Download Fortinet NSE 4 -FortiOS 7-2.CertsHero.NSE4_FGT-7.2.v4-1.2023-03-19.1e.80q.vcex

Download Exam

File Info

Exam Fortinet NSE 4 -FortiOS 7-2
Number NSE4_FGT-7.2
File Name Fortinet NSE 4 -FortiOS 7-2.CertsHero.NSE4_FGT-7.2.v4-1.2023-03-19.1e.80q.vcex
Size 4.96 Mb
Posted March 19, 2023
Downloads 36

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
Which two statements explain antivirus scanning modes? (Choose two.)

  • A: In proxy-based inspection mode, files bigger than the buffer size are scanned.
  • B: In flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it tothe client.
  • C: In proxy-based inspection mode, antivirus scanning buffers the whole file for scanning, beforesending it to the client.
  • D: In flow-based inspection mode, files bigger than the buffer size are scanned.



Question 2
Which two configuration settings are synchronized when FortiGate devices are in an active-active HA cluster? (Choose two.)

  • A: FortiGuard web filter cache
  • B: FortiGate hostname
  • C: NTP
  • D: DNS



Question 3
Why does FortiGate Keep TCP sessions in the session table for several seconds, even after both sides (client and server) have terminated the session?

  • A: To allow for out-of-order packets that could arrive after the FIN/ACK packets
  • B: To finish any inspection operations
  • C: To remove the NAT operation
  • D: To generate logs



Question 4
How does FortiGate act when using SSL VPN in web mode?

  • A: FortiGate acts as an FDS server.
  • B: FortiGate acts as an HTTP reverse proxy.
  • C: FortiGate acts as DNS server.
  • D: FortiGate acts as router.



Question 5
Which three statements explain a flow-based antivirus profile? (Choose three.)

  • A: IPS engine handles the process as a standalone.
  • B: FortiGate buffers the whole file but transmits to the client simultaneously.
  • C: If the virus is detected, the last packet is delivered to the client.
  • D: Optimized performance compared to proxy-based inspection.
  • E: Flow-based inspection uses a hybrid of scanning modes available in proxy-based inspection.



Question 6
Refer to the exhibits to view the firewall policy (Exhibit A) and the antivirus profile (Exhibit B).

    

    

Which statement is correct if a user is unable to receive a block replacement message when
downloading an infected file for the first time?

  • A: The firewall policy performs the full content inspection on the file.
  • B: The flow-based inspection is used, which resets the last packet to the user.
  • C: The volume of traffic being inspected is too high for this model of FortiGate.
  • D: The intrusion prevention security profile needs to be enabled when using flow-based inspectionmode.



Question 7
A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.
All traffic must be routed through the primary tunnel when both tunnels are up
The secondary tunnel must be used only if the primary tunnel goes down
In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover
Which two key configuration changes are needed on FortiGate to meet the design requirements?
(Choose two,)

  • A: Configure a high distance on the static route for the primary tunnel, and a lower distance on thestatic route for the secondary tunnel.
  • B: Enable Dead Peer Detection.
  • C: Configure a lower distance on the static route for the primary tunnel, and a higher distance on thestatic route for the secondary tunnel.
  • D: Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.



Question 8
Refer to the exhibit.

    

Given the interfaces shown in the exhibit. which two statements are true? (Choose two.)

  • A: Traffic between port2 and port2-vlan1 is allowed by default.
  • B: port1-vlan10 and port2-vlan10 are part of the same broadcast domain.
  • C: port1 is a native VLAN.
  • D: port1-vlan and port2-vlan1 can be assigned in the same VDOM or to different VDOMs.



Question 9
Refer to the exhibit.

    

Given the security fabric topology shown in the exhibit, which two statements are true? (Choose two.)

  • A: There are five devices that are part of the security fabric.
  • B: Device detection is disabled on all FortiGate devices.
  • C: This security fabric topology is a logical topology view.
  • D: There are 19 security recommendations for the security fabric.



Question 10
Refer to the exhibits.

    

    

Exhibit A shows system performance output. Exhibit B shows a FortiGate configured with the default configuration of high memory usage thresholds. Based on the system performance output, which two statements are correct? (Choose two.)

  • A: Administrators can access FortiGate only through the console port.
  • B: FortiGate has entered conserve mode.
  • C: FortiGate will start sending all files to FortiSandbox for inspection.
  • D: Administrators cannot change the configuration.






CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset