getcertified4sure.com

10 tips on nse4 dumps




Proper study guides for Most recent Fortinet Fortinet Network Security Expert 4 Written Exam (400) certified begins with Fortinet nse4 exam dump preparation products which designed to deliver the Refined fortinet nse4 dumps questions by making you pass the nse4 dumps test at your first time. Try the free nse4 dumps demo right now.

Q51. - (Topic 6) 

An administrator wants to create an IPsec VPN tunnel between two FortiGate devices. 

Which three configuration steps must be performed on both units to support this scenario? (Choose three.) 

A. Create firewall policies to allow and control traffic between the source and destination IP addresses. 

B. Configure the appropriate user groups to allow users access to the tunnel. 

C. Set the operating mode to IPsec VPN mode. 

D. Define the phase 2 parameters. 

E. Define the Phase 1 parameters. 

Answer: A,D,E 


Q52. - (Topic 6) 

Which IPsec configuration mode can be used for implementing GRE-over-IPsec VPNs?. 

A. Policy-based only. 

B. Route-based only. 

C. Either policy-based or route-based VPN. 

D. GRE-based only. 

Answer:


Q53. - (Topic 11) 

Review the output of the command get router info routing-table database shown in the exhibit below; then answer the question following it. 

Which two statements are correct regarding this output? (Choose two.) 

A. There will be six routes in the routing table. 

B. There will be seven routes in the routing table. 

C. There will be two default routes in the routing table. 

D. There will be two routes for the 10.0.2.0/24 subnet in the routing table. 

Answer: A,C 


Q54. - (Topic 7) 

Which antivirus inspection mode must be used to scan SMTP, FTP, POP3 and SMB protocols? 

A. Proxy-based. 

B. DNS-based. 

C. Flow-based. 

D. Man-in-the-middle. 

Answer:


Q55. - (Topic 18) 

Bob wants to send Alice a file that is encrypted using public key cryptography. 

Which of the following statements is correct regarding the use of public key cryptography in this scenario? 

A. Bob will use his private key to encrypt the file and Alice will use her private key to decrypt the file. 

B. Bob will use his public key to encrypt the file and Alice will use Bob's private key to decrypt the file. 

C. Bob will use Alice's public key to encrypt the file and Alice will use her private key to decrypt the file. 

D. Bob will use his public key to encrypt the file and Alice will use her private key to decrypt the file. 

Answer:


Q56. - (Topic 5) 

Regarding the use of web-only mode SSL VPN, which statement is correct? 

A. It supports SSL version 3 only. 

B. It requires a Fortinet-supplied plug-in on the web client. 

C. It requires the user to have a web browser that supports 64-bit cipher length. 

D. The JAVA run-time environment must be installed on the client. 

Answer:


Q57. - (Topic 4) 

Which statement regarding the firewall policy authentication timeout is true? 

A. It is an idle timeout. The FortiGate considers a user to be “idle” if it does not see any packets coming from the user’s source IP. 

B. It is a hard timeout. The FortiGate removes the temporary policy for a user’s source IP address after this timer has expired. 

C. It is an idle timeout. The FortiGate considers a user to be “idle” if it does not see any packets coming from the user’s source MAC. 

D. It is a hard timeout. The FortiGate removes the temporary policy for a user’s source MAC address after this timer has expired. 

Answer:


Q58. - (Topic 11) 

A static route is configured for a FortiGate unit from the CLI using the following commands: config router static edit 1 set device "wan1" set distance 20 set gateway 192.168.100.1 next end Which of the following conditions are required for this static default route to be displayed in 

the FortiGate unit’s routing table? (Choose two.) 

A. The administrative status of the wan1 interface is displayed as down. 

B. The link status of the wan1 interface is displayed as up. 

C. All other default routes should have a lower distance. 

D. The wan1 interface address and gateway address are on the same subnet. 

Answer: B,D 


Q59. - (Topic 5) 

Regarding tunnel-mode SSL VPN, which three statements are correct? (Choose three.) 

A. Split tunneling is supported. 

B. It requires the installation of a VPN client. 

C. It requires the use of an Internet browser. 

D. It does not support traffic from third-party network applications. 

E. An SSL VPN IP address is dynamically assigned to the client by the FortiGate unit. 

Answer: A,B,E 


Q60. - (Topic 4) 

Which statements are true regarding local user authentication? (Choose two.) 

A. Two-factor authentication can be enabled on a per user basis. 

B. Local users are for administration accounts only and cannot be used to authenticate network users. 

C. Administrators can create the user accounts is a remote server and store the user passwords locally in the FortiGate. 

D. Both the usernames and passwords can be stored locally on the FortiGate 

Answer: A,D