Month End Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet NSE4_FGT_AD-7.6 - Fortinet NSE 4 - FortiOS 7.6 Administrator

Page: 1 / 2
Total 60 questions

Refer to the exhibits.

An administrator wants to add HQ-ISFW-2 in the Security Fabric. HQ-ISFW-2 is in the same subnet as HQ-ISFW. After configuring the Security Fabric settings on HQ-ISFW-2, the status stays Pending. What can be the two possible reasons? (Choose two answers)

A.

Upstream FortiGate IP must be set to 10.0.11.254.

B.

SAML Single Sign-On must be set to Manual.

C.

HQ-ISFW-2 must be authorized on HQ-ISFW.

D.

Management IP must be set to 10.0.13.254.

Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity. What must the administrator configure to answer this specific request from the NOC team? (Choose one answer)

A.

Move NOC_Access to the top of the list to ensure all profile settings take effect.

B.

Increase the offline value of the Override Idle Timeout parameter in the NOC_Access admin profile.

C.

Ensure that all NOC_Access users are assigned the super_admin role to guarantee access.

D.

Increase the admintimeout value under config system accprofile NOC_Access.

You have configured the below commands on a FortiGate.

What would be the impact of this configuration on FortiGate?

A.

FortiGate will enable strict RPF on all its interfaces and porti will be exempted from RPF checks.

B.

FortiGate will enable strict RPF on all its interfaces and porti will be enable for asymmetric routing.

C.

The global configuration will take precedence and FortiGate will enable strict RPF on all interfaces.

D.

Port1 will be enabled with flexible RPF. and all other interfaces will be enabled for strict RPF

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name

FortiGate allows the traffic according to policy ID 1 placed at the top. This is the policy that allows SD-WAN traffic. Despite these settings, the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows

What could be the reason?

A.

SD-WAN rule names do not appear immediately. The administrator must refresh the page.

B.

There is no application control profile applied to the firewall policy.

C.

Destinations in the SD-WAN rules are configured for each application, but feature visibility is not enabled.

D.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

A.

FortiGate uses the AD server as the collector agent.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.

FortiGate does not support workstation check.

D.

FortiGate directs the collector agent to use a remote LDAP server.

You have configured an application control profile, set peer-to-peer traffic to Block under the Categories tab. and applied it to the firewall policy. However, your peer-to-peer traffic on known ports is passing through the FortiGate without being blocked.

What FortiGate settings should you check to resolve this issue?

A.

FortiGuard category ratings

B.

Network Protocol Enforcement

C.

Replacement Messages for UDP-based Applications

D.

Application and Filter Overrides

Refer to the exhibits.

The system performance output and default configuration of high memory usage thresholds on a FortiGate device are shown.

Based on the system performance output, what are the two possible outcomes? (Choose two.)

A.

Administrators can access FortiGate only through the console port.

B.

FortiGate has entered conserve mode.

C.

FortiGate drops new sessions.

D.

Administrators can change the configuration.

Which three statements explain a flow-based antivirus profile? (Choose three answers)

A.

FortiGate buffers the whole file but transmits to the client at the same time.

B.

Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.

C.

If a virus is detected, the last packet is delivered to the client.

D.

Flow-based inspection optimizes performance compared to proxy-based inspection.

E.

The IPS engine handles the process as a standalone.

Refer to the exhibit.

Based on this partial configuration, what are the two possible outcomes when FortiGate enters conserve mode? (Choose two.)

A.

FortiGate drops new sessions requiring inspection.

B.

Administrators must restart FortiGate to allow new sessions.

C.

Administrators cannot change the configuration.

D.

FortiGate skips quarantine actions.

Refer to the exhibits.

The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details. Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming? (Choose one answer)

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.

B.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.

C.

Apple FaceTime will be allowed, based on the Apple filter configuration.

D.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.