High quality NSE4 Braindumps 2021

Act now and download your today! Do not waste time for the worthless tutorials. Download with real questions and answers and begin to learn with a classic professional.

Online NSE4 free questions and answers of New Version:

NEW QUESTION 1
Which Fortinet products & features could be considered part of a comprehensive solution to monitor and prevent the leakage of sensitive data?

  • A. Archive non-compliant outgoing e-mails using FortiMail.
  • B. Restrict unofficial methods of transferring files such as P2P using Application Control lists on a FortiGate.
  • C. Monitor database activity using FortiAnalyzer.
  • D. Apply a DLP sensor to a firewall policy.
  • E. Configure FortiClient to prevent files flagged as sensitive from being copied to a USB disk.

Answer: ABD

NEW QUESTION 2
A static route is configured for a FortiGate unit from the CLI using the following commands:
config router static edit 1
set device “wan1” set distance 20
set gateway 192.168.100.1 next
end
Which of the following conditions are required for this static default route to be displayed in the FortiGate unit's routing table? (Choose two.)

  • A. The administrative status of the wan1 interface is displayed as down.
  • B. The link status of the wan1 interface is displayed as up.
  • C. All other default routers should have a lower distance.
  • D. The wan1 interface address and gateway address are on the same subnet.

Answer: BD

NEW QUESTION 3
A backup file begins with this line:
#config-version=FGVM64-5.02-FW-build589-140613:opmode=0:vdom=0:user=admin
#conf_file_ver=3881503152630288414 #buildno=0589 #global_vdom=1
Can you restore it to a FortiWiFi 60D?

  • A. Yes
  • B. Yes, but only if you replace the "#conf_file_ver" line so that it contains the serial number of that specific FortiWiFi 60D.
  • C. Yes, but only if it is running the same version of FortiOS, or a newer compatible version.
  • D. No

Answer: D

NEW QUESTION 4
What is not true of configuring disclaimers on the FortiGate?

  • A. Disclaimers can be used in conjunction with captive portal.
  • B. Disclaimers appear before users authenticate.
  • C. Disclaimers can be bypassed through security exemption lists.
  • D. Disclaimers must be accepted in order to continue to the authentication login or originally intended destination.

Answer: C

NEW QUESTION 5
Which of the following statements best describe the main requirements for a traffic session to be offload eligible to an NP6 processor? (Choose three.)

  • A. Session packets do NOT have an 802.1Q VLAN tag.
  • B. It is NOT multicast traffic.
  • C. It does NOT require proxy-based inspection.
  • D. Layer 4 protocol must be UDP, TCP, SCTP or ICMP.
  • E. It does NOT require flow-based inspection.

Answer: CDE

NEW QUESTION 6
When an administrator attempts to manage FortiGate from an IP address that is not a trusted host, what happens?

  • A. FortiGate will still subject that person's traffic to firewall policies; it will not bypass them.
  • B. FortiGate will drop the packets and not respond.
  • C. FortiGate responds with a block message, indicating that it will not allow that person to log in.
  • D. FortiGate responds only if the administrator uses a secure protoco
  • E. Otherwise, it does not respond

Answer: B

NEW QUESTION 7
You have created a new administrator account, and assign it the prof_admin profile. Which is false about that account's permissions?

  • A. It cannot upgrade or downgrade firmware.
  • B. It can create and assign administrator accounts to parts of its own VDOM.
  • C. It can reset forgotten passwords for other administrator accounts such as "admin".
  • D. It has a smaller permissions scope than accounts with the "super_admin" profile.

Answer: A

NEW QUESTION 8
Data leak prevention archiving gives the ability to store session transaction data on a FortiAnalyzer unit for which of the following types of network traffic? (Choose three.)

  • A. POP3
  • B. SNMP
  • C. IPsec
  • D. SMTP
  • E. HTTP

Answer: ADE

NEW QUESTION 9
Which IP packets can be hardware-accelerated by a NP6 processor? (Choose two.)

  • A. Fragmented packets.
  • B. Multicast packet.
  • C. SCTP packet.
  • D. GRE packet.

Answer: BC

NEW QUESTION 10
Which statements are correct regarding URL filtering on a FortiGate unit? (Choose two.)

  • A. The allowed actions for URL filtering include allow, block, monitor and exempt.
  • B. The allow actions for URL filtering and Allow and Block only.
  • C. URL filters may be based on patterns using simple text, wildcards and regular expressions.
  • D. URL filters are based on simple text only and require an exact match.

Answer: AC

NEW QUESTION 11
Which statements are true about offloading antivirus inspection to a Security Processor (SP)? (Choose two.)

  • A. Both proxy-based and flow-based inspection are supported.
  • B. A replacement message cannot be presented to users when a virus has been detected.
  • C. It saves CPU resources.
  • D. The ingress and egress interfaces can be in different SPs.

Answer: BC

NEW QUESTION 12
Which correctly define "Section View" and "Global View" for firewall policies? (Choose two.)

  • A. Section View lists firewall policies primarily by their interface pairs.
  • B. Section View lists firewall policies primarily by their sequence number.
  • C. Global View lists firewall policies primarily by their interface pairs.
  • D. Global View lists firewall policies primarily by their policy sequence number.
  • E. The 'any' interface may be used with Section View.

Answer: AD

NEW QUESTION 13
Which of the following email spam filtering features is NOT supported on a FortiGate unit?

  • A. Multipurpose Internet Mail Extensions (MIME) Header Check
  • B. HELO DNS Lookup
  • C. Greylisting
  • D. Banned Word

Answer: C

NEW QUESTION 14
Which type of conserve mode writes a log message immediately, rather than when the device exits conserve mode?

  • A. Kernel
  • B. Proxy
  • C. System
  • D. Device

Answer: B

NEW QUESTION 15
Which statements are true regarding local user authentication? (Choose two.)

  • A. Two-factor authentication can be enabled on a per user basis.
  • B. Local users are for administration accounts only and cannot be used to authenticate network users.
  • C. Administrators can create the user accounts in a remote server and store the user passwords locally in the FortiGate.
  • D. Both the usernames and passwords can be stored locally on the FortiGate.

Answer: AD

NEW QUESTION 16
An administrator has formed a high availability cluster involving two FortiGate units.
[Multiple upstream Layer 2 switches] – [FortiGate HA Cluster] – [Multiple downstream Layer 2 Switches]
The administrator wishes to ensure that a single link failure will have minimal impact upon the overall throughput of traffic through this cluster.
Which of the following options describes the best step the administrator can take? The administrator should

  • A. Increase the number of FortiGate units in the cluster and configure HA in active-active mode.
  • B. Enable monitoring of all active interfaces.
  • C. Set up a full-mesh design which uses redundant interfaces.
  • D. Configure the HA ping server feature to allow for HA failover in the event that a path is disrupted.

Answer: C

Thanks for reading the newest NSE4 exam dumps! We recommend you to try the PREMIUM Surepassexam NSE4 dumps in VCE and PDF here: https://www.surepassexam.com/NSE4-exam-dumps.html (301 Q&As Dumps)