getcertified4sure.com

Renovate NSE5 Exam Study Guides With New Update Exam Questions




Want to know Exambible NSE5 Exam practice test features? Want to lear more about Fortinet Fortinet Network Security Expert 5 Written Exam (500) certification experience? Study Printable Fortinet NSE5 answers to Up to the minute NSE5 questions at Exambible. Gat a success with an absolute guarantee to pass Fortinet NSE5 (Fortinet Network Security Expert 5 Written Exam (500)) test on your first attempt.

Q121. - (Topic 1) 

File blocking rules are applied before which of the following? 

A. Firewall policy processing 

B. Virus scanning 

C. Web URL filtering 

D. White/Black list filtering 

Answer:


Q122. - (Topic 3) 

Which of the following statements is correct regarding the antivirus scanning function on the FortiGate unit? 

A. Antivirus scanning provides end-to-end virus protection for client workstations. 

B. Antivirus scanning provides virus protection for the HTTP, Telnet, SMTP, and FTP protocols. 

C. Antivirus scanning supports banned word checking. 

D. Antivirus scanning supports grayware protection. 

Answer:


Q123. - (Topic 3) 

The FortiGate Server Authentication Extensions (FSAE) provide a single sign on solution to authenticate users transparently to a FortiGate unit using credentials stored in Windows Active Directory. 

Which of the following statements are correct regarding FSAE in a Windows domain environment when NTLM is not used? (Select all that apply.) 

A. An FSAE Collector Agent must be installed on every domain controller. 

B. An FSAE Domain Controller Agent must be installed on every domain controller. 

C. The FSAE Domain Controller Agent will regularly update user logon information on the FortiGate unit. 

D. The FSAE Collector Agent will retrieve user information from the Domain Controller Agent and will send the user logon information to the FortiGate unit. 

E. For non-domain computers, an FSAE client must be installed on the computer to allow FSAE authentication. 

Answer: B,D 


Q124. - (Topic 2) 

Review the IKE debug output for IPsec shown in the Exhibit below. 

Which one of the following statements is correct regarding this output? 

A. The output is a Phase 1 negotiation. 

B. The output is a Phase 2 negotiation. 

C. The output captures the Dead Peer Detection messages. 

D. The output captures the Dead Gateway Detection packets. 

Answer:


Q125. - (Topic 3) 

Which of the following statements is correct based on the firewall configuration illustrated in the exhibit? 

A. A user can access the Internet using only the protocols that are supported by user authentication. 

B. A user can access the Internet using any protocol except HTTP, HTTPS, Telnet, and FTP. These require authentication before the user will be allowed access. 

C. A user must authenticate using the HTTP, HTTPS, SSH, FTP, or Telnet protocol before they can access any services. 

D. A user cannot access the Internet using any protocols unless the user has passed firewall authentication. 

Answer:


Q126. - (Topic 2) 

Data Leak Prevention archiving gives the ability to store files and message data onto a FortiAnalyzer unit for which of the following types of network traffic? (Select all that apply.) 

A. SNMP 

B. IPSec 

C. SMTP 

D. POP3 

E. HTTP 

Answer: C,D,E 


Q127. - (Topic 2) 

Review the configuration for FortiClient IPsec shown in the Exhibit below. 

Which of the following statements is correct regarding this configuration? 

A. The connecting VPN client will install a route to a destination corresponding to the STUDENT_INTERNAL address object 

B. The connecting VPN client will install a default route 

C. The connecting VPN client will install a route to the 172.20.1.[1-5] address range 

D. The connecting VPN client will connect in web portal mode and no route will be installed 

Answer:


Q128. - (Topic 1) 

You wish to create a firewall policy that applies only to traffic intended for your web server. The web server has an IP address of 192.168.2.2 and a /24 subnet mask. When defining the firewall address for use in this policy, which one of the following addresses is correct? 

A. 192.168.2.0 / 255.255.255.0 

B. 192.168.2.2 / 255.255.255.0 

C. 192.168.2.0 / 255.255.255.255 

D. 192.168.2.2 / 255.255.255.255 

Answer:


Q129. - (Topic 2) 

Review the output of the command get router info routing-table all shown in the Exhibit below; then answer the question following it. 

Which one of the following statements correctly describes this output? 

A. The two routes to the 10.0.2.0/24 subnet are ECMP routes and traffic will be load balanced based on the configured ECMP settings. 

B. The route to the 10.0.2.0/24 subnet via interface Remote_1 is the active and the route via Remote_2 is the backup. 

C. OSPF does not support ECMP therefore only the first route to subnet 10.0.1.0/24 is used. 

D. 172.16.2.1 is the preferred gateway for subnet 10.0.2.0/24. 

Answer:


Q130. - (Topic 3) 

An administrator sets up a new FTP server on TCP port 2121. A FortiGate unit is located between the FTP clients and the server. The administrator has created a policy for TCP port 2121. 

Users have been complaining that when downloading data they receive a 200 Port command successful message followed by a 425 Cannot build data connection message. 

Which of the following statements represents the best solution to this problem? 

A. Create a new session helper for the FTP service monitoring port 2121. 

B. Enable the ANY service in the firewall policies for both incoming and outgoing traffic. 

C. Place the client and server interface in the same zone and enable intra-zone traffic. 

D. Disable any protection profiles being applied to FTP traffic. 

Answer: