Certification Provider: Fortinet
Exam: NSE 4
Exam Code: NSE4 v7.0
Total Question: 131
Question per Quiz: 60
Updated On: 21 March 2023
Note: In order to practice all the Q/A's, you have to practice multiple time. Question's and Answer's will be presented randomly and will help you get hands-on for real exam.
1.
Which CLI command will display sessions both from client to the proxy and from the proxy to the servers?
2.
What two changes can the administrator make to resolve the issue without affecting services running through FortiGate? (Choose two.)
Consider the topology:
Application on a Windows machine FGT--> Telnet to Linux server.
An administrator is investigating a problem where an application establishes a Telnet session to a Linux server over the SSL VPN through FortiGate and the idle session times out after about 90 minutes. The administrator would like to increase or disable this timeout.
The administrator has already verified that the issue is not caused by the application or Linux server. This issue does not happen when the application establishes a Telnet connection to the Linux server directly on the LAN.
3.
In an explicit proxy setup, where is the authentication method and database configured?
4.
Which three statements are true regarding session-based authentication? (Choose three.)
5.
Which two statements are true about collector agent standard access mode? (Choose two.)
6.
Refer to the exhibit. The global settings on a FortiGate device must be changed to align with company security policies. What does the Administrator account need to access the FortiGate global settings?
7.
Refer to the exhibit. The exhibit shows the IPS sensor configuration. If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)
8.
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
9.
Which CLI command allows administrators to troubleshoot Layer 2 issues, such as an IP address conflict?
10.
The HTTP inspection process in web filtering follows a specific order when multiple features are enabled in the web filter profile. What order must FortiGate use when the web filter profile has features enabled, such as safe search?
11.
Which two statements are true when FortiGate is in transparent mode? (Choose two.)
12.
Refer to the exhibit. How will FortiGate process the traffic when the HTTP request comes from a machine with the source IP 10.0.1.10 to the destination http:// www.fortinet.com? (Choose two.)
The exhibit shows proxy policies and proxy addresses, the authentication rule and authentication scheme, users, and firewall address.
An explicit web proxy is configured for subnet range 10.0.1.0/24 with three explicit web proxy policies.
The authentication rule is configured to authenticate HTTP requests for subnet range 10.0.1.0/24 with a form-based authentication scheme for the FortiGate local user database. Users will be prompted for authentication.
13.
Which statements are true regarding firewall policy NAT using the outgoing interface IP address with fixed port disabled? (Choose two.)
14.
Refer to the exhibit. The Root and To_Internet VDOMs are configured in NAT mode. The DMZ and Local VDOMs are configured in transparent mode. The Root VDOM is the management VDOM. The To_Internet VDOM allows LAN users to access the Internet. The To_Internet VDOM is the only VDOM with internet access and is directly connected to ISP modem. Which two statements are true? (Choose two.)
15.
Which of the following are purposes of NAT traversal in IPsec? (Choose two.)
16.
An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.)
17.
Refer to the exhibit, which contains a session diagnostic output. Which statement is true about the session diagnostic output?
18.
Which three security features require the intrusion prevention system (IPS) engine to function? (Choose three.)
19.
An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel. Which DPD mode on FortiGate will meet the above requirement?
20.
Refer to the exhibit. An administrator is running a sniffer command as shown in the exhibit. Which three pieces of information are included in the sniffer output? (Choose three.)
21.
Refer to the exhibit. Based on the raw log, which two statements are correct? (Choose two.)
22.
Which two statements about IPsec authentication on FortiGate are correct? (Choose two.)
23.
Which two configuration settings are synchronized when FortiGate devices are in an active-active HA cluster? (Choose two.)
24.
A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors. What is the reason for the certificate warning errors?
25.
Refer to the exhibit to view the application control profile. Users who use Apple FaceTime video conferences are unable to set up meetings. In this scenario, which statement is true?
26.
An administrator has configured outgoing interface any in a firewall policy. Which statement is true about the policy list view?
27.
Refer to the exhibit. The exhibit contains a network interface configuration, firewall policies, and a CLI console configuration. How will FortiGate handle user authentication for traffic that arrives on the LAN interface?
28.
Which of the following are valid actions for FortiGuard category based filter in a web filter profile UI proxy-based inspection mode? (Choose two.)
29.
Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?
30.
An administrator has configured outgoing interface any in a firewall policy. Which statement is true about the policy list view?
31.
When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request?
32.
Refer to the exhibit to view the firewall policy. Which statement is correct if well-known viruses are not being blocked?
33.
Which two statements are true about the RPF check? (Choose two.)
34.
Which Security rating scorecard helps identify configuration weakness and best practice violations in your network?
35.
Refer to the exhibit to view the authentication rule configuration. In this scenario, which statement is true?
36.
By default, FortiGate is configured to use HTTPS when performing live web filtering with FortiGuard servers. Which two CLI commands will cause FortiGate to use an unreliable protocol to communicate with FortiGuard servers for live web filtering? (Choose two.)
37.
In consolidated firewall policies, IPv4 and IPv6 policies are combined in a single consolidated policy. Instead of separate policies. Which three statements are true about consolidated IPv4 and IPv6 policy configuration? (Choose three.)
38.
What devices form the core of the security fabric?
39.
Refer to the exhibit. The exhibit displays the output of the CLI command: diagnose sys ha dump-by vcluster. Which two statements are true? (Choose two.)
40.
Refer to the exhibit. Which IP address will be used to source NAT the internet traffic coming from a workstation with the IP address 10.0.1.10?
The exhibit contains a network diagram, virtual IP, IP pool, and firewall policies configuration.
The WAN (port1) interface has the IP address 10.200.1.1/24.
The LAN (port3) interface has the IP address 10.0.1.254/24.
The first firewall policy has NAT enabled using IP Pool.
The second firewall policy is configured with a VIP as the destination address.
41.
When a firewall policy is created, which attribute is added to the policy to support recording logs to a FortiAnalyzer or a FortiManager and improves functionality when a FortiGate is integrated with these devices?
42.
Why does FortiGate keep TCP sessions in the session table for several seconds, even after both sides (client and server) have terminated the session?
43.
Which two statements are correct about a software switch on FortiGate? (Choose two.)
44.
If Internet Service is already selected as Source in a firewall policy, which other configuration objects can be added to the Source field of a firewall policy?
45.
Which of statement is true about SSL VPN web mode?
46.
What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)
47.
An administrator needs to increase network bandwidth and provide redundancy. What interface type must the administrator select to bind multiple FortiGate interfaces?
48.
wo protocol options are available on the CLI but not on the GUI when configuring an SD-WAN Performance SLA? (Choose two.)
49.
Which security feature does FortiGate provide to protect servers located in the internal networks from attacks such as SQL injections?
50.
Which two statements are true about the Security Fabric rating?
51.
Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.)
52.
How does FortiGate act when using SSL VPN in web mode?
53.
A network administrator has enabled SSL certificate inspection and antivirus on FortiGate. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and the file can be downloaded. What is the reason for the failed virus detection by FortiGate?
54.
An administrator has configured two-factor authentication to strengthen SSL VPN access. Which additional best practice can an administrator implement?
55.
Based on the raw logs shown in the exhibit, which statement is correct?
56.
Refer to the exhibit. Given the security fabric topology shown in the exhibit, which two statements are true? (Choose two.)
57.
An organization's employee needs to connect to the office through a high-latency internet connection. Which SSL VPN setting should the administrator adjust to prevent the SSL VPN negotiation failure?
58.
If Internet Service is already selected as Destination in a firewall policy, which other configuration objects can be selected to the Destination field of a firewall policy?
59.
Which statement regarding the firewall policy authentication timeout is true?
60.
Which feature in the Security Fabric takes one or more actions based on event triggers?