Fortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html



Similar documents
Fortinet Certified Network Security Administrator

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

21.4 Network Address Translation (NAT) NAT concept

Securing Networks with PIX and ASA

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007

FortiGate Multi-Threat Security Systems I

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

Fortigate Features & Demo

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Configuring IPsec VPN with a FortiGate and a Cisco ASA

SNMP Monitoring Guide

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

SolarWinds Certified Professional. Exam Preparation Guide

Cisco ASA, PIX, and FWSM Firewall Handbook

EXPLORER. TFT Filter CONFIGURATION

Please report errors or omissions in this or any Fortinet technical document to

USER GUIDE. FortiGate VLANs and VDOMs Version

Sonicwall Reporting Server

Using VDOMs to host two FortiOS instances on a single FortiGate unit

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

Implementing Cisco IOS Network Security

Connecting an Android to a FortiGate with SSL VPN

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

Steps for Basic Configuration

Troubleshooting. FortiOS Handbook v3 for FortiOS 4.0 MR3

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

TECHNICAL NOTE. FortiGate Traffic Shaping Version

How To Configure SSL VPN in Cyberoam

Release Notes for Websense Web Endpoint (32- and 64-bit OS)

Ranch Networks for Hosted Data Centers

High Availability. FortiOS Handbook v3 for FortiOS 4.0 MR3

Configuring Security for FTP Traffic

Configuring IPsec VPN between a FortiGate and Microsoft Azure

Preventing credit card numbers from escaping your network

Aruba Aruba Certification ACMP-6.4 test questions and answers :

F-SECURE MESSAGING SECURITY GATEWAY

HA OVERVIEW. FortiGate FortiOS v3.0 MR5.

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

NMS300 Network Management System

Firewalls und IPv6 worauf Sie achten müssen!

CTS2134 Introduction to Networking. Module Network Security

Load Balance Router R258V

PassTest. Bessere Qualität, bessere Dienstleistungen!

FortiGate High Availability Overview Technical Note

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Chapter 8 Router and Network Management

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Security. TestOut Modules

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

F-Secure Messaging Security Gateway. Deployment Guide

Cornerstones of Security

Network Load Balancing

FIREWALLS & CBAC. philip.heimer@hh.se

NEFSIS DEDICATED SERVER

Using IPsec VPN to provide communication between offices

Using SonicWALL NetExtender to Access FTP Servers

SSL VPN Technology White Paper

FortiOS Handbook - WAN Optimization, Web Cache, Explicit Proxy, and WCCP VERSION 5.2.4

Securing Networks with Cisco Routers and Switches ( )

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

Load Balancer. Introduction. A guide to Load Balancing.

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Introduction of Intrusion Detection Systems

Understanding Slow Start

Chapter 7. Firewalls

Role of Firewall in Network. Security. Syed S. Rizvi. CS 872: Computer Network Security. Fall 2005

Brocade Certified Layer 4-7 Professional Version: Demo. Page <<1/8>>

Half Bridge mode }These options are all found under Misc Configuration

IPsec VPN Application Guide REV:

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)

WARP 3.0 Table of Contents

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Pre Sales Communications

Cisco Certified Security Professional (CCSP)

Release Notes. SonicOS is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Creating a VPN with overlapping subnets

Exam Questions SY0-401

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

VPNBee manual VPNBee is a firewall by Gayatri Hitech but it is more a product of products rather than a single product.

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

Multi-Homing Security Gateway

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues...

Manual. IP Sensor and Watchdog IPSW2210. I P S W M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry.

Linux Network Security

11.1. Performance Monitoring

Monitoring the Firewall Services Module

High Availability Solutions & Technology for NetScreen s Security Systems

Latest IT Exam Questions & Answers

Edge Configuration Series Reporting Overview

Transcription:

IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year

Exam : NSE4 Title : Fortinet Network Security Expert 4 Written Exam (400) Vendor : Fortinet Version : DEMO 1

NO.1 Which of the following regular expression patterns make the terms "confidential data" case insensitive? A. [confidential data] B. /confidential data/i C. i/confidential data/ D. "confidential data" Answer: B NO.2 Which statements are correct regarding virtual domains (VDOMs)? (Choose two.) A. VDOMs divide a single FortiGate unit into two or more virtual units that each have dedicated memory and CPUs. B. A management VDOM handles SNMP, logging, alert email, and FDN-based updates. C. VDOMs share firmware versions, as well as antivirus and IPS databases. D. Different time zones can be configured in each VDOM. Answer: B,C NO.3 Which statements are true regarding IPv6 anycast addresses? (Choose two.) A. Multiple interfaces can share the same anycast address. B. They are allocated from the multicast address space. C. Different nodes cannot share the same anycast address. D. An anycast packet is routed to the nearest interface. Answer: A,D NO.4 In HA, the option Reserve Management Port for Cluster Member is selected as shown in the exhibit below. Which statements are correct regarding this setting? (Choose two.) A. Interface settings on port7 will not be synchronized with other cluster members. B. The IP address assigned to this interface must not overlap with the IP address subnet assigned to another interface. C. When connecting to port7 you always connect to the master device. D. A gateway address may be configured for port7. Answer: A,D NO.5 Which tasks fall under the responsibility of the SSL proxy in a typical HTTPS connection? (Choose two.) A. The web client SSL handshake. 2

B. The web server SSL handshake. C. File buffering. D. Communication with the URL filter process. Answer: A,B NO.6 Which statements are true regarding traffic shaping that is applied in an application sensor, and associated with a firewall policy? (Choose two.) A. Shared traffic shaping cannot be used. B. Only traffic matching the application control signature is shaped. C. Can limit the bandwidth usage of heavy traffic applications. D. Per-IP traffic shaping cannot be used. Answer: B,C NO.7 The FortiGate port1 is connected to the Internet. The FortiGate port2 is connected to the internal network. Examine the firewall configuration shown in the exhibit; then answer the question below. Based on the firewall configuration illustrated in the exhibit, which statement is correct? A. A user that has not authenticated can access the Internet using any protocol that does not trigger an authentication challenge. B. A user that has not authenticated can access the Internet using any protocol except HTTP, HTTPS, Telnet, and FTP. C. A user must authenticate using the HTTP, HTTPS, SSH, FTP, or Telnet protocol before they can access all Internet services. D. DNS Internet access is always allowed, even for users that has not authenticated. Answer: D NO.8 Review the IPsec phase 2 configuration shown in the exhibit; then answer the question below. 3

Which statements are correct regarding this configuration? (Choose two.). A. The Phase 2 will re-key even if there is no traffic. B. There will be a DH exchange for each re-key. C. The sequence number of ESP packets received from the peer will not be checked. D. Quick mode selectors will default to those used in the firewall policy. Answer: A,B NO.9 Which of the following statements are correct about the HA command diagnose sys ha resetuptime? (Choose two.) A. The device this command is executed on is likely to switch from master to slave status if override is disabled. B. The device this command is executed on is likely to switch from master to slave status if override is enabled. C. This command has no impact on the HA algorithm. D. This command resets the uptime variable used in the HA algorithm so it may cause a new master to become elected. Answer: A,D 4

NO.10 When browsing to an internal web server using a web-mode SSL VPN bookmark, which IP address is used as the source of the HTTP request? A. The remote user's virtual IP address. B. The FortiGate unit's internal IP address. C. The remote user's public IP address. D. The FortiGate unit's external IP address. Answer: B NO.11 Which two web filtering inspection modes inspect the full URL? (Choose two.) A. DNS-based. B. Proxy-based. C. Flow-based. D. URL-based. Answer: B,C NO.12 Which statement correctly describes the output of the command diagnose ips anomaly list? A. Lists the configured DoS policy. B. List the real-time counters for the configured DoS policy. C. Lists the errors captured when compiling the DoS policy. D. Lists the IPS signature matches. Answer: B 5