Certification Provider: Fortinet
Exam: NSE 4
Exam Code: NSE4 v7.0
Total Question : 131
Question per Quiz: 60
Updated On: 21 March 2023
Note: In order to practice all the Q/A's, you have to practice multiple time. Question's and Answer's will be presented randomly and will help you get hands-on for real exam.
1.
In which two ways can RPF checking be disabled? (Choose two.)
2.
By default, FortiGate is configured to use HTTPS when performing live web filtering with FortiGuard servers. Which two CLI commands will cause FortiGate to use an unreliable protocol to communicate with FortiGuard servers for live web filtering? (Choose two.)
3.
Based on the raw logs shown in the exhibit, which statement is correct?
4.
An administrator is configuring an IPsec VPN between site A and site B. The Remote Gateway setting in both sites has been configured as Static IP Address. For site A, the local quick mode selector is 192.168.1.0/24 and the remote quick mode selector is 192.168.2.0/24. Which subnet must the administrator configure for the local quick mode selector for site B?
5.
Refer to the exhibit, which contains a static route configuration. An administrator created a static route for Amazon Web Services. What CLI command must the administrator use to view the route?
6.
An administrator does not want to report the logon events of service accounts to FortiGate. What setting on the collector agent is required to achieve this?
7.
Which scanning technique on FortiGate can be enabled only on the CLI?
8.
Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)
9.
Which three methods are used by the collector agent for AD polling? (Choose three.)
10.
An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel. Which DPD mode on FortiGate will meet the above requirement?
11.
If Internet Service is already selected as Destination in a firewall policy, which other configuration objects can be selected to the Destination field of a firewall policy?
12.
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?
13.
Refer to the exhibits. The exhibits show the SSL and authentication policy (Exhibit A) and the security policy (Exhibit B) for Facebook. Users are given access to the Facebook web application. They can play video content hosted on Facebook but they are unable to leave reactions on videos or other types of posts. Which part of the policy configuration must you change to resolve the issue?
14.
Which CLI command will display sessions both from client to the proxy and from the proxy to the servers?
15.
Refer to the exhibit. The SSL VPN connection fails when a user attempts to connect to it. What should the user do to successfully connect to SSL VPN?
16.
In consolidated firewall policies, IPv4 and IPv6 policies are combined in a single consolidated policy. Instead of separate policies. Which three statements are true about consolidated IPv4 and IPv6 policy configuration? (Choose three.)
17.
What devices form the core of the security fabric?
18.
In an explicit proxy setup, where is the authentication method and database configured?
19.
Which three criteria can a FortiGate use to look for a matching firewall policy to process traffic? (Choose three.)
20.
What are the two results of this configuration? (Choose two.)
An administrator has configured the following settings: config system setting
set ses-denied-traffic enable end config system global set block -session-timer 30 end
21.
FortiGate is configured as a policy-based next-generation firewall (NGFW) and is applying web filtering and application control directly on the security policy. Which two other security profiles can you apply to the security policy? (Choose two.)
22.
Which two key configuration changes are needed on FortiGate to meet the design requirements? (Choose two.)
A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes. ✑ All traffic must be routed through the primary tunnel when both tunnels are up. ✑ The secondary tunnel must be used only if the primary tunnel goes down. ✑ In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.
23.
Which two statements about SSL VPN between two FortiGate devices are true? (Choose two.)
24.
An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.)
25.
Which two statements are true when FortiGate is in transparent mode? (Choose two.)
26.
Refer to the exhibit. The global settings on a FortiGate device must be changed to align with company security policies. What does the Administrator account need to access the FortiGate global settings?
27.
Refer to the exhibit. Examine the intrusion prevention system (IPS) diagnostic command. Which statement is correct if option 5 was used with the IPS diagnostic command and the outcome was a decrease in the CPU usage?
28.
Which two statements are true about the FGCP protocol? (Choose two.)
29.
Which two configuration settings are synchronized when FortiGate devices are in an active-active HA cluster? (Choose two.)
30.
Refer to the exhibit. Review the Intrusion Prevention System (IPS) profile signature settings. Which statement is correct in adding the FTP.Login.Failed signature to the IPS sensor profile?
31.
Refer to the exhibit, which contains a session list output. Based on the information shown in the exhibit, which statement is true?
32.
Refer to the exhibit. Which IP address will be used to source NAT the internet traffic coming from a workstation with the IP address 10.0.1.10?
The exhibit contains a network diagram, virtual IP, IP pool, and firewall policies configuration. The WAN (port1) interface has the IP address 10.200.1.1/24. The LAN (port3) interface has the IP address 10.0.1.254/24. The first firewall policy has NAT enabled using IP Pool. The second firewall policy is configured with a VIP as the destination address.
33.
If the Services field is configured in a Virtual IP (VIP), which statement is true when central NAT is used?
34.
Which two statements are true about the RPF check? (Choose two.)
35.
FortiGate is operating in NAT mode and is configured with two virtual LAN (VLAN) subinterfaces added to the same physical interface. In this scenario, which statement about VLAN IDs is true?
36.
Refer to the exhibit. Based on the raw log, which two statements are correct? (Choose two.)
37.
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not. Which configuration option is the most effective way to support this request?
38.
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
39.
Refer to the exhibit, which contains a session diagnostic output. Which statement is true about the session diagnostic output?
40.
Which two statements are correct regarding FortiGate FSSO agentless polling mode? (Choose two.)
41.
Which security feature does FortiGate provide to protect servers located in the internal networks from attacks such as SQL injections?
42.
Refer to the exhibit. The exhibit contains a network interface configuration, firewall policies, and a CLI console configuration. How will FortiGate handle user authentication for traffic that arrives on the LAN interface?
43.
A network administrator has enabled SSL certificate inspection and antivirus on FortiGate. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and the file can be downloaded. What is the reason for the failed virus detection by FortiGate?
44.
Refer to the exhibit. The Root and To_Internet VDOMs are configured in NAT mode. The DMZ and Local VDOMs are configured in transparent mode. The Root VDOM is the management VDOM. The To_Internet VDOM allows LAN users to access the Internet. The To_Internet VDOM is the only VDOM with internet access and is directly connected to ISP modem. Which two statements are true? (Choose two.)
45.
Refer to the exhibit. Given the security fabric topology shown in the exhibit, which two statements are true? (Choose two.)
46.
Which of statement is true about SSL VPN web mode?
47.
Which two statements are true about collector agent advanced mode? (Choose two.)
48.
Which three authentication timeout types are availability for selection on FortiGate? (Choose three.)
49.
Which statements are true regarding firewall policy NAT using the outgoing interface IP address with fixed port disabled? (Choose two.)
50.
An administrator has configured two-factor authentication to strengthen SSL VPN access. Which additional best practice can an administrator implement?
51.
A team manager has decided that, while some members of the team need access to a particular website, the majority of the team does not Which configuration option is the most effective way to support this request?
52.
Refer to the FortiGuard connection debug output. Based on the output shown in the exhibit, which two statements are correct? (Choose two.)
53.
Refer to the exhibits to view the firewall policy and the antivirus profile. Which statement is correct if a user is unable to receive a block replacement message when downloading an infected file for the first time?
54.
Which type of logs on FortiGate record information about traffic directly to and from the FortiGate management IP addresses?
55.
Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)
56.
Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)
57.
Which two policies must be configured to allow traffic on a policy-based next-generation firewall (NGFW) FortiGate? (Choose two.)
58.
Which two statements are correct regarding FortiGate HA cluster virtual IP addresses? (Choose two.)
59.
Which statements about the firmware upgrade process on an active-active HA cluster are true? (Choose two.)
60.
Which two VDOMs are the default VDOMs created when FortiGate is set up in split VDOM mode? (Choose two.)
2 Comments
after submit ,need to show the correct answers
I took NSE4 few days before and Passed. Many question from this Quiz are in Exam. Recommend to take this practice test along with Guide. Quite helpful.
Thank You Practonet 🙂