Home Chemistry Questions and Answers

Fortinet NSE 4 - FortiOS 6.0 EXAM : Version : V12.95

Course

Subject
Chemistry

Category
Questions and Answers

Pages
45

Uploaded By
ATIPROS

NO.1 Which statement about the IP authentication header (AH) used by IPsec is true? A. AH does not provide any data integrity or encryption. B. AH does not support perfect forward secrecy. C. AH provides data integrity but no encryption. D. AH provides strong data integrity but weak encryption. NO.2 An administrator needs to create an SSL-VPN connection for accessing an internal server using the bookmark Port Forward. What step is required for this configuration? A. Configure an SSL VPN realm for clients to use the port forward bookmark. B. Configure the client application to forward IP traffic through FortiClient. C. Configure the virtual IP address to be assigned t the SSL VPN users. D. Configure the client application to forward IP traffic to a Java applet proxy. NO.3 When override is enabled, which of the following shows the process and selection criteria that are used to elect the primary FortiGate in an HA cluster? A. Connected monitored ports > HA uptime > priority > serial number B. Priority > Connected monitored ports > HA uptime > serial number C. Connected monitored ports > priority > HA uptime > serial number D. HA uptime > priority > Connected monitored ports > serial number NO.4 Which statements about HA for FortiGate devices are true? (Choose two.) A. Sessions handled by proxy-based security profiles cannot be synchronized. B. Virtual clustering can be configured between two FortiGate devices that have multiple VDOMs. C. HA management interface settings are synchronized between cluster members. D. Heartbeat interfaces are not required on the primary device. NO.5 What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.) A. Traffic to botnet servers B. Traffic to inappropriate web sites C. Server information disclosure attacks D. Credit card data leaks E. SQL injection attacks NO.7 Which of the following statements about virtual domains (VDOMs) are true? (Choose two.) A. The root VDOM is the management VDOM by default. B. A FortiGate device has 64 VDOMs, created by default. C. Each VDOM maintains its own system time. D. Each VDOM maintains its own routing table. NO.8 A team manager has decided that while some members of the team need access to particular website, the majority of the team does not. Which configuration option is the most effective option to support this request? A. Implement a web filter category override for the specified website. B. Implement web filter authentication for the specified website C. Implement web filter quotas for the specified website. D. Implement DNS filter for the specified website.
Read More

Preview 5 out of 45 Pages

NSE4_FGT_6.0_20V12.95.pdf.pdf prev1731001030672cfac68735f.png

Download all 45 pages for $ 12.00

Reviews (0)

$ 12.00


Seller

Joined: 7 months ago

Document sold: 0

Reviews received
1
0
0
0
0

Send Message
Document Information
Buy Document

$12.00