QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)



Similar documents
FortiMail Filtering. Course for FortiMail v4.0. Course Overview

Step-by-Step Configuration

FortiMail Filtering. Course 221 (for FortiMail v4.2) Course Overview

Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

Fortinet Certified Network Security Administrator

Fortigate Features & Demo

Firewall Defaults and Some Basic Rules

Steps for Basic Configuration

Fortinet Network Security NSE4 test questions and answers:

Protecting the Home Network (Firewall)

FortiOS Handbook - Load Balancing VERSION 5.2.2

FortiGuard Web Content Filtering versus Websense March 2005

How To Configure Fortigate For Free Software (For A Free Download) For A Password Protected Network (For Free) For An Ipad Or Ipad (For An Ipa) For Free (For Ipad) For Your Computer Or Ip

Preventing credit card numbers from escaping your network

Setting Up Scan to SMB on TaskALFA series MFP s.

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

FortiGate 200A. Administration Guide. FortiGate-200A Administration Guide Version 2.80 MR8 4 February

Step-by-Step Configuration

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Basic Network Configuration

Configuring Trend Micro Content Security

USER GUIDE. FortiGate VLANs and VDOMs Version

Lab Configuring Access Policies and DMZ Settings

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Chapter 3 LAN Configuration

Using WhatsUp IP Address Manager 1.0

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Check Point Security Administrator R70

Kerio WinRoute Firewall Features Summary and Simple Setup Guide (for version 6.x)

Chapter 9 Monitoring System Performance

F-Secure Messaging Security Gateway. Deployment Guide

How To Log On A Fortigate Server On A Pc Or Macodeo.Com (For A Free Download) On A Microsoft Macodeode (For Free) On An Ipad Or Ipad (For Cheap) On Pc Or

FortiGate Multi-Threat Security Systems I

FortiGate High Availability Overview Technical Note

SESA Securing with Cisco Security Appliance Parts 1 and 2

Using IPsec VPN to provide communication between offices

Configuration Example

602LAN SUITE 5.0 Groupware

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

Multi-Homing Security Gateway

inlife Managed Security Service (MSS)

FortiMail Filtering Course 221-v2.2 Course Overview

Chapter 5 Customizing Your Network Settings

What s New for FortiMail 5.2.0

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

FortiOS Handbook Load Balancing for FortiOS 5.0

Figure 41-1 IP Filter Rules

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Network Pop Quiz 5 Brought to you by please visit our site!

Best Practices & Deployment SurfControl Mobile Filter v

Load Balancing. FortiOS Handbook v3 for FortiOS 4.0 MR3

How To - Implement Clientless Single Sign On Authentication with Active Directory

Firewall Firewall August, 2003

Chapter 4 Customizing Your Network Settings

FortiOS Handbook - Authentication VERSION 5.2.6

LAN TCP/IP and DHCP Setup

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

SyAM Software Management Utilities. Creating Templates

PineApp Surf-SeCure Quick

FortiGate IPS Guide. Intrusion Prevention System Guide. Version November

How to Configure Captive Portal

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

FortiGate Troubleshooting Guide

F-Secure Internet Gatekeeper

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

NETASQ MIGRATING FROM V8 TO V9

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

escan SBS 2008 Installation Guide

HA OVERVIEW. FortiGate FortiOS v3.0 MR5.

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Detecting rogue systems

SonicWALL Global Management System Configuration Guide Standard Edition

Managing a FortiSwitch unit with a FortiGate Administration Guide

Unified Threat Management

SonicWALL Security Quick Start Guide. Version 4.6

WhatsUpGold. v3.0. WhatsConnected User Guide

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Chapter 8 Router and Network Management

SNMP Monitoring Guide

How To Upgrade To Symantec Mail Security Appliance 7.5.5

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

DRO-210i LOAD BALANCING ROUTER. Review Package Contents

Multi-Homing Dual WAN Firewall Router

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Creating Cacti FortiGate SNMP Graphs

Configuring User Identification via Active Directory

Transcription:

1 Fortinet - FCNSA Fortinet Certified Network Security Administrator QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.) A. Firewall B. Directory Service C. Local D. LDAP E. PKI Answer(s): A, B, C, E Page 43 of http://docs.fortinet.com/fgt/handbook/40mr2/fortigate-authentication-40-mr2.pdf QUESTION: 2 Which of the following statements regarding Banned Words are correct? (Select all that apply.) A. The FortiGate unit can scan web pages and email messages for instances of banned words. B. When creating a banned word list, an administrator can indicate either specific words or patterns. C. Banned words can be expressed as wildcards or regular expressions. D. Content is automatically blocked if a single instance of a banned word appears. E. The FortiGate unit includes a pre-defined library of common banned words. Answer(s): A, B, C http://www.scribd.com/doc/18579283/spam-filter QUESTION: 3 When creating administrative users, the assigned determines user rights on the FortiGate unit. Answer(s): access profile

2 http://docs.google.com/viewer?a=v&q=cache:avlu2gqf9qij:docs.fortinet.com/fgt/handbook/40mr 3/fortigatecompliance-40- mr3.pdf+when+creating+administrative+users,+the+assigned+access+profile+determines +user+rights+on+the+fortigate+unit&hl=en&gl=in&pid=bl&srcid=adgeesgzqopfobdm9mpf0t_ MOTAa2iAy7fVLPgvTWlD1IsVczJt98supddW_9qMLxyBsnvU0ijR1dPFSfbQM08eEB00SlxAph3laJ3u mkc52fvxeovwk2hwj3uzbnjwyukeau3_xcmp&sig=ahietbt4pd_bwjknqs1ffexl-40yf4nang QUESTION: 4 If a FortiGate unit has a dmz interface IP address of 210.192.168.2 with a subnet mask of 255.255.255.0, what is a valid dmz DHCP accessing range? A. 172.168.0.1-172.168.0.10 B. 210.192.168.3-210.192.168.10 C. 210.192.168.1-210.192.168.4 D. All of the above Answer(s): C QUESTION: 5 Which of the following items represent the minimum configuration steps an administrator must perform to enable Data Leak Prevention from flowing through the FortiGate unit? (Select all that apply.) A. Assign a DLP sensor in a firewall policy. B. Apply one or more DLP rules to a firewall policy. C. Enable DLP globally using the config sys dip command in the CU. D. Define one or more DLP rules. E. Define a DLP sensor. F. Apply a DLP sensor to a DoS sensor policy. Answer(s): ABDE http://www.scribd.com/doc/49908929/147/data-leak-prevention QUESTION: 6 A FortiGate 60 unit is configured for your small office. The DMZ interface is connected to a network containing a web server and email server. The Internal interface is connected to a network containing 10 user workstations and the WAN1 interface is connected to your ISP.

3 You want to configure firewall policies so that your users can send and receive email messages to the email server on the DMZ network. You also want the email server to be able to retrieve email messages from an email server hosted by your ISP using the POP3 protocol. Which policies must be created for this communication? (Select all that apply.) A. Internal > DMZ B. DMZ > internal C. Internal > WAN1 D. WAN1 > Internal E. DMZ>WAN1 F. WAN1 >DMZ Answer(s): A, E QUESTION: 7 Which of the following components are contained in all FortiGate units from the FG50 models and up? (Select all that apply.) A. FortiASIC content processor. B. Hard Drive. C. Gigabit network interfaces. D. Serial console pat. Answer(s): A http://docs.google.com/viewer?a=v&q=cache:ri3hhvljmsmj:www.btcnetworks.com/fileadmin/adminksa/products_downloads/fortigate_50_100ds.pdf+fortigate+unit s+from+fg50+models+and+up&hl=en&gl=in&pid=bl&srcid=adgeesg3rlrc6voxpvi090uxbmgba6 UbECbfM_50bbDUZKwTj- MO8PYgz_DW952gByowpgTeq2oDsgFTeXgxAH9JAVwLgMSzq2LGfxCesKyGm4wdy8gLYb9vHSoJhI a1dofpu3p8dsp&sig=ahietbtjlo7a-hbsnwvteo0_kkfjzgwqfa QUESTION: 8 In which order are firewall policies processed on the FortiGate unit? A. They are processed from the top down as they appear in Web Config. B. They are processed based on the policy ID number shown in the left hand column of the policy window. C. They are processed using a policy hierarchy scheme that allows for multiple decision branching. D. They are processed based on a priority value assigned through the priority column in the policy window.

4 Answer(s): A http://docs.fortinet.com/fgt/archives/3.0/techdocs/fortigate_administration_guide_01-30006- 0203-20080313.pdf QUESTION: 9 A FortiGate unit can scan for viruses on which types of network traffic? (Select all that apply.) A. POP3. B. FTP. C. SMTP. D. SNMP. E. NetBios. Answer(s): A, B, C http://docs.fortinet.com/fgt/handbook/40mr3/fortigate-utm-40-mr3.pdf QUESTION: 10 Which of the following are valid components of the Fortinet Server Authentication Extensions (FSAE)? (Select all that apply.) A. Domain Local Security Agent. B. Collector Agent. C. Active Directory Agent. D. User Authentication Agent. E. Domain Controller Agent. Answer(s): B, E http://docs.fortinet.com/fgt/archives/3.0/techdocs/fortigate_administration_guide_01-30006- 0203-20080313.pdf QUESTION: 11 Caching improves performance by reducing FortiGate unit requests to the FortiGuard server. Which of the following statements are correct regarding the caching of FortiGuard responses? (Select all that apply.) A. Caching is available for web filtering, antispam, and IP5 requests. B. The cache uses a small portion of the FortiGate system memory. C. When the cache is full, the least recently used IP address or URL is deleted from the cache.

5 D. An administrator can configure the number of seconds to store information in the cache before the FortiGate unit contacts the FortiGuerd server again. E. The size of the cache will increase to accommodate any number of cached queries. Answer(s): B, C, D http://docs.google.com/viewer?a=v&q=cache:-wnbrll EAJ:www.fortigate.be/Files/2.80/ V2.80_FortiGuard_25_June_2004.pdf+Caching+in+FortiGate+unit+When+the+cache+is+full,+the+le ast+recently+used+ip+address+or+url+is+deleted+from+the+cache&hl=en&gl=in&pid=bl&srcid= ADGEESg9GwwuUb7lwzvKr7DUA9stG3sMxGIli3M9m8QESUcIuLZpx3gg_xiVOn_kC0yB52Hr- EHzaV4NTBqeC9FM8O5QMAsI8je83HmR_kqaDnu3JiEK8jvkQcKgTjXucX_J1ve5GSn_&sig=AHIEtbQi CeCZI4NNQAdWr6Jsvw2mQpYy1w QUESTION: 12 Which of the following items does NOT support the Logging feature? A. File Filter B. Application control C. Session timeouts D. Administrator activities E. Web URL filtering Answer(s): C Page 43 of http://docs.fortinet.com/fgt/handbook/40mr2/fortigate-loggingreporting-40-mr2.pdf Log settings provide the information that the FortiGate unit needs so that it knows what activities to record. This topic explains what activity each log file records, as well as additional information about the log file, which will help you determine what FortiGate activity the FortiGate unit should record. This topic includes the following: Traffic Event Data Leak Prevention Application control Antivirus Web Filter IPS (attack) Packet logs Email filter Archives (DLP) Network scan