PrepAway - Latest Free Exam Questions & Answers

Category: NSE4_FGT-6.0

Exam NSE4_FGT-6.0: Fortinet NSE 4 – FortiOS 6.0

When using SD-WAN, how do you configure the next-hop gateway address for a member interface so that FortiGate

When using SD-WAN, how do you configure the next-hop gateway address for a member interface so that FortiGate can forward Internet traffic? A. It must be configured in a static route using the sdwan virtual interface. B. It must be provided in the SD-WAN member interface configuration. C. It must be configured in a policy-route […]

Which of the following conditions must be met in order for a web browser to trust a web server certificate sig

Which of the following conditions must be met in order for a web browser to trust a web server certificate signed by a third-party CA? A. The public key of the web server certificate must be installed on the browser. B. The web-server certificate must be installed on the browser. C. The CA certificate that […]

An administrator wants to block HTTP uploads. Examine the exhibit, which contains the proxy address created fo

An administrator wants to block HTTP uploads. Examine the exhibit, which contains the proxy address created for that purpose. Where must the proxy address be used? A. As the source in a firewall policy. B. As the source in a proxy policy. C. As the destination in a firewall policy. D. As the destination in […]

Based on this output, which statements are correct? (Choose two.)

View the exhibit. Based on this output, which statements are correct? (Choose two.) A. The all VDOM is not synchronized between the primary and secondary FortiGate devices. B. The root VDOM is not synchronized between the primary and secondary FortiGate devices. C. The global configuration is synchronized between the primary and secondary FortiGate devices. D. […]

An administrator needs to strengthen the security for SSL VPN access. Which of the following statements are be

An administrator needs to strengthen the security for SSL VPN access. Which of the following statements are best practices to do so? (Choose three.) A. Configure split tunneling for content inspection. B. Configure host restrictions by IP or MAC address. C. Configure two-factor authentication using security certificates. D. Configure SSL offloading to a content processor […]


Page 1 of 212