Fortinet NSE 4 - FGT 5.6 Certification Exam Sample Questions and Answers

NSE 4 Network Security Professional Dumps, NSE 4 - FGT 5.6 Dumps, Fortinet NSE 4 - FortiOS 5.6 PDF, NSE 4 - FGT 5.6 PDF, NSE 4 Network Security Professional VCE, Fortinet NSE 4 Network Security Professional Questions PDF, Fortinet Exam VCE, Fortinet NSE 4 - FGT 5.6 VCE, NSE 4 Network Security Professional Cheat SheetBefore you write the Fortinet NSE 4 Network Security Professional (NSE 4 - FGT 5.6) certification exam, you may have certain doubts in your mind regarding the pattern of the test, the types of questions asked in it, the difficulty level of the questions and time required to complete the questions. These Fortinet Network Security Expert 4 - Network Security Professional (NSE 4 - FortiOS 5.6) sample questions and demo exam help you in removing these doubts and prepare you to take the test.

The best approach to pass your Fortinet NSE 4 - FGT 5.6 exam is to challenge and improve your knowledge. To test your learning and identify improvement areas with actual exam format, we suggest you practice with Premium Fortinet NSE 4 - FGT 5.6 Certification Practice Exam. The practice test is one of the most important elements of your Fortinet Fortinet Network Security Expert 4 - FortiOS 5.6 (NSE 4 - FortiOS 5.6) exam study strategy to discover your strengths and weaknesses, to improve your time management skills and to get an idea of the score you can expect.

Fortinet NSE 4 - FGT 5.6 (NSE 4 - FortiOS 5.6) Sample Questions:

01. Which of the following statements about FortiGate antivirus databases are true?
(Choose two.)
a) The extreme database is available only on certain FortiGate models.
b) The normal database is available on all FortiGate models.
c) The quick scan database is part of the normal database.
d) The extended database is available only if grayware scanning is enabled.
 
02. FortiGate has been configured for Firewall Authentication. When attempting to access an external website, the user is not presented with a login prompt. What is the most likely reason for this situation?
a) The user was authenticated using passive authentication.
b) No matching user account exists for this user.
c) The user is using a super admin account.
d) The user is using a guest account profile.
 
03. A firewall administrator wants to implement SD-WAN. The load-balancing algorithm must use one interface until the session volume reaches 80% threshold, at which point the algorithm should start using the next SD-WAN member interface.
Which one of the load-balancing algorithms will achieve this?
a) Volume
b) Source-destination IP
c) Sessions
d) Spillover
 
04. What methods can be used to deliver the token code to a user who is configured to use two-factor authentication?
(Choose three.)
a) SMS text message
b) Instant message app
c) Voicemail message
d) Email
e) FortiToken
 
05. An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to the SSL-VPN. How can this be achieved?
a) Using web-only mode.
b) Assigning public IP addresses to SSL-VPN users.
c) Disabling split tunneling.
d) Configuring web bookmarks.
 
06. Which statement about traffic flow in an active-active HA cluster is true?
a) The SYN packet from the client always arrives at the primary device first.
b) The ACK from the client is received on the physical MAC address of the primary device.
c) The secondary device responds to the primary device with a SYN/ACK, then the primary device forwards the SYN/ACK to the client.
d) All FortiGate devices are assigned the same virtual MAC addresses for the HA heartbeat interfaces to redistribute to the sessions.
 
07. When does the FortiGate enter into fail-open session mode?
a) When CPU usage goes above the red threshold.
b) When a proxy (for proxy-based inspection) runs out of connections.
c) When memory usage goes above the red threshold.
d) When memory usage goes above the extreme threshold.
 
08. How can you configure the web proxy to block HTTP packets that request a specific HTTP method?
a) Apply a web filter profile to a proxy policy that blocks the HTTP method.
b) Create a firewall service that matches the HTTP method, and apply it to a proxy policy with the action DENY.
c) Create a DNS filter that matches the HTTP method, and apply it to a proxy policy with the action DENY.
d) Create a proxy address that matches the HTTP method, and apply it to a proxy policy with the action DENY.
 
09. An administrator configured antivirus in flow-based inspection mode on the FortiGate. While testing the configuration, the administrator noticed that eicar.com test files can be downloaded using HTTPS protocol only. What is causing this issue?
a) HTTPS protocol is not enabled under Inspected Protocols.
b) Full-content inspection for HTTPS is disabled.
c) Hardware acceleration is in use.
d) The test file is larger than the oversize limit.
 
10. Which statement about firewall policy NAT is true?
a) DNAT is not supported.
b) DNAT can automatically apply to multiple firewall policies, based on DNAT rules.
c) You must configure SNAT for each firewall policy.
d) SNAT can automatically apply to multiple firewall policies, based on SNAT rules.

Solutions:

Question: 01

Answer: a, b

Question: 02

Answer: a

Question: 03

Answer: d

Question: 04

Answer: a, d, e

Question: 05

Answer: c

Question: 06

Answer: a

Question: 07

Answer: b

Question: 08

Answer: d

Question: 09

Answer: b

Question: 10

Answer: c

Note: If you find any error in these Fortinet Fortinet Network Security Expert 4 - FortiOS 5.6 (NSE 4 - FortiOS 5.6) sample questions, you can update us by write an email on feedback@nwexam.com.

Rating: 4.9 / 5 (80 votes)