Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Fortinet NSE4_FGT_AD-7.6 Dumps Questions Answers

Fortinet NSE 4 - FortiOS 7.6 Administrator Questions and Answers

Question 1

An administrator wants to form an HA cluster using the FGCP protocol. Which two requirements must the administrator ensure both members fulfill? (Choose two answers)

Options:

A.

They must have the same HA group ID.

B.

They must have the heartbeat interfaces in the same subnet.

C.

They must have the same number of configured VDOMs.

D.

They must have the same hard drive configuration.

Buy Now
Question 2

Which three statements explain a flow-based antivirus profile? (Choose three answers)

Options:

A.

FortiGate buffers the whole file but transmits to the client at the same time.

B.

Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.

C.

If a virus is detected, the last packet is delivered to the client.

D.

Flow-based inspection optimizes performance compared to proxy-based inspection.

E.

The IPS engine handles the process as a standalone.

Question 3

Which three methods are used by the collector agent for AD polling? (Choose three answers)

Options:

A.

NetAPI

B.

WMI

C.

WinSecLog

D.

DNS reverse lookup

E.

FSSO REST API

Question 4

You have configured an application control profile, set peer-o-peer traffic to Block under the Categories tab, and applied it to the firewall policy. However, you peer-to-peer traffic on known ports is passing through the FortiGate without being blocked. What FortiGate settings should you check to resolve this issue?

Options:

A.

Replacement Messages for UDP-based Applications

B.

Network Protocol Enforcement

C.

Application and Filter Overrides

D.

FortiGuard category ratings

Question 5

Refer to the exhibits.

The exhibits show a diagram of a FortiGate device connected to the network, as well as the IP pool configuration and firewall policy objects.

The WAN (port2) interface has the IP address

100.65.0.101/24.

The LAN (port4) interface has the IP address

10.0.11.254/24.

Which IP address will be used to source NAT (SNAT) the traffic, if the user on HQ-PC-1 (10.0.11.50) pings the IP address of BR-FGT (100.65.1.111)?

Options:

A.

100.65.0.101

B.

100.65.0.49

C.

100.65.0.149

D.

100.65.0.99

Question 6

Refer to the exhibits.

An administrator has observed the performance status outputs on an HA cluster for 55 seconds.

Which FortiGate is the primary?

Options:

A.

HQ-NGFW-1 with the parameter memory-failover-flip-timeout setting

B.

HQ-NGFW-2 with the parameter priority setting

C.

HQ-NGFW-1 with the parameter override setting

D.

HQ-NGFW-2 with the parameter memory-failover-threshold setting

Question 7

Which three statements about SD-WAN performance SLAs are true? (Choose three.)

Options:

A.

They rely on session loss and jitter.

B.

They monitor the state of the FortiGate device.

C.

All the SLA targets can be configured.

D.

They are applied in a SD-WAN rule lowest cost strategy.

E.

They can be measured actively or passively.

Question 8

There are multiple dialup IPsec VPNs configured in aggressive mode on the HQ FortiGate. The requirement is to connect dial-up users to their respective department VPN tunnels.

Which phase 1 setting you can configure to match the user to the tunnel?

Options:

A.

Local Gateway

B.

Dead Peer Detection

C.

Peer ID

D.

IKE Mode Config

Question 9

When configuring the connection between FortiGate and FortiAnalyzer, which option indicates that reliable traffic is enabled? (Choose one answer)

Options:

A.

The connection status shows a green check icon

B.

The interface status is set to up

C.

A padlock icon appears in the connection settings

D.

The logging mode is set to real-time

Question 10

Refer to the exhibit.

What can you conclude from the log shown in the exhibit?

Options:

A.

The IPS socket buffer is full and IPS engine needs more memory to create new sessions.

B.

The IPS socket buffer is full and IPS engine cannot decode a packet.

C.

The IPS scan is paused by the IPS diagnostic command with bypass mode option 5.

D.

The IPS session scan is paused and reevaluating the packet because of a dirty flag.

Question 11

You have configured an application control profile, set peer-to-peer traffic to Block under the Categories tab. and applied it to the firewall policy. However, your peer-to-peer traffic on known ports is passing through the FortiGate without being blocked.

What FortiGate settings should you check to resolve this issue?

Options:

A.

FortiGuard category ratings

B.

Network Protocol Enforcement

C.

Replacement Messages for UDP-based Applications

D.

Application and Filter Overrides

Question 12

Refer to the exhibits.

A diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device are shown.

Two PCs. PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.

Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

Options:

A.

In the system settings, set Multiple Interface Policies to enable.

B.

in the IP pool configuration, set end ipto 100.65.0.112.

C.

In the firewall policy, set match-vip to enable using CLI.

D.

In the IP pool configuration, set type to overload.

Question 13

Refer to the exhibit.

An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

Options:

A.

The ABC Com is hitting the category Excessive-Bandwidth.

B.

The ABC.Com Type is set as Application instead of Filter.

C.

The ABC.Com is configured under application profile, which must be configured as a web filter profile.

D.

The ABC Com Action is set to Allow

Question 14

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

Options:

A.

FortiGate uses the AD server as the collector agent.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.

FortiGate does not support workstation check.

D.

FortiGate directs the collector agent to use a remote LDAP server.

Question 15

Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.

Which action must the administrator perform to consolidate the two policies into one?

Options:

A.

Select port1 and port2 subnets in a single firewall policy.

B.

Create an Aggregate interface that includes port1 and port2 to create a single firewall policy.

C.

Replace port1 and port2 with the any interface in a single firewall policy.

D.

Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy.

Question 16

A new administrator is configuring FSSO authentication on FortiGate using DC Agent Mode. Which step is not part of the expected process?

Options:

A.

The DC agent sends login event data directly to FortiGate.

B.

FortiGate determines user identity based on the IP address in the FSSO list.

C.

The collector agent forwards login event data to FortiGate.

D.

The user logs into the windows domain.

Question 17

Refer to the exhibit.

Why is the Antivirus scan switch grayed out when you are creating a new antivirus profile for FTP?

Options:

A.

Antivirus scan is disabled under System - > Feature visibility

B.

None of the inspected protocols are active in this profile.

C.

The Feature Set for the profile is Flow-based but it must be Proxy-based

D.

FortiGate. with less than 2 GB RAM. does not support the Antivirus scan feature.

Question 18

Refer to the exhibits.

The exhibits show the application sensor configuration and the Excessive-Bandwidth and Apple filter details. Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming? (Choose one answer)

Options:

A.

Apple FaceTime will be allowed, based on the Video/Audio category configuration.

B.

Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration.

C.

Apple FaceTime will be allowed, based on the Apple filter configuration.

D.

Apple FaceTime will be allowed only if the Apple filter in Application and Filter Overrides is set to Allow.

Question 19

Refer to the exhibit

A firewall policy to enable active authentication is shown.

When attempting to access an external website using an active authentication method, the user is not presented with a login prompt. What is the most likely reason for this situation?

Options:

A.

No matching user account exists for this user.

B.

The Remote-users group must be set up correctly in the FSSO configuration.

C.

The Remote-users group is not added to the Destination

D.

The Service DNS is required in the firewall policy.

Question 20

Refer to the exhibit.

A RADIUS server configuration is shown.

An administrator added a configuration for a new RADIUS server While configuring, the administrator enabled Include in every user group What is the impact of enabling Include in every user group in a RADIUS configuration?

Options:

A.

This option places the RADIUS server, and all users who can authenticate against that server, into every FortiGate user group.

B.

This option places all FortiGate users and groups required to authenticate into the RADIUS server, which, in this case, is FortiAuthenticator.

C.

This option places the RADIUS server, and all users who can authenticate against that server, into every RADIUS group.

D.

This option places all users into every RADIUS user group, including groups that are used for the LDAP server on FortiGate.

Question 21

Refer to the exhibit.

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up.

Based on the phase 2 configuration shown in the exhibit, which two configuration changes will bring phase 2 up? (Choose two.)

Options:

A.

On BR1-FGT, set Remote Address to 10.0.11.0/255.255.255.0.

B.

On HQ-NGFW. enable Diffie-Hellman Group 2.

C.

On BR1-FGT. set Seconds to 43200

D.

On HQ-NGFW. set Encryption to AES256.

Question 22

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three answers)

Options:

A.

Lowest Cost (SLA) without load balancing

B.

Manual with load balancing

C.

Lowest Quality (SLA) with load balancing

D.

Lowest Cost (SLA) with load balancing

E.

Best Quality with load balancing

Question 23

Refer to the exhibit.

The predefined deep-inspection and custom-deep-inspection profiles exclude some web categories from SSL inspection, as shown in the exhibit For which two reasons are these web categories exempted? (Choose two.)

Options:

A.

The resources utilization is optimized because these websites are in the trusted domain list on FortiGate.

B.

The legal regulation aims to prioritize user privacy and protect sensitive information for these websites.

C.

These websites are in an allowlist of reputable domain names maintained by FortiGuard.

D.

The FortiGate temporary certificate denies the browser ' s access to websites that use HTTP Strict Transport Security.

Question 24

Refer to the exhibit.

An intrusion prevention system (IPS) profile signature setting is shown.

What can you conclude about the signature when adding the FTP.Login.Failed signature to the IPS Sensor profile?

Options:

A.

The signature setting uses a custom rating threshold.

B.

FortiGate allows this low severity signature packet and creates a log.

C.

FortiGate stores a local copy of the packet that matches the signature.

D.

The signature setting includes a group of other signatures.

Question 25

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

Options:

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile.

B.

The matching firewall policy is set to proxy inspection mode.

C.

The browser does not trust the certificate used by FortiGate for SSL inspection.

D.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

Question 26

Refer to the exhibits.

A web filter profile configuration and firewall policy configuration are shown.

You are trying to access facebook.com, but you are redirected to a FortiGuard web filtering block page.

Based on the exhibits, what is the possible cause of the issue?

Options:

A.

The web rating override configuration is incorrect.

B.

The web filter profile feature set is configured incorrectly.

C.

The firewall policy inspection mode is incorrect.

D.

For www. facebook. com. the URL filter action is incorrect.