Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Fortinet NSE4_FGT_AD-7.6 Dumps

Fortinet NSE 4 - FortiOS 7.6 Administrator Questions and Answers

Question 1

You have configured an application control profile, set peer-o-peer traffic to Block under the Categories tab, and applied it to the firewall policy. However, you peer-to-peer traffic on known ports is passing through the FortiGate without being blocked. What FortiGate settings should you check to resolve this issue?

Options:

A.

Replacement Messages for UDP-based Applications

B.

Network Protocol Enforcement

C.

Application and Filter Overrides

D.

FortiGuard category ratings

Question 2

An administrator wants to form an HA cluster using the FGCP protocol. Both FortiGate devices are configured with the set override enable command. Arrange the criteria in the order in which the FGCP protocol uses them to elect the primary FortiGate. Select the criteria in the left column, hold and drag it to a blank position in the column on the right. Place the four correct steps in order, placing the first step in the first position. Once you place a step, you can move it again if you want to change your answer before moving to the next question. You need to drop four criteria in the work area. Select and drag the screen divider to change the viewable area of the source and work areas. (Choose four answers)

as

Options:

Question 3

Refer to the exhibit.

A routing table is shown

as

An administrator wants to create a new static route so the traffic to the subnet 172.20.1.0/24 is routed through port2 only. What are the two criteria that the administrator can use to achieve this objective? (Choose two.)

Options:

A.

The new static route must have the priority set to 3.

B.

The new static route must have the metric set to 1.

C.

The existing static route through port3 must have the distance set to 11.

D.

The new static route must have the distance set to 9

Question 4

What are three key routing principles in SD-WAN? (Choose three answers)

Options:

A.

By default, SD-WAN rules are skipped if the included SD-WAN members do not have a valid route to the destination.

B.

SD-WAN rules have precedence over any other type of routes.

C.

Regular policy routes have precedence over SD-WAN rules.

D.

By default, SD-WAN rules are skipped if only one route to the destination is available.

E.

By default, SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member.

Question 5

A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors.

What is the reason for the certificate warning errors?

Options:

A.

The option invalid SSL certificates is set to allow on the SSL/SSH inspection profile.

B.

The matching firewall policy is set to proxy inspection mode.

C.

The browser does not trust the certificate used by FortiGate for SSL inspection.

D.

The certificate used by FortiGate for SSL inspection does not contain the required certificate extensions.

Question 6

Refer to the exhibits.

as

as

as

A web filter profile configuration and firewall policy configuration are shown.

You are trying to access facebook.com, but you are redirected to a FortiGuard web filtering block page.

Based on the exhibits, what is the possible cause of the issue?

Options:

A.

The web rating override configuration is incorrect.

B.

The web filter profile feature set is configured incorrectly.

C.

The firewall policy inspection mode is incorrect.

D.

For www. facebook. com. the URL filter action is incorrect.

Question 7

What is the primary FortiGate election process when the HA override setting is enabled? (Choose one answer)

Options:

A.

Connected monitored ports > Priority > HA uptime > FortiGate serial number

B.

Connected monitored ports > Priority > System uptime > FortiGate serial number

C.

Connected monitored ports > HA uptime > Priority > FortiGate serial number

D.

Connected monitored ports > System uptime > Priority > FortiGate serial number

Question 8

Refer to the exhibit.

as

The predefined deep-inspection and custom-deep-inspection profiles exclude some web categories from SSL inspection, as shown in the exhibit For which two reasons are these web categories exempted? (Choose two.)

Options:

A.

The resources utilization is optimized because these websites are in the trusted domain list on FortiGate.

B.

The legal regulation aims to prioritize user privacy and protect sensitive information for these websites.

C.

These websites are in an allowlist of reputable domain names maintained by FortiGuard.

D.

The FortiGate temporary certificate denies the browser ' s access to websites that use HTTP Strict Transport Security.

Question 9

Refer to the exhibit to view the firewall policy.

as

Why would the firewall policy not block a well-known virus, for example EICAR? (Choose one answer)

Options:

A.

The action on the firewall policy is not set to DENY.

B.

Web filter is not enabled, so the firewall policy does not complement the antivirus profile.

C.

The firewall policy is not configured in proxy-based inspection mode.

D.

The firewall policy does not apply deep content inspection.

Question 10

Refer to the exhibit

A firewall policy to enable active authentication is shown.

as

When attempting to access an external website using an active authentication method, the user is not presented with a login prompt. What is the most likely reason for this situation?

Options:

A.

No matching user account exists for this user.

B.

The Remote-users group must be set up correctly in the FSSO configuration.

C.

The Remote-users group is not added to the Destination

D.

The Service DNS is required in the firewall policy.

Question 11

Which two statements about the Security Fabric rating are true? (Choose two answers)

Options:

A.

A license is required to obtain an executive summary in the Security Rating section.

B.

The root FortiGate provides executive summaries of all the FortiGate devices in the Security Fabric.

C.

The Security Posture category provides PCI compliance results.

D.

Security Rating Insights are available only in the Security Rating page.

Question 12

Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three answers)

Options:

A.

Lowest Cost (SLA) without load balancing

B.

Manual with load balancing

C.

Lowest Quality (SLA) with load balancing

D.

Lowest Cost (SLA) with load balancing

E.

Best Quality with load balancing

Question 13

Refer to the exhibit.

as

An SD-WAN zone configuration on the FortiGate GUI is shown. Based on the exhibit, which statement is true?

Options:

A.

The Underlay zone contains no member.

B.

The virtual-wan-link and overlay zones can be deleted

C.

The Underlay zone is the zone by default.

D.

port2 and port3 are not assigned to a zone.

Question 14

A new administrator is configuring FSSO authentication on FortiGate using DC Agent Mode. Which step is not part of the expected process?

Options:

A.

The DC agent sends login event data directly to FortiGate.

B.

FortiGate determines user identity based on the IP address in the FSSO list.

C.

The collector agent forwards login event data to FortiGate.

D.

The user logs into the windows domain.

Question 15

Refer to the exhibit.

as

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 status is up, but phase 2 fails to come up.

Based on the phase 2 configuration shown in the exhibit, which two configuration changes will bring phase 2 up? (Choose two.)

Options:

A.

On BR1-FGT, set Remote Address to 10.0.11.0/255.255.255.0.

B.

On HQ-NGFW. enable Diffie-Hellman Group 2.

C.

On BR1-FGT. set Seconds to 43200

D.

On HQ-NGFW. set Encryption to AES256.

Question 16

Refer to the exhibit.

as

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity. What must the administrator configure to answer this specific request from the NOC team?

Options:

A.

Increase the admintimeout value under config system accprofile noc Access.

B.

increase the of line value of the override idle Timeout parameter in the NOC_Access admin profile.

C.

Move NOC_Access to the top of the list to ensure all profile settings take effect.

D.

Ensure that all NOC_Access users are assigned the super_admin role to guarantee access.

Question 17

An administrator has configured a dialup IPsec VPN on FortiGate with add-route enabled. However, the static route is not showing in the routing table. Which two statements about this scenario are correct? (Choose two.)

Options:

A.

The administrator must use a policy route instead of a static route for add-route to work properly.

B.

The administrator must ensure phase 2 is successfully established

C.

The administrator must define the remote network correctly in the phase 2 selectors.

D.

The administrator must enable a dynamic routing protocol on the dialup interface.

Question 18

Refer to the exhibit.

as

Why did the FortiGate device drop the packet?

Options:

A.

It matched the default implicit firewall policy.

B.

It failed the RPF check.

C.

It matched an explicitly configured firewall policy with the action DENY.

D.

It cannot reach the next-hop IP.

Question 19

What are two characteristics of HA cluster heartbeat IP addresses in a FortiGate device? (Choose two.)

Options:

A.

Heartbeat IP addresses are used to distinguish between cluster members.

B.

The heartbeat interface of the primary device in the cluster is always assigned IP address 169.254.0.1.

C.

A change in the heartbeat IP address happens when a FortiGate device joins or leaves the cluster.

D.

Heartbeat interfaces have virtual IP addresses that are manually assigned.

Question 20

Refer to the exhibits.

as

as

as

A diagram of a FortiGate device connected to the network VIP object and firewall policy configurations are shown.

The WAN (port2) interface has the IP address

100.65.0.101/24.

The LAN (port4) interface has the IP address

10.0.11.254/24.

If the host 100.65.1.111 sends a TCP SYN packet on port 443 to 100.65.0.200. what will the source address, destination address, and destination port of the packet be at the time FortiGate forwards the packet to the destination?

Options:

A.

10.0.11.254, 100.65.0.200. and 443, respectively

B.

10.0.11.254, 10.0.15.50, and 4443. respectively

C.

100.65.1. 111, 10.0.11.50, and 4443. respectively

D.

100.65.1.111, 10.0.11.50. and 443. respectively

Question 21

Refer to the exhibits.

as

as

You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.

You cannot access any of the Google applications, but you are able to access

Which two actions would you take to resolve the issue? (Choose two.)

Options:

A.

Set SSL inspection to deep-content inspection.

B.

Move up Google in the Application and Filter Overrides section to set its priority lot

C.

Add " Google " .com to the URL category in the security profile.

D.

Change the Inspection mode to Flow-based

E.

Set the action for Google in the Application and Filter Overrides section to Allow

Question 22

Refer to the exhibits.

as

An administrator wants to add HQ-ISFW-2 in the Security Fabric. HQ-ISFW-2 is in the same subnet as HQ-ISFW. After configuring the Security Fabric settings on HQ-ISFW-2, the status stays Pending. What can be the two possible reasons? (Choose two answers)

Options:

A.

Upstream FortiGate IP must be set to 10.0.11.254.

B.

SAML Single Sign-On must be set to Manual.

C.

HQ-ISFW-2 must be authorized on HQ-ISFW.

D.

Management IP must be set to 10.0.13.254.

Question 23

Refer to the exhibit.

as

A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.

Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

Options:

A.

On HQ-NGFW, disable Diffie-Hellman group 2.

B.

On HQ-NGFW, set IKE mode to Main (ID protection).

C.

On BR1-FGT, set port2 to Interface.

D.

On both FortiGate devices, set Dead Peer Detection to On Demand.

Question 24

Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)

Options:

A.

No certificate is required on the remote peer when you set the certificate signature as the authentication method

B.

Extended authentication (XAuth) for faster authentication because fewer packets are exchanged

C.

Extended authentication (XAuth) to request the remote peer to provide a username and password

D.

Pre-shared key and certificate signature as authentication methods

Question 25

Exhibits:

as

You are asked to implement an antivirus profile for files downloaded through FTP, HTTP, and HTTPS.

While testing, you are successful with HTTP and FTP protocols, but FortiGate does not block the file download over HTTPS.

What could be the cause?

Options:

A.

The feature set in the antivirus profile is not set to Flow-based.

B.

Web filter is not enabled on the firewall policy to complement the antivirus profile.

C.

The action on the firewall policy is not set to deny.

D.

The SSL inspection mode in the firewall policy is not deep content inspection.

Question 26

A network administrator is reviewing firewall policies in both Interface Pair View and By Sequence View. The policies appear in a different order in each view. Why is the policy order different in these two views?

Options:

A.

By Sequence View groups policies based on rule priority, while Interface Pair View always follows the order of traffic logs.

B.

The firewall dynamically reorders policies in Interface Pair View based on recent traffic patterns, but By Sequence View remains static.

C.

Interface Pair View sorts policies based on matching interfaces, while By Sequence View shows the actual processing order of rules.

D.

Policies in Interface Pair View are prioritized by security levels, while By Sequence View strictly follows the administrator ' s manual ordering.

Question 27

When configuring the connection between FortiGate and FortiAnalyzer, which option indicates that reliable traffic is enabled? (Choose one answer)

Options:

A.

The connection status shows a green check icon

B.

The interface status is set to up

C.

A padlock icon appears in the connection settings

D.

The logging mode is set to real-time

Page: 1 / 9
Total 93 questions