Nse4 6
Nse4 6
NSE4 Dumps
https://www.certleader.com/NSE4-dumps.html
NEW QUESTION 1
A FortiGate unit operating in NAT/route mode and configured with two sub-interface on the same physical interface. Which of the following statement is correct
regarding the VLAN IDs in this scenario?
A. The two VLAN sub-interfaces can have the same VLAN IDs only if they have IP addresses in different subnets.
B. The two VLAN sub-interfaces must have different VLAN IDs.
C. The two VLAN sub-interfaces can have VLAN ID only if they belong to different VDOMs.
D. The two VLAN sub-interfaces can have the same VLAN if they are connected to different L2 IEEE 802.1Q complaint switches.
Answer: B
NEW QUESTION 2
How is traffic routed onto an SSL VPN tunnel from the FortiGate unit side?
A. A static route must be configured by the administrator using the ssl.root interface as the outgoing interface.
B. Assignment of an IP address to the client causes a host route to be added to the FortiGate unit's kernel routing table.
C. A route back to the SSLVPN IP pool is automatically created on the FortiGate unit.
D. The FortiGate unit adds a route based upon the destination address in the SSL VPN firewall policy.
Answer: B
NEW QUESTION 3
Which protocols can you use for secure administrative access to a FortiGate? (Choose two)
A. SSH
B. Telnet
C. NTLM
D. HTTPS
Answer: AD
NEW QUESTION 4
A new version of FortiOS firmware has just been released. When you upload new firmware, which is true?
A. If you upload the firmware image via the boot loader's menu from a TFTP server, it will not preserve the configuratio
B. But if you upload new firmware via the GUI or CLI, as long as you are following a supported upgrade path, FortiOS will attempt to convert the existing
configuration to be valid with any new or changed syntax.
C. No settings are preserve
D. You must completely reconfigure.
E. No settings are preserve
F. After the upgrade, you must upload a configuration backup fil
G. FortiOS will ignore any commands that are not valid in the new O
H. In those cases, you must reconfigure settings that are not compatible with the new firmware.
I. You must use FortiConverter to convert a backup configuration file into the syntax required by the new FortiOS, then upload it to FortiGate.
Answer: A
NEW QUESTION 5
Which of the following FSSO agents are required for a DC agent mode solution? (Choose two.)
A. FSSO agent
B. DC agent
C. Collector agent
D. Radius server
Answer: BC
NEW QUESTION 6
For traffic that does match any configured firewall policy, what is the default action taken by the FortiGate?
Answer: C
NEW QUESTION 7
Review to the network topology in the exhibit.
The workstation, 172.16.1.1/24, connects to port2 of the FortiGate device, and the ISP router, 172.16.1.2, connects to port1. Without changing IP addressing,
which configuration changes are required to properly forward users traffic to the Internet? (Choose two)
A. At least one firewall policy from port2 to port1 to allow outgoing traffic.
B. A default route configured in the FortiGuard devices pointing to the ISP's router.
C. Static or dynamic IP addresses in both ForitGate interfaces port1 and port2.
D. The FortiGate devices configured in transparent mode.
Answer: AD
NEW QUESTION 8
Which is NOT true about source matching with firewall policies?
Answer: E
NEW QUESTION 9
Files reported as "suspicious" were subject to which Antivirus check"?
A. Grayware
B. Virus
C. Sandbox
D. Heuristic
Answer: D
NEW QUESTION 10
Which header field can be used in a firewall policy for traffic matching?
Answer: A
NEW QUESTION 10
Which profile could IPS engine use on an interface that is in sniffer mode? (Choose three)
Answer: ABD
NEW QUESTION 14
The order of the firewall policies is important. Policies can be re-ordered from either the GUI or the CLI. Which CLI command is used to perform this function?
A. set order
B. edit policy
C. reorder
D. move
Answer: D
NEW QUESTION 18
Review the configuration for FortiClient IPsec shown in the exhibit.
A. The connecting VPN client will install a route to a destination corresponding to the student internal address object.
B. The connecting VPN client will install a default route.
C. The connecting VPN client will install a route to the 172.20.1.[1-5] address range.
D. The connecting VPN client will connect in web portal mode and no route will be installed.
Answer: A
NEW QUESTION 23
Which statements are correct regarding virtual domains (VDOMs)? (Choose two)
A. VDOMs divide a single FortiGate unit into two or more virtual units that each have dedicated memory and CPUs.
B. A management VDOM handles SNMP, logging, alert email and FDN-based updates.
C. VDOMs share firmware versions, as well as antivirus and IPS databases.
D. Different time zones can be configured in each VDOM.
Answer: BC
NEW QUESTION 26
With FSSO DC-agent mode, a domain user could authenticate either against the domain controller running the collector agent and domain controller agent, or a
domain controller running only the domain controller agent.
If you attempt to authenticate with a domain controller running only the domain controller agent, which statements are correct? (Choose two.)
Answer: AC
NEW QUESTION 30
Review the output of the command get router info routing-table database shown in the exhibit below; then answer the question following it.
Which two statements are correct regarding this output? (Choose two.)
Answer: AC
NEW QUESTION 34
Which action does the FortiGate take when link health monitor times out?
A. All routes to the destination subnet configured in the link health monitor are removed from the routing table.
B. The distance values of all routes using interface configured in the link health monitor are increased.
C. The priority values of all routes using configured in the link health monitor are increased.
D. All routes using the next-hop gateway configured in the link health monitor are removed from the routing table.
Answer: D
NEW QUESTION 35
Which of the following statements are true regarding application control? (Choose two.)
Answer: CD
NEW QUESTION 40
Which of the following statements is true regarding a FortiGate device operating in transparent mode? (Choose three.)
Answer: ACE
NEW QUESTION 41
What is the maximum number of different virus databases a FortiGate can have?
A. 5
B. 2
C. 3
D. 4
Answer: B
NEW QUESTION 46
Which are valid replies from a RADIUS server to an ACCESS-REQUEST packet from a FortiGate? (Choose two.)
A. ACCESS-CHALLENGE
B. ACCESS-RESTRICT
C. ACCESS-PENDING
D. ACCESS-REJECT
Answer: AD
NEW QUESTION 47
For data leak prevention, which statement describes the difference between the block and quarantine actions?
Answer: A
NEW QUESTION 51
Which of the following authentication methods can be used for SSL VPN authentication? (Choose three.)
Answer: ABC
NEW QUESTION 54
Which commands are appropriate for investigating high CPU? (Choose two.)
Answer: AD
NEW QUESTION 56
Which statement is correct concerning an IPsec VPN with the remote gateway setting configured as 'Dynamic DNS'?
A. The FortiGate will accept IPsec VPN connection from any IP address.
B. The FQDN resolution of the local FortiGate IP address where the VPN is terminated must be provided by a dynamic DNS provider.
C. The FortiGate will Accept IPsec VPN connections only from IP addresses included on a dynamic DNS access list.
D. The remote gateway IP address can change dynamically.
Answer: D
NEW QUESTION 59
Which of the following statements describes the objectives of the gratuitous ARP packets sent by an HA cluster?
A. To synchronize the ARp tables in all the FortiGate Unis that are part of the HA cluster.
B. To notify the network switches that a new HA master unit has been elected.
C. To notify the master unit that the slave devices are still up and alive.
D. To notify the master unit about the physical MAC addresses of the slave units.
Answer: B
NEW QUESTION 64
How do application control signatures update on a FortiGate device?
Answer: A
NEW QUESTION 67
Review the IPsec diagnostics output of the command diagnose vpn tunnel list shown in the exhibit below.
Answer: AB
NEW QUESTION 68
Which of the following are benefits of using web caching? (Choose three.)
Answer: ABE
NEW QUESTION 71
Which two methods are supported by the web proxy auto-discovery protocol (WPAD) to automatically learn the URL where a PAC file is located? (Choose two.)
A. DHCP
B. BOOTP
C. DNS
D. IPv6 autoconfiguration.
Answer: AC
NEW QUESTION 74
Which methods can FortiGate use to send a One Time Password (OTP) to Two-Factor Authentication users? (Choose three.)
A. Hardware FortiToken
B. Web Portal
C. Email
D. USB Token
E. Software FortiToken (FortiToken mobile)
Answer: ACE
NEW QUESTION 76
When an administrator attempts to manage FortiGate from an IP address that is not a trusted host, what happens?
A. FortiGate will still subject that person's traffic to firewall policies; it will not bypass them.
B. FortiGate will drop the packets and not respond.
C. FortiGate responds with a block message, indicating that it will not allow that person to log in.
D. FortiGate responds only if the administrator uses a secure protoco
E. Otherwise, it does not respond
Answer: B
NEW QUESTION 81
When configuring LDAP on the FortiGate as a remote database for users, what is not a part of the configuration?
A. The name of the attribute that identifies each user (Common Name Identifier).
B. The user account or group element names (user DN).
C. The server secret to allow for remote queries (Primary server secret).
D. The credentials for an LDAP administrator (password).
Answer: C
NEW QUESTION 84
Which of the following statements best describes what a Public Certificate Authority (CA) is?
Answer: D
NEW QUESTION 88
Which of the following actions can be used with the FortiGuard quota feature? (Choose three.)
A. Allow
B. Block
C. Monitor
D. Warning
E. Authenticate
Answer: CDE
NEW QUESTION 93
When firewall policy authentication is enabled, which protocols can trigger an authentication challenge? (Choose two.)
A. SMTP
B. SSH
C. HTTP
D. FTP
E. SCP
Answer: CD
NEW QUESTION 95
A FortiGate unit has multiple VDOMs in NAT/route mode with multiple VLAN interfaces in each VDOM. Which of the following statements is correct regarding the
IP addresses
assigned to each VLAN interface?
A. Different VLANs can share the same IP address as long as they have different VLAN IDs.
B. Different VLANs can share the same IP address as long as they are in different physical interface.
C. Different VLANs can share the same IP address as long as they are in different VDOMs.
D. Different VLANs can never share the same IP addresses.
Answer: C
NEW QUESTION 99
In "diag debug flow" output, you see the message “Allowed by Policy-1: SNAT”. Which is true?
A. The packet matched the topmost policy in the list of firewall policies.
B. The packet matched the firewall policy whose policy ID is 1.
C. The packet matched a firewall policy, which allows the packet and skips UTM checks
D. The policy allowed the packet and applied session NAT.
Answer: B
Answer: BC
A. policyid
B. level
C. user
D. time
E. subtype
F. duration
Answer: BDE
A. Allow
B. Block
C. Exempt
D. Warning
E. Shape
Answer: ABD
A. IP Address Check
B. Open Relay Database List (ORDBL)
C. Black/White List
D. Return Email DNS Check
E. Email Checksum Check
Answer: ABCDE
A. SYN SENT
B. SYN & SYN/ACK
C. FIN WAIT
D. TIME WAIT
Answer: AD
A. a static route.
B. a firewall policy.
C. an interface.
D. a virtual domain.
Answer: C
Answer: C
Answer: CD
Answer: D
A. Blocks SSL VPN connection attempts from users that has been blacklisted.
B. Detects the Windows client security applications running in the SSL VPN client's PCs.
C. Validates the SSL VPN user credential.
D. Verifies which SSL VPN portal must be presented to each SSL VPN user.
E. Verifies that the latest SSL VPN client is installed in the client's PC.
Answer: B
Answer: D
A. The attacker keeps open many connections with slow data transmission so that other clients cannot start new connections.
B. The attacker sends a packet designed to "sync" with the FortiGate.
C. The attacker sends a specially crafted malformed packet, intended to crash the target by exploiting its parser.
D. The attacker starts many connections, but never acknowledges to fully form them.
Answer: D
Answer: BC
Which statement describes the green status indicators that appear next to the different FortiGuard Distribution Network services as illustrated in the exhibit?
A. They indicate that the FortiGate has the latest updates available from the FortiGuard Distribution Network.
B. They indicate that updates are available and should be downloaded from the FortiGuard Distribution Network to the FortiGate unit.
C. They indicate that the FortiGate is in the process of downloading updates from the FortiGuard Distribution Network.
D. They indicate that the FortiGate is able to connect to the FortiGuard Distribution Network.
Answer: D
A. HTTP
B. SSL
C. DNS
D. RSS
E. HTTPS
Answer: ACE
A. 1
B. 2
C. 3
D. 4
Answer: C
Answer: CD
Answer: A
A. https://10.10.1.1:8080
B. https://10.10.1.1:8080/wpad.dat
C. http://10.10.1.1:8080/
D. http://10.10.1.1:8080/wpad.dat
Answer: D
A. Irix
B. QNIX
C. Linux
D. Mac OS
E. BSD
Answer: CDE
Answer: AC
Answer: AD
A. 192.168.11.100
B. 192.168.11.251
C. 192.168.10.100
D. 192.168.10.251
Answer: AB
Which statements are true regarding the session above? (Choose two.)
Answer: CD
A. ARP cache
B. Physical MAC address
C. Errors and collisions
D. Listening TCP ports
Answer: BC
A. Notification, Emergency
B. Information, Critical
C. Error, Critical
D. Information, Emergency
E. Information, Alert
Answer: D
Answer: CDE
A. S – Sleep
B. R – Running
C. D – Uninterruptable Sleep
D. Z – Zombie
Answer: CD
A. DNS-based
B. Proxy-based
C. Flow-based
D. URL-based
Answer: BC
A. Policy-based only.
B. Route-based only.
C. Either policy-based or route-based VPN.
D. GRE-based only.
Answer: B
A. For each new IP session, the first packet always goes to the CPU.
B. The kernel does not need to program the NP
C. When the NPU sees the traffic, it determines by itself whether it can process the traffic
D. Once offloaded, unless there are errors, the NP forwards all subsequent packet
E. The CPU does not process them.
F. When the last packet is sent or received, such as a TCP FIN or TCP RST signal, the NP returns this session to the CPU for tear down.
G. Sessions for policies that have a security profile enabled can be NP offloaded.
Answer: ACD
Answer: AC
Answer: ABC
A. Packet are sent directly to the slave unit using the slave physical MAC address.
B. Packets are sent directly to the slave unit using the HA virtual MAC address.
C. Packets arrived at both units simultaneously, but only the salve unit forwards the session.
D. Packets are first sent to the master unit, which then forwards the packets to the slave unit.
Answer: D
A. IP address pool.
B. Virtual IP address.
C. IP address.
D. IP address group.
E. MAC address.
Answer: BCD
A. FortiGate devices,from the FGT/FWF 60D and above, all support VDOMS.
Answer: A
Answer: B
A. Que prioritization
B. Traffic cap (bandwidth limit)
C. Differentiated services field rewriting
D. Guarantee bandwidth
Answer: CD
Answer: BD
Answer: AB
Answer: AC
Answer: A
A. 00
B. 11
C. 01
D. 05
Answer: AC
Answer: AD
Answer: BC
A. The default web filtering profile is applied to the first firewall policy.
B. The 'Port1' or 'Internal' interface has the IP address 192.168.1.99.
C. The implicit firewall policy action is ACCEPT.
D. The 'Port1' or 'Internal' interface has a DHCP server set up and enabled (on device models that support DHCP servers).
E. Default login uses the username: admin (all lowercase) and no password.
Answer: BDE
Answer: AD
A. Agentless polling
B. LDAP agent
C. eDirectory agent
D. DC agent
Answer: C
Answer: CD
A. Conditional-forward.
B. Forward-only.
C. Non-recursive.
D. Iterative.
E. Recursive.
Answer: BCE
Answer: ACE
A. The whole VDOM is a single broadcast domain even when multiple VLAN are used.
B. Each VLAN is a separate broadcast domain.
C. Interfaces configured with the same VLAN ID can belong to different broadcast domains.
D. All the interfaces in the same broadcast domain must use the same VLAN ID.
Answer: BC
Answer: D
A. Block
B. Reject
C. Tag
D. Log only
E. Quarantine IP address
Answer: ADE
A. Fragmented packets.
B. Multicast packet.
C. SCTP packet.
D. GRE packet.
Answer: BC
A. The device this command is executed on is likely to switch from master to slave status if override is disabled.
B. The device this command executed on is likely to switch from master to slave status if override is enabled.
C. The command has no impact on the HA algorithm.
D. This commands resets the uptime variable used in the HA algorithm so it may cause a new master to become elected.
Answer: AD
Answer: B
Which of the following statements are true if the network administrator wants to route traffic between all the VDOMs? (Choose three.)
A. The administrator can configure inter-VDOM links to avoid using external interfaces and routers.
B. As with all FortiGate unit interfaces, firewall policies must be in place for traffic to be allowed to pass through any interface, including inter-VDOM links.
C. This configuration requires a router to be positioned between the FortiGate unit and the Internet for proper routing.
D. Inter-VDOM routing is automatically provided if all the subnets that need to be routed are locally attached.
E. As each VDOM has an independent routing table, routing rules need to be set (for example, static routing, OSPF) in each VDOM to route traffic between
VDOMs.
Answer: ABE
A. 5
B. 3
C. 2
D. 6
Answer: D
Answer: C
A. SMTP
B. HTTP-POST
C. AIM
D. MAPI
E. ICQ
Answer: ABD
A. DNS-based.
B. FQDN-based.
C. Flow-based.
D. URL-based.
Answer: A
Answer: AB
A. The name of the virtual network adapter required in each user's PC for SSL VPN Tunnel mode.
B. The name of a virtual interface in the root VDOM where all the SSL VPN user traffic comes from.
C. A Firewall Address object that contains the IP addresses assigned to SSL VPN users.
D. The virtual interface in the root VDOM that the remote SSL VPN tunnels connect to.
Answer: B
Answer: AC
A. Proxy based mode allows for customizable block pages to display when sites are prevented.
B. Proxy based mode requires more resources than flow-based.
C. Flow based mode offers more settings under the advanced configuration section of the GUI.
D. Proxy based mode offers higher throughput than flow-based mode.
Answer: AB
A. [confidential data]
B. /confidential data/i
C. i/confidential data/
D. “confidential data”
Answer: B
A. Protection profiles can be applied to both individual users and user groups
B. Nested or inherited groups are supported
Answer: BCE
Answer: AD
A. Proxy
B. Transparent
C. NAT/route
D. Offline inspection
Answer: BC
A. VDOMs divide a single FortiGate unit into two or more independent firewall.
B. A management VDOM handles SNM
C. logging, alert email and FortiGuard updates.
D. Each VDOM can run different firmware versions.
E. Administrative users with a 'super_admin' profile can administrate only one VDOM.
Answer: AB
A. Using SNMP.
B. A direct connection to the serial console port.
C. Using the CLI console widget in the GUI.
D. Using RCP.
Answer: BC
A. CHAP
B. MSCHAP2
C. PAP
D. FSSO
Answer: D
Different settings are circled and numbered. Select the number identifying the setting which will provide additional information about YouTube access, such as the
name of the video watched.
A. 1
B. 2
C. 3
D. 4
E. 5
Answer: D
Answer: D
A. When the system has reached its capacity for log messages, the FortiGate unit will stop logging to memory.
B. When the system has reached its capacity for log messages, the FortiGate unit overwrites the oldest messages.
C. If the FortiGate unit is reset or loses power, log entries captured to memory will be lost.
D. None of the above.
Answer: BC
Answer: AD
Answer: ABD
Answer: ADE
Answer: B
A. In the GUI, the log entry was located under “Log & Report > Event Log > User”.
B. In the GUI, the log entry was located under “Log & Report > Event Log > System”.
C. In the GUI, the log entry was located under “Log & Report > Traffic Log > Local Traffic”.
D. The connection was encrypted.
E. The connection was unencrypted.
F. The IP of the FortiGate interface that “admin” connected to was 192.168.1.112.
G. The IP of the computer that “admin” connected from was 192.168.1.112.
Answer: BEG
In this scenario. The FortiGate unit in Ottawa has the following routing table:
s*0.0.0.0/0 [10/0] via 172.20.170.254, port2
c172.20.167.0/24 is directly connected, port1 c172.20.170.0/24 is directly connected, port2
Sniffer tests show that packets sent from the source IP address 170.20.168.2 to the destination IP address 172.20.169.2 are being dropped by the FortiGate
located in Ottawa.
Which of the following correctly describes the cause for the dropped packets?
Answer: B
A. Antivirus
B. VPN
C. IPS
D. Web Filtering
Answer: D
A. Bob will use his private key to encrypt the file and Alice will use her private key to decrypt the file.
B. Bob will use his public key to encrypt the file and Alice will use Bob’s private key to decrypt the file.
C. Bob will use Alice’s public key to encrypt the file and Alice will use her private key to decrypt the file.
D. Bob will use his public key to encrypt the file and Alice will use her private key to decrypt the file.
Answer: C
Answer: B
A. Forward log
B. Traffic log
C. Syslog
D. Event log
E. Security log
Answer: BDE
Answer: AD
Answer: A
Answer: AD
Answer: AB
Answer: D
Answer: BCD
Exhibit B:
Which one of the following is the most likely reason that the cluster fails to form?
A. Password
B. HA mode
C. Hearbeat
D. Override
Answer: B
Answer: C
Answer: C
A. FortiGate
B. FortiClient
C. FortiMail
D. FortiAnalyzer
Answer: ABC
Given that the user authenticates against the SSL VPN policy shown in the image below, which statement below identifies the route that is added to the client's
routing table.
Answer: A
Answer: AC
A. Firmware.
B. Model.
C. Hostname.
D. System time zone.
Answer: AB
Answer: B
Answer: AB
A. Create firewall policies to control traffic between the IP source and destination address.
B. Configure the appropriate user groups on the FortiGate units to allow users access to the IPSec VPN connection.
C. Set the operating mode of the FortiGate unit to IPSec VPN mode.
D. Define the Phase 2 parameters that the FortiGate unit needs to create a VPN tunnel with the remote peer.
E. Define the Phase 1 parameters that the FortiGate unit needs to authenticate the remote peers.
Answer: ADE
Answer: AB
100% Pass Your NSE4 Exam with Our Prep Materials Via below:
https://www.certleader.com/NSE4-dumps.html