Pass4itsure > Fortinet > NSE4 > NSE4_FGT-5.6 > NSE4_FGT-5.6 Online Practice Questions and Answers

NSE4_FGT-5.6 Online Practice Questions and Answers

Questions 4

Which statements about FortiGate inspection modes are true?

(Choose two.)

Response:

A. The default inspection mode is proxy based.

B. Switching from proxy-based mode to flow-based, then back to proxy-based mode, will not result in the original configuration.

C. Proxy-based inspection is not available in VDOMs operating in transparent mode.

D. Flow-based profiles must be manually converted to proxy-based profiles before changing the inspection mode from flow based to proxy based.

Buy Now
Questions 5

Which traffic inspection features can be executed by a security processor (SP)?

(Choose three.)

Response:

A. TCP SYN proxy

B. SIP session helper

C. Proxy-based antivirus

D. Attack signature matching

E. Flow-based web filtering

Buy Now
Questions 6

A FortiGate interface is configured with the following commands:

What statements about the configuration are correct?

(Choose two.)

Response:

A. IPv6 clients connected to port1 can use SLAAC to generate their IPv6 addresses.

B. FortiGate can provide DNS settings to IPv6 clients.

C. FortiGate can send IPv6 router advertisements (RAs.)

D. FortiGate can provide IPv6 addresses to DHCPv6 client.

Buy Now
Questions 7

You have configured the following log settings on the Log Settings page. Which configurations are now

required to generate log messages on traffic coming through your network?

(Choose two.)

Response:

A. Enable Log Allowed Traffic on your firewall policy.

B. Enable Local Traffic Log on the Log Settings page.

C. Enable Historical FortiView on the Log Settings page.

D. Enable a security profile on your firewall policy.

E. Enable Capture Packets on your firewall policy.

Buy Now
Questions 8

Under which circumstance is the IPsec ESP traffic encapsulated over UDP? Response:

A. When using IKE version 2 (IKEv2)

B. When the phase 1 is configured to use aggressive mode

C. When the IPsec VPN is configured as dial-up

D. When NAT-T detects there is a device between both IPsec peers doing NAT over the IPsec traffic

Buy Now
Questions 9

Which file names will match the *.tiff file name pattern configured in a DLP filter?

(Choose two.)

Response:

A. tiff.jpeg

B. tiff.tiff

C. gif.tiff

D. tiff.png

Buy Now
Questions 10

What FortiGate feature can be used to block a ping sweep scan from an attacker? Response:

A. Web application firewall (WAF)

B. Rate based IPS signatures

C. One-arm sniffer

D. DoS policies

Buy Now
Questions 11

An administrator needs to be able to view logs for application usage on your network. What configurations

are required to ensure that FortiGate generates logs for application usage activity?

(Choose two.)

Response:

A. Enable a web filtering profile on the firewall policy.

B. Create an application control policy.

C. Enable logging on the firewall policy.

D. Enable an application control security profile on the firewall policy.

Buy Now
Questions 12

Which component of FortiOS performs application control inspection? Response:

A. Kernel

B. Antivirus engine

C. IPS engine

D. Application control engine

Buy Now
Questions 13

Which of the following statements are true regarding the SD-WAN feature on FortiGate?

(Choose two.)

Response:

A. An SD-WAN static route does not require a next-hop gateway IP address.

B. Each member interface requires its own firewall policy to allow traffic.

C. SD-WAN provides route failover protection, but cannot load-balance traffic.

D. FortiGate supports only one SD-WAN interface per VDOM.

Buy Now
Exam Code: NSE4_FGT-5.6
Exam Name: Fortinet NSE 4 - FortiOS 5.6
Last Update: Apr 25, 2024
Questions: 114
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99