Reference: https://docs.fortinet.com/document/fortigate/6.0.0/handbook/482937/agent-based-fsso
36 / 62
The safer , easier way to help you pass any IT exams.
82.Which statement about the IP authentication header (AH) used by IPsec is true?
A. AH does not provide any data integrity or encryption.
B. AH does not support perfect forward secrecy.
C. AH provides data integrity bur no encryption.
D. AH provides strong data integrity but weak encryption.
Answer: C
83.Which two statements are true about the RPF check? (Choose two.)
A. The RPF check is run on the first sent packet of any new session.
B. The RPF check is run on the first reply packet of any new session.
C. The RPF check is run on the first sent and reply packet of any new session.
D. RPF is a mechanism that protects FortiGuard and your network from IP spoofing attacks.
Answer: A,D
Explanation:
Reference: https://www.programmersought.com/article/16383871634/
84.A network administrator is configuring a new IPsec VPN tunnel on FortiGate. The remote peer IP address
is dynamic, in addition, the remote peer does not support a dynamic DNS update service.
What type of remote gateway should tie administrator configure on FortiGate for the new IPsec VPN tunnel
to work?
A. Static IP Address
B. Dialup User
C. Dynamic DNS
D. Pre-shared Key
Answer: B
85.An administrator does not want to report the logon events of service accounts to FortiGate.
What setting on the collector agent is required to achieve this?
A. Add the support of NTLM authentication.
B. Add user accounts to Active Directory (AD).
C. Add user accounts to the FortiGate group fitter.
D. Add user accounts to the Ignore User List.
Answer: D
86.Which of the following conditions must be met in order for a web browser to trust a web server certificate
signed by a third-party CA?
A. The public key of the web server certificate must be installed on the browser.
B. The web-server certificate must be installed on the browser.
C. The CA certificate that signed the web-server certificate must be installed on the browser.
D. The private key of the CA certificate that signed the browser certificate must be installed on the browser.
Answer: C
87.A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec
37 / 62
The safer , easier way to help you pass any IT exams.
Based on the raw log, which two statements are correct? (Choose two.)
A. Traffic is blocked because Action is set to DENY in the firewall policy.
B. Traffic belongs to the root VDOM.
C. This is a security log.
D. Log severity is set to error on FortiGate.
Answer: A,C
38 / 62
The safer , easier way to help you pass any IT exams.
The exhibits show a network diagram and the explicit web proxy configuration.
In the command diagnose sniffer packet, what filter can you use to capture the traffic between the client
and the explicit web proxy?
A. ‘host 192.168.0.2 and port 8080’
B. ‘host 10.0.0.50 and port 80’
C. ‘host 192.168.0.1 and port 80’
D. ‘host 10.0.0.50 and port 8080’
Answer: A
90.Which two statements are correct regarding FortiGate HA cluster virtual IP addresses? (Choose two.)
A. Heartbeat interfaces have virtual IP addresses that are manually assigned.
B. A change in the virtual IP address happens when a FortiGate device joins or leaves the cluster.
C. Virtual IP addresses are used to distinguish between cluster members.
D. The primary device in the cluster is always assigned IP address 169.254.0.1.
Answer: B,D
39 / 62
The safer , easier way to help you pass any IT exams.
91.Examine the network diagram shown in the exhibit, then answer the following question:
Which one of the following routes is the best candidate route for FGT1 to route traffic from the Workstation
to the Web server?
A. 172.16.0.0/16 [50/0] via 10.4.200.2, port2 [5/0]
B. 0.0.0.0/0 [20/0] via 10.4.200.2, port2
C. 10.4.200.0/30 is directly connected, port2
D. 172.16.32.0/24 is directly connected, port1
Answer: D
92.What is the primary FortiGate election process when the HA override setting is disabled?
A. Connected monitored ports > System uptime > Priority > FortiGate Serial number
B. Connected monitored ports > HA uptime > Priority > FortiGate Serial number
C. Connected monitored ports > Priority > HA uptime > FortiGate Serial number
D. Connected monitored ports > Priority > System uptime > FortiGate Serial number
Answer: B
Explanation:
Reference: http://myitmicroblog.blogspot.com/2018/11/what-should-you-know-about-ha-override.html
40 / 62
The safer , easier way to help you pass any IT exams.
The exhibits show the SSL and authentication policy (Exhibit A) and the security policy (Exhibit B) tor
Facebook.
Users are given access to the Facebook web application. They can play video content hosted on
Facebook but they are unable to leave reactions on videos or other types of posts.
Which part of the policy configuration must you change to resolve the issue?
A. The SSL inspection needs to be a deep content inspection.
41 / 62
The safer , easier way to help you pass any IT exams.
94.Which of the following SD-WAN load –balancing method use interface weight value to distribute traffic?
(Choose two.)
A. Source IP
B. Spillover
C. Volume
D. Session
Answer: B,C
95.Which certificate value can FortiGate use to determine the relationship between the issuer and the
certificate?
A. Subject Key Identifier value
B. SMMIE Capabilities value
C. Subject value
D. Subject Alternative Name value
Answer: A
96.Which two statements are correct regarding FortiGate FSSO agentless polling mode? (Choose two.)
A. FortiGate points the collector agent to use a remote LDAP server.
B. FortiGate uses the AD server as the collector agent.
C. FortiGate uses the SMB protocol to read the event viewer logs from the DCs.
D. FortiGate queries AD by using the LDAP to retrieve user group information.
Answer: C,D
97.What is the limitation of using a URL list and application control on the same firewall policy, in NGFW
policy-based mode?
A. It limits the scope of application control to the browser-based technology category only.
B. It limits the scope of application control to scan application traffic based on application category only.
C. It limits the scope of application control to scan application traffic using parent signatures only
D. It limits the scope of application control to scan application traffic on DNS protocol only.
Answer: B
42 / 62
The safer , easier way to help you pass any IT exams.
Exhibit A shows system performance output. Exhibit B shows a FortiGate configured with the default
configuration of high memory usage thresholds.
Based on the system performance output, which two statements are correct? (Choose two.)
A. Administrators can access FortiGate only through the console port.
B. FortiGate has entered conserve mode.
C. FortiGate will start sending all files to FortiSandbox for inspection.
D. Administrators cannot change the configuration.
Answer: B,D
99.Which two statements are true when FortiGate is in transparent mode? (Choose two.)
A. By default, all interfaces are part of the same broadcast domain.
B. The existing network IP schema must be changed when installing a transparent mode.
C. Static routes are required to allow traffic to the next hop.
D. FortiGate forwards frames without changing the MAC address.
Answer: A,D
Explanation:
Reference:
https://kb.fortinet.com/kb/viewAttachment.do?attachID=Fortigate_Transparent_Mode_Technical_Guide_
FortiOS_4_0_version1.2.pdf&do cumentID=FD33113
43 / 62
The safer , easier way to help you pass any IT exams.
The exhibit displays the output of the CLI command: diagnose sys ha dump-by vcluster.
Which two statements are true? (Choose two.)
A. FortiGate SN FGVM010000065036 HA uptime has been reset.
B. FortiGate devices are not in sync because one device is down.
C. FortiGate SN FGVM010000064692 is the primary because of higher HA uptime.
D. FortiGate SN FGVM010000064692 has the higher HA priority.
Answer: A,C
103.An organization’s employee needs to connect to the office through a high-latency internet connection.
Which SSL VPN setting should the administrator adjust to prevent the SSL VPN negotiation failure?
A. Change the session-ttl.
B. Change the login timeout.
C. Change the idle-timeout.
D. Change the udp idle timer.
Answer: B
44 / 62
The safer , easier way to help you pass any IT exams.
The exhibit contains a network diagram, firewall policies, and a firewall address object configuration.
An administrator created a Deny policy with default settings to deny Webserver access for Remote-user2.
Remote-user2 is still able to access Webserver.
Which two changes can the administrator make to deny Webserver access for Remote-User2? (Choose
two.)
A. Disable match-vip in the Deny policy.
B. Set the Destination address as Deny_IP in the Allow-access policy.
C. Enable match vip in the Deny policy.
D. Set the Destination address as Web_server in the Deny policy.
45 / 62
The safer , easier way to help you pass any IT exams.
Answer: C,D
105.Which three security features require the intrusion prevention system (IPS) engine to function? (Choose
three.)
A. Web filter in flow-based inspection
B. Antivirus in flow-based inspection
C. DNS filter
D. Web application firewall
E. Application control
Answer: A,B,E
106.Which two settings can be separately configured per VDOM on a FortiGate device? (Choose two.)
A. System time
B. FortiGuaid update servers
C. Operating mode
D. NGFW mode
Answer: C,D
107.The HTTP inspection process in web filtering follows a specific order when multiple features are
enabled in the web filter profile.
What order must FortiGate use when the web filter profile has features enabled, such as safe search?
A. DNS-based web filter and proxy-based web filter
B. Static URL filter, FortiGuard category filter, and advanced filters
C. Static domain filter, SSL inspection filter, and external connectors filters
D. FortiGuard category filter and rating filter
Answer: B
Explanation:
Reference: https://fortinet121.rssing.com/chan-67705148/all_p1.html
46 / 62
The safer , easier way to help you pass any IT exams.
47 / 62
The safer , easier way to help you pass any IT exams.
altproxy.corp.com: 8060.
D. Any web request fortinet.com is allowed to bypass the proxy.
Answer: A,D
111.To complete the final step of a Security Fabric configuration, an administrator must authorize all the
devices on which device?
A. FortiManager
B. Root FortiGate
C. FortiAnalyzer
D. Downstream FortiGate
Answer: B
Which two statements about the debug flow output are correct? (Choose two.)
A. The debug flow is of ICMP traffic.
B. A firewall policy allowed the connection.
C. A new traffic session is created.
D. The default route is required to receive a reply.
Answer: AC
113.Why does FortiGate Keep TCP sessions in the session table for several seconds, even after both
sides (client and server) have terminated the session?
A. To allow for out-of-order packets that could arrive after the FIN/ACK packets
B. To finish any inspection operations
C. To remove the NAT operation
D. To generate logs
Answer: A
48 / 62
The safer , easier way to help you pass any IT exams.
49 / 62
The safer , easier way to help you pass any IT exams.
Answer: B
Based on the diagnostic outputs above, how is the FortiGate handling the traffic for new sessions that
require inspection?
A. It is allowed, but with no inspection
B. It is allowed and inspected as long as the inspection is flow based
C. It is dropped.
D. It is allowed and inspected, as long as the only inspection required is antivirus.
Answer: A
117.Which three options are the remote log storage options you can configure on FortiGate? (Choose
three.)
A. FortiCache
B. FortiSIEM
C. FortiAnalyzer
D. FortiSandbox
E. FortiCloud
Answer: B,C,E
118.Which two VDOMs are the default VDOMs created when FortiGate is set up in split VDOM mode?
(Choose two.)
A. FG-traffic
B. Mgmt
C. FG-Mgmt
50 / 62
The safer , easier way to help you pass any IT exams.
D. Root
Answer: A,D
Explanation:
Reference: https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/758820/split-task-vdom-mode
119.In consolidated firewall policies, IPv4 and IPv6 policies are combined in a single consolidated policy.
Instead of separate policies.
Which three statements are true about consolidated IPv4 and IPv6 policy configuration? (Choose three.)
A. The IP version of the sources and destinations in a firewall policy must be different.
B. The Incoming Interface. Outgoing Interface. Schedule, and Service fields can be shared with both IPv4
and IPv6.
C. The policy table in the GUI can be filtered to display policies with IPv4, IPv6 or IPv4 and IPv6 sources and
destinations.
D. The IP version of the sources and destinations in a policy must match.
E. The policy table in the GUI will be consolidated to display policies with IPv4 and IPv6 sources and
destinations.
Answer: B,D,E
51 / 62
The safer , easier way to help you pass any IT exams.
A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The
administrator has determined that phase 1 fails to come up. The administrator has also re-entered the
pre-shared key on both FortiGate devices to make sure they match.
Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration
changes will bring phase 1 up? (Choose two.)
A. On HQ-FortiGate, set IKE mode to Main (ID protection).
B. On both FortiGate devices, set Dead Peer Detection to On Demand.
C. On HQ-FortiGate, disable Diffie-Helman group 2.
D. On Remote-FortiGate, set port2 as Interface.
Answer: AB
52 / 62
The safer , easier way to help you pass any IT exams.
121.Which two configuration settings are synchronized when FortiGate devices are in an active-active HA
cluster? (Choose two.)
A. FortiGuard web filter cache
B. FortiGate hostname
C. NTP
D. DNS
Answer: C,D
122.Which two statements are correct about SLA targets? (Choose two.)
A. You can configure only two SLA targets per one Performance SLA.
B. SLA targets are optional.
C. SLA targets are required for SD-WAN rules with a Best Quality strategy.
D. SLA targets are used only when referenced by an SD-WAN rule.
Answer: B,D
53 / 62
The safer , easier way to help you pass any IT exams.
A. 192.168.1.0/24
B. 192.168.0.0/24
C. 192.168.2.0/24
D. 192.168.3.0/24
Answer: C
125.Refer to the exhibits to view the firewall policy (Exhibit A) and the antivirus profile (Exhibit B).
54 / 62
The safer , easier way to help you pass any IT exams.
Which statement is correct if a user is unable to receive a block replacement message when downloading
an infected file for the first time?
A. The firewall policy performs the full content inspection on the file.
B. The flow-based inspection is used, which resets the last packet to the user.
C. The volume of traffic being inspected is too high for this model of FortiGate.
D. The intrusion prevention security profile needs to be enabled when using flow-based inspection mode.
Answer: B
126.Which Security rating scorecard helps identify configuration weakness and best practice violations in
your network?
A. Fabric Coverage
B. Automated Response
C. Security Posture
55 / 62
The safer , easier way to help you pass any IT exams.
D. Optimization
Answer: C
127.An administrator needs to configure VPN user access for multiple sites using the same soft FortiToken.
Each site has a FortiGate VPN gateway.
What must an administrator do to achieve this objective?
A. The administrator can register the same FortiToken on more than one FortiGate.
B. The administrator must use a FortiAuthenticator device.
C. The administrator can use a third-party radius OTP server.
D. The administrator must use the user self-registration server.
Answer: B
128.Which two statements about antivirus scanning mode are true? (Choose two.)
A. In proxy-based inspection mode, files bigger than the buffer size are scanned.
B. In flow-based inspection mode. FortiGate buffers the file, but also simultaneously transmits it to the client.
C. In proxy-based inspection mode, antivirus scanning buffers the whole file for scanning, before sending it
to the client.
D. In flow-based inspection mode, files bigger than the buffer size are scanned.
Answer: B,C
129.Which of the following are valid actions for FortiGuard category based filter in a web filter profile ui
proxy-based inspection mode? (Choose two.)
A. Warning
B. Exempt
C. Allow
D. Learn
Answer: A,C
130.D18912E1457D5D1DDCBD40AB3BF70D5D
What is the effect of enabling auto-negotiate on the phase 2 configuration of an IPsec tunnel?
A. FortiGate automatically negotiates different local and remote addresses with the remote peer.
B. FortiGate automatically negotiates a new security association after the existing security association
expires.
C. FortiGate automatically negotiates different encryption and authentication algorithms with the remote
peer.
D. FortiGate automatically brings up the IPsec tunnel and keeps it up, regardless of activity on the IPsec
tunnel.
Answer: B
Explanation:
Reference: https://kb.fortinet.com/kb/documentLink.do?externalID=12069
131.Which type of logs on FortiGate record information about traffic directly to and from the FortiGate
management IP addresses?
A. System event logs
56 / 62
The safer , easier way to help you pass any IT exams.
132.Which statements are true regarding firewall policy NAT using the outgoing interface IP address with
fixed port disabled? (Choose two.)
A. This is known as many-to-one NAT.
B. Source IP is translated to the outgoing interface IP.
C. Connections are tracked using source port and source MAC address.
D. Port address translation is not used.
Answer: B,D
Which contains a session list output. Based on the information shown in the exhibit, which statement is
true?
A. Destination NAT is disabled in the firewall policy.
B. One-to-one NAT IP pool is used in the firewall policy.
C. Overload NAT IP pool is used in the firewall policy.
D. Port block allocation IP pool is used in the firewall policy.
Answer: B
Which the FortiGate handle web proxy traffic rue? (Choose two.)
A. Broadcast traffic received in port1-VLAN10 will not be forwarded to port2-VLAN10.
57 / 62
The safer , easier way to help you pass any IT exams.
58 / 62
The safer , easier way to help you pass any IT exams.
59 / 62
The safer , easier way to help you pass any IT exams.
The exhibit shows proxy policies and proxy addresses, the authentication rule and authentication scheme,
users, and firewall address.
An explicit web proxy is configured for subnet range 10.0.1.0/24 with three explicit web proxy policies.
The authentication rule is configured to authenticate HTTP requests for subnet range 10.0.1.0/24 with a
form-based authentication scheme for the FortiGate local user database.
Users will be prompted for authentication.
How will FortiGate process the traffic when the HTTP request comes from a machine with the source IP
10.0.1.10 to the destination http://www.fortinet.com? (Choose two.)
A. If a Mozilla Firefox browser is used with User-B credentials, the HTTP request will be allowed.
B. If a Google Chrome browser is used with User-B credentials, the HTTP request will be allowed.
C. If a Mozilla Firefox browser is used with User-A credentials, the HTTP request will be allowed.
D. If a Microsoft Internet Explorer browser is used with User-B credentials, the HTTP request will be
allowed.
Answer: B,D
The global settings on a FortiGate device must be changed to align with company security policies.
What does the Administrator account need to access the FortiGate global settings?
A. Change password
B. Enable restrict access to trusted hosts
C. Change Administrator profile
D. Enable two-factor authentication
Answer: C
139.Which two statements ate true about the Security Fabric rating? (Choose two.)
60 / 62
The safer , easier way to help you pass any IT exams.
141.Which three criteria can a FortiGate use to look for a matching firewall policy to process traffic?
(Choose three.)
A. Source defined as Internet Services in the firewall policy.
B. Destination defined as Internet Services in the firewall policy.
C. Highest to lowest priority defined in the firewall policy.
D. Services defined in the firewall policy.
E. Lowest to highest policy ID number.
Answer: A,B,D
Explanation:
Reference: https://kb.fortinet.com/kb/documentLink.do?externalID=FD47435
142.By default, FortiGate is configured to use HTTPS when performing live web filtering with FortiGuard
servers.
Which two CLI commands will cause FortiGate to use an unreliable protocol to communicate with
61 / 62
The safer , easier way to help you pass any IT exams.
62 / 62