PrepAway - Latest Free Exam Questions & Answers

Category: NSE4 (v.1)

Exam NSE4: Fortinet Network Security Expert 4 Written Exam (update Oct 23th, 2016)

Which of one the following profiles could be enabled in order to prevent the file from passing through the

The eicar test virus is put into a zip archive, which is given the password of “Fortinet” in
order to open the archive. Review the configuration in the exhibits shown below; then
answer the question that follows. Exhibit A – Antivirus Profile: Exhibit B – Non-default UTM
Proxy Options Profile: Exhibit C – DLP Profile: Which of one the following profiles could be

enabled in order to prevent the file from passing through the FortiGate device over HTTP on
the standard port for that protocol?

which of the following statements are correct?

With FSSO, a domain user could authenticate either against the domain controller running
the Collector Agent and Domain Controller Agent, or a domain controller running only the
Domain Controller Agent. If you attempt to authenticate with the Secondary Domain
Controller running only the Domain Controller Agent, which of the following statements are
correct? (Select all that apply.)

which of the following statements are correct?

Two devices are in an HA cluster, the device hostnames are STUDENT and REMOTE.
Exhibit A shows the command output of ‘diag sys session stat’ for the STUDENT device.
Exhibit B shows the command output of ‘diag sys session stat’ for the REMOTE device.
Exhibit A: Exhibit B: Given the information provided in the exhibits, which of the following
statements are correct? (Select all that apply.)

Which one of the following is the most likely reason that the cluster fails to form?

Two FortiGate devices fail to form an HA cluster, the device hostnames are STUDENT and
REMOTE. Exhibit A shows the command output of ‘show system ha’ for the STUDENT
device. Exhibit B shows the command output of ‘show system ha’ for the REMOTE device.
Exhibit A: Exhibit B Which one of the following is the most likely reason that the cluster fails
to form?

Examine the following log message for IPS and identify the valid responses below.

Examine the following log message for IPS and identify the valid responses below. (Select
all that apply.) 2012-07-01 09:54:28 oid=2 log_id=18433 type=ips subtype=anomaly
pri=alert vd=root severity=”critical” src=”192.168.3.168″ dst=”192.168.3.170″ src_int=”port2″
serial=0 status=”detected” proto=1 service=”icmp” count=1 attack_name=”icmp_flood”
icmp_id=”0xa8a4″ icmp_type=”0x08″ icmp_code=”0x00″ attack_id=16777316 sensor=”1″
ref=”http://www.fortinet.com/ids/VID16777316″ msg=”anomaly: icmp_flood, 51 > threshold
50″


Page 2 of 2512345...1020...Last »