Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet NSE4_FGT_AD-7.6 - Fortinet NSE 4 - FortiOS 7.6 Administrator

Page: 2 / 3
Total 93 questions

An administrator wants to form an HA cluster using the FGCP protocol. Which two requirements must the administrator ensure both members fulfill? (Choose two answers)

A.

They must have the same HA group ID.

B.

They must have the heartbeat interfaces in the same subnet.

C.

They must have the same number of configured VDOMs.

D.

They must have the same hard drive configuration.

An administrator wants to form an HA cluster using the FGCP protocol. Both FortiGate devices are configured with the set override enable command. Arrange the criteria in the order in which the FGCP protocol uses them to elect the primary FortiGate. Select the criteria in the left column, hold and drag it to a blank position in the column on the right. Place the four correct steps in order, placing the first step in the first position. Once you place a step, you can move it again if you want to change your answer before moving to the next question. You need to drop four criteria in the work area. Select and drag the screen divider to change the viewable area of the source and work areas. (Choose four answers)

An administrator wants to address shadow IT visibility challenges and prevent users from sending sensitive files outside the organization without proper approval. Which FortiSASE method should the administrator implement to achieve these goals? (Choose one answer)

A.

Secure SD-WAN access (SSD-WAN)

B.

Secure private access (SPA)

C.

Secure SaaS access (SSA)

D.

Secure internet access (SIA)

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile.

B.

The matching firewall policy is set to proxy inspection mode.

C.

The browser does not trust the certificate used by FortiGate for SSL inspection.

D.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

Refer to the exhibit.

What can you conclude from the log shown in the exhibit?

A.

The IPS socket buffer is full and IPS engine needs more memory to create new sessions.

B.

The IPS socket buffer is full and IPS engine cannot decode a packet.

C.

The IPS scan is paused by the IPS diagnostic command with bypass mode option 5.

D.

The IPS session scan is paused and reevaluating the packet because of a dirty flag.

Refer to the exhibit.

The predefined deep-inspection and custom-deep-inspection profiles exclude some web categories from SSL inspection, as shown in the exhibit For which two reasons are these web categories exempted? (Choose two.)

A.

The resources utilization is optimized because these websites are in the trusted domain list on FortiGate.

B.

The legal regulation aims to prioritize user privacy and protect sensitive information for these websites.

C.

These websites are in an allowlist of reputable domain names maintained by FortiGuard.

D.

The FortiGate temporary certificate denies the browser ' s access to websites that use HTTP Strict Transport Security.

Refer to the exhibits.

The exhibits show the system performance output and default configuration of high memory usage thresholds on a FortiGate device.

Based on the system performance output, what are the two possible outcomes? (Choose two.)

A.

FortiGate drops new sessions.

B.

Administrators can access FortiGate only through the console port.

C.

Administrators can change the configuration.

D.

FortiGate has entered conserve mode.

An administrator has configured the following settings.

config system settings

set ses-denied-traffic enable

end

config system global

set block-session-timer 30

end

What are the two results of this configuration? (Choose two.)

A.

The number of logs generated by denied traffic is reduced.

B.

A session for denied traffic is created.

C.

Denied users are blocked for 30 minutes.

D.

Session helpers are disabled for denied traffic.

A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.

Which VPN Wizard template must the administrator apply?

A.

Remote Access

B.

Hub-and-Spoke

C.

Site-to-Site

D.

Dial-up User

How does FortiExtender connect to FortiSASE in a site-based, remote internet access method?

A.

FortiExtender uses a Virtual Extensible LAN (VXLAN)-over-IPsec connection.

B.

FortiExtender establishes a secure SSL connection using FortiClient.

C.

FortiExtender first connects to a FortiGate LAN extension through a secure web gateway (SWG).

D.

FortiExtender uses the proxy auto-configuration < PAC) file and an explicit web proxy to connect.