Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Fortinet NSE4_FGT_AD-7.6 Dumps Questions Answers

Fortinet NSE 4 - FortiOS 7.6 Administrator Questions and Answers

Question 1

An administrator has configured a dialup IPsec VPN on FortiGate with add-route enabled. However, the static route is not showing in the routing table. Which two statements about this scenario are correct? (Choose two.)

Options:

A.

The administrator must use a policy route instead of a static route for add-route to work properly.

B.

The administrator must ensure phase 2 is successfully established

C.

The administrator must define the remote network correctly in the phase 2 selectors.

D.

The administrator must enable a dynamic routing protocol on the dialup interface.

Buy Now
Question 2

Which two statements describe characteristics of automation stitches? (Choose two answers)

Options:

A.

Actions involve only devices included in the Security Fabric.

B.

An automation stitch can have multiple triggers.

C.

Multiple actions can run in parallel.

D.

Triggers can involve external connectors.

Question 3

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three answers)

Options:

A.

Lowest Cost (SLA) without load balancing

B.

Manual with load balancing

C.

Lowest Quality (SLA) with load balancing

D.

Lowest Cost (SLA) with load balancing

E.

Best Quality with load balancing

Question 4

Which two statements are true about an HA cluster? (Choose two answers)

Options:

A.

An HA cluster cannot have both in-band and out-of-band management interfaces at the same time.

B.

Link failover triggers a failover if the administrator sets the interface down on the primary device.

C.

When sniffing the heartbeat interface, the administrator must see the IP address 169.254.0.2.

D.

HA incremental synchronization includes FIB entries and IPsec SAs.

Question 5

Refer to the exhibit.

Based on the routing table shown in the exhibit, which two statements are true? (Choose two.)

Options:

A.

A packet with the source IP address 10.0.13.10 arriving on port2 is allowed if strict RPF is disabled.

B.

A packet with the source IP address 10.100.110.10 arriving on port2 is allowed if strict RPF is enabled.

C.

A packet with the source IP address 10.100.110.10 arriving on port3 is allowed if strict RPF is disabled.

D.

A packet with the source IP address 10.10.10.10 arriving on port2 is allowed if strict RPF is enabled.

Question 6

Refer to the exhibit.

A RADIUS server configuration is shown.

An administrator added a configuration for a new RADIUS server While configuring, the administrator enabled Include in every user group What is the impact of enabling Include in every user group in a RADIUS configuration?

Options:

A.

This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group.

B.

This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case, is FortiAuthenticator.

C.

This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group.

D.

This option places all users into every RADIUS user group, including groups that are used for the LDAP server on FortiGate.

Question 7

Refer to the exhibit.

The administrator configured SD-WAN rules and set the FortiGate traffic log page to display SD-WAN-specific columns: SD-WAN Quality and SD-WAN Rule Name

FortiGate allows the traffic according to policy ID 1 placed at the top. This is the policy that allows SD-WAN traffic. Despite these settings, the traffic logs do not show the name of the SD-WAN rule used to steer those traffic flows

What could be the reason?

Options:

A.

SD-WAN rule names do not appear immediately. The administrator must refresh the page.

B.

There is no application control profile applied to the firewall policy.

C.

Destinations in the SD-WAN rules are configured for each application, but feature visibility is not enabled.

D.

FortiGate load balanced the traffic according to the implicit SD-WAN rule.

Question 8

Refer to the exhibits.

The system performance output and default configuration of high memory usage thresholds on a FortiGate device are shown.

Based on the system performance output, what are the two possible outcomes? (Choose two.)

Options:

A.

Administrators can access FortiGate only through the console port.

B.

FortiGate has entered conserve mode.

C.

FortiGate drops new sessions.

D.

Administrators can change the configuration.

Question 9

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

Options:

A.

The collector agent uses a Windows API to query DCs for user logins.

B.

The NetSessionEnum function is used to track user logouts.

C.

NetAPI polling can increase bandwidth usage in large networks.

D.

The collector agent must search Windows application event logs.

Question 10

Which two components are part of the secure internet access (SIA) agent-based mode on FortiSASE? (Choose two.)

Options:

A.

FortiSASE Firewall-as-a-Service (FWaaS)

B.

The proxy auto-configuration (PAC) file

C.

VPN policies

D.

FortiExtender

Question 11

An administrator wants to form an HA cluster using the FGCP protocol.

Which two requirements must the administrator ensure both members fulfill? (Choose two.)

Options:

A.

They must have the same hard drive configuration.

B.

They must have the same number of configured VDOMs.

C.

They must have the heartbeat interfaces in the same subnet

D.

They must have the same HA group ID.

Question 12

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

Options:

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile.

B.

The matching firewall policy is set to proxy inspection mode.

C.

The browser does not trust the certificate used by FortiGate for SSL inspection.

D.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

Question 13

How does FortiExtender connect to FortiSASE in a site-based, remote internet access method?

Options:

A.

FortiExtender uses a Virtual Extensible LAN (VXLAN)-over-IPsec connection.

B.

FortiExtender establishes a secure SSL connection using FortiClient.

C.

FortiExtender first connects to a FortiGate LAN extension through a secure web gateway (SWG).

D.

FortiExtender uses the proxy auto-configuration

Question 14

Refer to the exhibits.

An administrator has observed the performance status outputs on an HA cluster for 55 seconds.

Which FortiGate is the primary?

Options:

A.

HQ-NGFW-1 with the parameter memory-failover-flip-timeout setting

B.

HQ-NGFW-2 with the parameter priority setting

C.

HQ-NGFW-1 with the parameter override setting

D.

HQ-NGFW-2 with the parameter memory-failover-threshold setting

Question 15

FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively. Which two statements about the requirements of connected physical interfaces on FortiGate are true? (Choose two.)

Options:

A.

Both interfaces must have DHCP enabled and interfaces set to LAN and DMZ roles assigned.

B.

Both interfaces must have the interface role assigned.

C.

Both interfaces must have directly connected routes on the routing table.

D.

Both interfaces must have IP addresses assigned.

Question 16

Refer to the exhibit.

An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

Options:

A.

The ABC Com is hitting the category Excessive-Bandwidth.

B.

The ABC.Com Type is set as Application instead of Filter.

C.

The ABC.Com is configured under application profile, which must be configured as a web filter profile.

D.

The ABC Com Action is set to Allow

Question 17

Refer to the exhibits.

A diagram of a FortiGate device connected to the network VIP object and firewall policy configurations are shown.

The WAN (port2) interface has the IP address

100.65.0.101/24.

The LAN (port4) interface has the IP address

10.0.11.254/24.

If the host 100.65.1.111 sends a TCP SYN packet on port 443 to 100.65.0.200. what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?

Options:

A.

10.0.11.254, 100.65.0.200. and 443, respectively

B.

10.0.11.254, 10.0.15.50, and 4443. respectively

C.

100.65.1. ill, 10.0.11.50, and 4443. respectively

D.

100.65.1.111, 10.0.11.50. and 443. respectively

Question 18

FortiGate is integrated with FortiAnalyzer and FortiManager.

When creating a firewall policy, which attribute must an administrator include to enhance functionality and enable log recording on FortiAnalyzer and FortiManager?

Options:

A.

Universally Unique Identifier

B.

Policy ID

C.

Sequence ID

D.

Log ID