Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet NSE6_FAC-6.4 - Fortinet NSE 6 - FortiAuthenticator 6.4

Page: 1 / 2
Total 47 questions

Which interface services must be enabled for the SCEP client to connect to Authenticator?

A.

OCSP

B.

REST API

C.

SSH

D.

HTTP/HTTPS

Which behaviors exist for certificate revocation lists (CRLs) on FortiAuthenticator? (Choose two)

A.

CRLs contain the serial number of the certificate that has been revoked

B.

Revoked certificates are automaticlly placed on the CRL

C.

CRLs can be exported only through the SCEP server

D.

All local CAs share the same CRLs

Examine the screenshot shown in the exhibit.

Which two statements regarding the configuration are true? (Choose two.)

A.

All guest accounts created using the account registration feature will be placed under the Guest_Portal_Users group

B.

All accounts registered through the guest portal must be validated through email

C.

Guest users must fill in all the fields on the registration form

D.

Guest user account will expire after eight hours

You are the administrator of a global enterprise with three FortiAuthenticator devices. You would like to deploy them to provide active-passive HA at headquarters, with geographically distributed load balancing.

What would the role settings be?

A.

One standalone and two load balancers

B One standalone primary, one cluster member, and one load balancer

B.

Two cluster members and one backup

C.

Two cluster members and one load balancer

An administrator wants to keep local CA cryptographic keys stored in a central location.

Which FortiAuthenticator feature would provide this functionality?

A.

SCEP support

B.

REST API

C.

Network HSM

D.

SFTP server

A digital certificate, also known as an X.509 certificate, contains which two pieces of information? (Choose two.)

A.

Issuer

B.

Shared secret

C.

Public key

D.

Private key

Which method is the most secure way of delivering FortiToken data once the token has been seeded?

A.

Online activation of the tokens through the FortiGuard network

B.

Shipment of the seed files on a CD using a tamper-evident envelope

C.

Using the in-house token provisioning tool

D.

Automatic token generation using FortiAuthenticator

Which option correctly describes an SP-initiated SSO SAML packet flow for a host without a SAML assertion?

A.

Service provider contacts idendity provider, idendity provider validates principal for service provider, service provider establishes communication with principal

B.

Principal contacts idendity provider and is redirected to service provider, principal establishes connection with service provider, service provider validates authentication with identify provider

C.

Principal contacts service provider, service provider redirects principal to idendity provider, after succesfull authentication identify provider redirects principal to service provider

D.

Principal contacts idendity provider and authenticates, identity provider relays principal to service provider after valid authentication

Which FSSO discovery method transparently detects logged off users without having to rely on external features such as WMI polling?

A.

Windows AD polling

B.

FortiClient SSO Mobility Agent

C.

Radius Accounting

D.

DC Polling

Which two statements about the EAP-TTLS authentication method are true? (Choose two)

A.

Uses mutual authentication

B.

Uses digital certificates only on the server side

C.

Requires an EAP server certificate

D.

Support a port access control (wired) solution only