NSE 4 2da

Description

Ingeniería Quiz on NSE 4 2da, created by Fernando Mayorga on 01/11/2022.
Fernando Mayorga
Quiz by Fernando Mayorga, updated more than 1 year ago
Fernando Mayorga
Created by Fernando Mayorga over 2 years ago
4
0
1 2 3 4 5 (0)

Resource summary

Question 1

Question
Refer to the exhibit to view the authentication rule configuration In this scenario, which statement is true?
Answer
  • IP-based authentication is enabled
  • Route-based authentication is enabled
  • Session-based authentication is enabled.
  • Policy-based authentication is enabled

Question 2

Question
Which of the following statements correctly describes FortiGates route lookup behavior when searching for a suitable gateway? (Choose two)
Answer
  • Lookup is done on the first packet from the session originator
  • Lookup is done on the last packet sent from the responder
  • Lookup is done on every packet, regardless of direction
  • Lookup is done on the trust reply packet from the responder

Question 3

Question
Which two policies must be configured to allow traffic on a policy-based next-generation firewall (NGFW) FortiGate? (Choose two.)
Answer
  • Firewall policy
  • Policy rule
  • Security policy
  • SSL inspection and authentication polic

Question 4

Question
Which three CLI commands can you use to troubleshoot Layer 3 issues if the issue is in neither the physical layer nor the link layer? (Choose three.)
Answer
  • diagnose sys top
  • execute ping
  • execute traceroute
  • diagnose sniffer packet any
  • get system arp

Question 5

Question
Which two statements about IPsec authentication on FortiGate are correct? (Choose two.)
Answer
  • For a stronger authentication, you can also enable extended authentication (XAuth) to request the remote peer to provide a username and password
  • FortiGate supports pre-shared key and signature as authentication methods.
  • Enabling XAuth results in a faster authentication because fewer packets are exchanged.
  • A certificate is not required on the remote peer when you set the signature as the authentication method.

Question 6

Question
Which of the following are valid actions for FortiGuard category based filter in a web filter profile ui proxy-based inspection mode? (Choose two.)
Answer
  • Warning
  • Exempt
  • Allow
  • Learn

Question 7

Question
Refer to the exhibit, which contains a session diagnostic output.
Answer
  • The session is a UDP unidirectional state.
  • The session is in TCP ESTABLISHED state.
  • The session is a bidirectional UDP connection.
  • The session is a bidirectional TCP connection.

Question 8

Question
Which two statements are true about collector agent standard access mode? (Choose two.) A. Standard mode uses Windows convention-NetBios: Domain\Username.
Answer
  • Standard mode uses Windows convention-NetBios: Domain\Username.
  • Standard mode security profiles apply to organizational units (OU).
  • Standard mode security profiles apply to user groups.
  • Standard access mode supports nested groups.

Question 9

Question
Which two VDOMs are the default VDOMs created when FortiGate is set up in split VDOM mode? (Choose two.)
Answer
  • FG-traffic
  • Mgmt
  • FG-Mgmt
  • Root

Question 10

Question
An administrator needs to increase network bandwidth and provide redundancy. What interface type must the administrator select to bind multiple FortiGate interfaces?
Answer
  • VLAN interface
  • Software Switch interface
  • Aggregate interface
  • Redundant interfac

Question 11

Question
Which CLI command will display sessions both from client to the proxy and from the proxy to the servers?
Answer
  • diagnose wad session list
  • diagnose wad session list | grep hook-pre&&hook-out
  • diagnose wad session list | grep hook=pre&&hook=out
  • diagnose wad session list | grep "hook=pre"&"hook=out"

Question 12

Question
72.Which three criteria can a FortiGate use to look for a matching firewall policy to process traffic? (Choose three.)
Answer
  • Source defined as Internet Services in the firewall policy.
  • Destination defined as Internet Services in the firewall policy.
  • Highest to lowest priority defined in the firewall policy.
  • Services defined in the firewall policy.
  • Lowest to highest policy ID number.

Question 13

Question
Which statements best describe auto discovery VPN (ADVPN). (Choose two.)
Answer
  • It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.
  • ADVPN is only supported with IKEv2.
  • Tunnels are negotiated dynamically between spokes.
  • Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2 proposals are defined in advance.

Question 14

Question
An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.)
Answer
  • The interface has been configured for one-arm sniffer.
  • The interface is a member of a virtual wire pair.
  • The operation mode is transparent.
  • The interface is a member of a zone.
  • Captive portal is enabled in the interface.

Question 15

Question
NGFW mode allows policy-based configuration for most inspection rules. Which security profile’s configuration does not change when you enable policy-based inspection?
Answer
  • Web filtering
  • Antivirus
  • Web proxy
  • Application control

Question 16

Question
An administrator created a static route for Amazon Web Services. What CLI command must the administrator use to view the route?
Answer
  • get router info routing-table all
  • get internet service route list
  • get router info routing-table database
  • diagnose firewall proute list

Question 17

Question
Refer to the exhibit to view the application control profile. Based on the configuration, what will happen to Apple FaceTime?
Answer
  • Apple FaceTime will be blocked, based on the Excessive-Bandwidth filter configuration
  • Apple FaceTime will be allowed, based on the Apple filter configuration.
  • Apple FaceTime will be allowed only if the filter in Application and Filter Overrides is set to Learn
  • Apple FaceTime will be allowed, based on the Categories configuration.

Question 18

Question
Examine the following web filtering log. Which statement about the log message is true?
Answer
  • The action for the category Games is set to block.
  • The usage quota for the IP address 10.0.1.10 has expired
  • The name of the applied web filter profile is default.
  • The web site miniclip.com matches a static URL filter whose action is set to Warning.

Question 19

Question
You have enabled logging on your FortiGate device for Event logs and all Security logs, and you have set up logging to use the FortiGate local disk. What is the default behavior when the local disk is full?
Answer
  • Logs are overwritten and the only warning is issued when log disk usage reaches the threshold of 95%
  • No new log is recorded until you manually clear logs from the local disk.
  • Logs are overwritten and the first warning is issued when log disk usage reaches the threshold of 75%
  • No new log is recorded after the warning is issued when log disk usage reaches the threshold of 95%

Question 20

Question
A network administrator has enabled full SSL inspection and web filtering on FortiGate. When visiting any HTTPS websites, the browser reports certificate warning errors. When visiting HTTP websites, the browser does not report errors. What is the reason for the certificate warning errors?
Answer
  • The browser requires a software update.
  • FortiGate does not support full SSL inspection when web filtering is enabled.
  • The CA certificate set on the SSL/SSH inspection profile has not been imported into the browser.
  • There are network connectivity issues

Question 21

Question
What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?
Answer
  • It limits the scope of application control to the browser-based technology category only.
  • It limits the scope of application control to scan application traffic based on application category only.
  • It limits the scope of application control to scan application traffic using parent signatures only
  • It limits the scope of application control to scan application traffic on DNS protocol only

Question 22

Question
Which two statements ate true about the Security Fabric rating? (Choose two.
Answer
  • It provides executive summaries of the four largest areas of security focus.
  • Many of the security issues can be fixed immediately by clicking Apply where available.
  • The Security Fabric rating must be run on the root FortiGate device in the Security Fabric.
  • The Security Fabric rating is a free service that comes bundled with alt FortiGate devices.

Question 23

Question
The exhibits show a network diagram and the explicit web proxy configuration. In the command diagnose sniffer packet, what filter can you use to capture the traffic between the client and the explicit web proxy?
Answer
  • ‘host 192.168.0.2 and port 8080’
  • ‘host 10.0.0.50 and port 80’
  • ‘host 192.168.0.1 and port 80’
  • ‘host 10.0.0.50 and port 8080

Question 24

Question
What inspection mode does FortiGate use if it is configured as a policy-based next-generation firewall (NGFW)?
Answer
  • Full Content inspection
  • Proxy-based inspection
  • Certificate inspection
  • Flow-based inspection

Question 25

Question
In an explicit proxy setup, where is the authentication method and database configured?
Answer
  • Proxy Policy
  • Authentication Rule
  • Firewall Policy
  • Authentication scheme

Question 26

Question
An administrator must disable RPF check to investigate an issue. Which method is best suited to disable RPF without affecting features like antivirus and intrusion prevention system?
Answer
  • Enable asymmetric routing, so the RPF check will be bypassed.
  • Disable the RPF check at the FortiGate interface level for the source check.
  • Disable the RPF check at the FortiGate interface level for the reply check.
  • Enable asymmetric routing at the interface level.

Question 27

Question
When detecting attacks, which anomaly, signature, or filter will FortiGate evaluate first?
Answer
  • SMTP.Login.Brute.Force
  • IMAP.Login.brute.Force
  • ip_src_session
  • Location: server Protocol: SMTP

Question 28

Question
An administrator needs to configure VPN user access for multiple sites using the same soft FortiToken. Each site has a FortiGate VPN gateway. What must an administrator do to achieve this objective?
Answer
  • The administrator can register the same FortiToken on more than one FortiGate.
  • The administrator must use a FortiAuthenticator device.
  • The administrator can use a third-party radius OTP server.
  • The administrator must use the user self-registration server.

Question 29

Question
If the Issuer and Subject values are the same in a digital certificate, which type of entity was the certificate issued to?
Answer
  • A CRL
  • A person
  • A subordinate CA
  • A root CA

Question 30

Question
Which of the following are purposes of NAT traversal in IPsec? (Choose two.)
Answer
  • To detect intermediary NAT devices in the tunnel path.
  • To dynamically change phase 1 negotiation mode aggressive mode.
  • To encapsulation ESP packets in UDP packets using port 4500.
  • To force a new DH exchange with each phase 2 rekey.
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

Elementos Básicos de Ingeniería Ambiental
Evilus Rada
Historia de la Ingeniería
Camila González
Introducción a la Ingeniería de Software
David Pacheco Ji
UNIDAD II DIBUJO PROYECTIVO
anyimartinezrued
GENERALIDADES DE LAS EDIFICACIONES
yessi.marenco17
MAPA MENTAL SOFTWARE APLICADOS EN INGENIERÍA CIVIL
Ruben Dario Acosta P
Examen Ingeniería Electromecánica II
Jorge Cabrera7516
Normas que Rigen la Ingenieria Mecanica
Francisco Balderas Garcia
Estado de la ingenería mecánica y su perspectiva a futuro
Roberto Martinez
MAPA CONCEPTUAL SOBRE LA INICIATIVA CDIO
Victor Antonio Rodriguez Castañeda