Certbus > Fortinet > NSE4 > NSE4_FGT-5.6 > NSE4_FGT-5.6 Online Practice Questions and Answers

NSE4_FGT-5.6 Online Practice Questions and Answers

Questions 4

Which of the following configuration settings are global settings?

(Choose two.)

Response:

A. FortiGuard settings

B. HA settings

C. Firewall policies

D. Security profiles

Browse 114 Q&As
Questions 5

If antivirus, grayware, and heuristic scans are enabled on FortiGate, in which order does FortiGate apply the scanning?

Response:

A. heuristics -> grayware -> antivirus

B. antivirus -> grayware -> heuristics

C. antivirus -> heuristics -> grayware

D. grayware -> antivirus -> heuristics

Browse 114 Q&As
Questions 6

How can you format the FortiGate flash disk? Response:

A. Load the hardware test (HQIP) image.

B. Execute the CLI command execute formatlogdisk.

C. Load a debug FortiOS image.

D. Select the format boot device option from the BIOS menu.

Browse 114 Q&As
Questions 7

Which of the following statements regarding FortiGate inspection modes are correct?

(Choose three.)

Response:

A. Proxy-based inspection mode supports more features.

B. Flow-based is the default FortiGate inspection mode.

C. Switching from proxy-based inspection mode to flow-based inspection mode will result in a warning message.

D. Security profiles must be manually converted to flow-based before switching the inspection mode from proxy-based to flow-based.

E. Switching from proxy-based to flow-based and then back to proxy-based will not produce original configurations.

Browse 114 Q&As
Questions 8

Which statement is true about split tunneling in SSL VPN? Response:

A. It is supported in web-only mode.

B. It can be enabled by the SSL VPN user, after connecting to the SSL VPN.

C. If enabled, Internet traffic uses the local gateway of the connecting host.

D. If disabled, SSL VPN users must authenticate using FortiToken.

Browse 114 Q&As
Questions 9

Which of the following are differences between IPsec main mode and IPsec aggressive mode?

(Choose two.)

Response:

A. Aggressive mode supports XAuth, while main mode does not.

B. Six packets are usually exchanged during main mode, while only three packets are exchanged during aggressive mode.

C. The first packet of aggressive mode contains the peer ID, while the first packet of main mode does not.

D. Main mode cannot be used for dialup VPNs, while aggressive mode can.

Browse 114 Q&As
Questions 10

View the exhibit.

When a user attempts to connect to an HTTPS site, what is the expected result with this configuration? Response:

A. The user is required to authenticate before accessing sites with untrusted SSL certificates.

B. The user is presented with certificate warnings when connecting to sites that have untrusted SSL certificates.

C. The user is allowed access all sites with untrusted SSL certificates, without certificate warnings.

D. The user is blocked from connecting to sites that have untrusted SSL certificates (no exception provided).

Browse 114 Q&As
Questions 11

FortiGate scans packets for matches in a specific order for application control. Which option provides the correct sequence order?

Response:

A. Static domain overrides -> application overrides -> filter overrides

B. Categories -> application overrides -> filter overrides

C. Application overrides -> filter overrides -> categories

D. Rate based overrides -> filter overrides -> categories

Browse 114 Q&As
Questions 12

Which are the different types of memory conserve mode that can occur on a FortiGate device?

(Choose two.)

Response:

A. System

B. Device

C. Kernel

D. Flow

Browse 114 Q&As
Questions 13

Which of the following are factory default settings on a FortiGate?

(Choose two.)

Response:

A. Administrative account is admin

B. Password for administrative access is Fortinet

C. Port1 (or internal) interface IP is 192.168.1.99/24

D. Default gateway IP is 192.168.1.1 using porn (or internal) interface

E. Mode of operation is transparent

Browse 114 Q&As
Questions 14

Which of the following IPsec parameters is a phase 2 configuration setting? Response:

A. Peer ID

B. eXtended Authentication (XAuth)

C. Quick mode selectors

D. Authentication method

Browse 114 Q&As
Questions 15

What FortiGate feature can be used to prevent a cross-site scripting (XSS) attack? Response:

A. Web application firewall (WAF)

B. DoS policies

C. Rate based IPS signatures

D. One-arm sniffer

Browse 114 Q&As
Questions 16

What is the purpose of the Policy Lookup feature? Response:

A. It searches the matching policy based on input criteria.

B. It creates packet flow over FortiGate by sending real-time traffic.

C. It finds duplicate objects in firewall policies.

D. It creates a new firewall policy based on input criteria.

Browse 114 Q&As
Questions 17

What is the purpose of the Policy Lookup feature? Response:

A. It searches the matching policy based on an input criteria.

B. It enables hidden security profiles with full logging capabilities and generates Learning Reports based on an input criteria.

C. It finds duplicate objects in firewall policies.

D. It creates a new firewall policy based on an input criteria.

Browse 114 Q&As
Questions 18

Examine this output from the diagnose sys top command:

Which statements about the output are true?

(Choose two.)

Response:

A. sshd is the process consuming most memory

B. sshd is the process consuming most CPU

C. All the processes listed are in sleeping state

D. The sshd process is using 123 pages of memory

Browse 114 Q&As
Exam Code: NSE4_FGT-5.6
Exam Name: Fortinet NSE 4 - FortiOS 5.6
Last Update: Apr 22, 2024
Questions: 114 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99