Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

NSE4_FGT_AD-7.6 Questions and Answers

Question # 6

An administrator wanted to configure an IPS sensor to block traffic that triggers the signature set number of times during a specific time period. How can the administrator achieve the objective?

A.

Use IPS group signatures, set rate-mode 60.

B.

Use IPS packet logging option with periodical filter option.

C.

Use IPS signatures, rate-mode periodical option.

D.

Use IPS filter, rate-mode periodical option.

Full Access
Question # 7

Refer to the exhibit.

Which two ways can you view the log messages shown in the exhibit? (Choose two.)

A.

By right clicking the implicit deny policy

B.

Using the FortiGate CLI command diagnose log test

C.

By filtering by policy universally unique identifier (UUID) and application name in the log entry

D.

In the Forward Traffic section

Full Access
Question # 8

Which two statements are true about an HA cluster? (Choose two answers)

A.

An HA cluster cannot have both in-band and out-of-band management interfaces at the same time.

B.

Link failover triggers a failover if the administrator sets the interface down on the primary device.

C.

When sniffing the heartbeat interface, the administrator must see the IP address 169.254.0.2.

D.

HA incremental synchronization includes FIB entries and IPsec SAs.

Full Access
Question # 9

Refer to the exhibits.

You have implemented the application sensor and the corresponding firewall policy as shown in the exhibits.

Which two factors can you observe from these configurations? (Choose two.)

A.

YouTube access is blocked based on Excessive-Bandwidth Application and Filter override settings.

B.

Facebook access is blocked based on the category filter settings.

C.

Facebook access is allowed but you cannot play Facebook videos based on Video/Audio category filter settings.

D.

YouTube search is allowed based on the Google Application and Filter override settings.

Full Access
Question # 10

Refer to the exhibit.

As an administrator you have created an IPS profile, but it is not performing as expected. While testing you got the output as shown in the exhibit What could be the possible reason of the diagnose output shown in the exhibit?

A.

There is a no firewall policy configured with an IPS security profile.

B.

Administrator entered the command diagnose test application ipsmonitor 5.

C.

FortiGate entered into IPS fail open state.

D.

Administrator entered the command diagnose test application ipsmonitor 99.

Full Access
Question # 11

Refer to the exhibits.

A diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device are shown.

Two PCs. PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.

Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

A.

In the system settings, set Multiple Interface Policies to enable.

B.

in the IP pool configuration, set end ipto 100.65.0.112.

C.

In the firewall policy, set match-vip to enable using CLI.

D.

In the IP pool configuration, set type to overload.

Full Access
Question # 12

An administrator manages a FortiGate model that supports NTurbo

How does NTurbo acceleration enhance antivirus performance?

A.

For flow-based inspection. NTurbo establishes a dedicated data path to redirect traffic between the IPS engine and FortiGate ingress and egress interfaces.

B.

For flow-based inspection. NTurbo creates two inspection sessions on the FortiGate device.

C.

For proxy-based inspection. NTurbo offloads traffic to the content processor.

D.

For proxy-based inspection. NTurbo buffers the whole file and then sends it to the antivirus engine.

Full Access
Question # 13

Refer to the exhibit.

An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

A.

The ABC Com is hitting the category Excessive-Bandwidth.

B.

The ABC.Com Type is set as Application instead of Filter.

C.

The ABC.Com is configured under application profile, which must be configured as a web filter profile.

D.

The ABC Com Action is set to Allow

Full Access
Question # 14

How does FortiExtender connect to FortiSASE in a site-based, remote internet access method?

A.

FortiExtender uses a Virtual Extensible LAN (VXLAN)-over-IPsec connection.

B.

FortiExtender establishes a secure SSL connection using FortiClient.

C.

FortiExtender first connects to a FortiGate LAN extension through a secure web gateway (SWG).

D.

FortiExtender uses the proxy auto-configuration

Full Access
Question # 15

A new administrator is configuring FSSO authentication on FortiGate using DC Agent Mode. Which step is not part of the expected process?

A.

The DC agent sends login event data directly to FortiGate.

B.

FortiGate determines user identity based on the IP address in the FSSO list.

C.

The collector agent forwards login event data to FortiGate.

D.

The user logs into the windows domain.

Full Access
Question # 16

Refer to the exhibit.

What would be the impact of these settings on the Server certificate SNI check configuration on FortiGate?

A.

FortiGate will accept and use the CN in the server certificate for URL filtering if the SNI does not match the CN or SAN fields.

B.

FortiGate will accept the connection with a warning if the SNI does not match the CN or SAN fields.

C.

FortiGate will close the connection if the SNI does not match the CN or SAN fields.

D.

FortiGate will close the connection if the SNI does not match the CN and SAN fields

Full Access
Question # 17

Refer to the exhibit.

Based on this partial configuration, what are the two possible outcomes when FortiGate enters conserve mode? (Choose two.)

A.

FortiGate drops new sessions requiring inspection.

B.

Administrators must restart FortiGate to allow new sessions.

C.

Administrators cannot change the configuration.

D.

FortiGate skips quarantine actions.

Full Access
Question # 18

What are two features of FortiGate FSSO agentless polling mode? (Choose two.)

A.

FortiGate uses the AD server as the collector agent.

B.

FortiGate uses the SMB protocol to read the event viewer logs from the DCs.

C.

FortiGate does not support workstation check.

D.

FortiGate directs the collector agent to use a remote LDAP server.

Full Access