最新的Fortinet Network Security Expert 4 Written Exam (400) - NSE4免費考試真題
問題1
Which of the following are considered log types? (Choose three.)
正確答案: A,D,E
問題2
What are the advantages of FSSO DC mode over polling mode?
正確答案: D
問題3
Which authentication scheme is not supported by the RADIUS implementation on
FortiGate?
FortiGate?
正確答案: A
問題4
The exhibit is a screen shot of an Application Control profile.

Different settings are circled and numbered. Select the number identifying the setting which will provide additional information about YouTube access, such as the name of the video watched.

Different settings are circled and numbered. Select the number identifying the setting which will provide additional information about YouTube access, such as the name of the video watched.
正確答案: B
問題5
What methods can be used to deliver the token code to a user that is configured to use two-factor authentication? (Choose three.)
正確答案: A,B,C
問題6
Which header field can be used in a firewall policy for traffic matching?
正確答案: A
問題7
What functions can the IPv6 Neighbor Discovery Protocol accomplish? (Choose two.)
正確答案: C,D
問題8
Which is NOT true about source matching with firewall policies?
正確答案: A
問題9
Which of the following statements are correct about NTLM authentication? (Choose three)
正確答案: A,B,C
問題10
What logging options are supported on a FortiGate unit? (Choose two.)
正確答案: B,D
問題11
Review the IPsec phase 2 configuration shown in the exhibit; then answer the question below.

Which statements are correct regarding this configuration? (Choose two.)

Which statements are correct regarding this configuration? (Choose two.)
正確答案: A,C
問題12
Which of the following statements are correct concerning IPsec dialup VPN configurations for FortiGate devices? (Choose two)
正確答案: B,D
問題13
Which methods can FortiGate use to send a One Time Password (OTP) to Two-Factor
Authentication users? (Choose three.)
Authentication users? (Choose three.)
正確答案: B,C,E
問題14
Which of the following statements are correct concerning IKE mode config? (Choose two)
正確答案: A,D
問題15
When creating FortiGate administrative users, which configuration objects specify the account rights?
正確答案: C
問題16
What attributes are always included in a log header? (Choose three.)
正確答案: A,B,C
問題17
Files that are larger than the oversized limit are subjected to which Antivirus check?
正確答案: B
問題18
What log type would indicate whether a VPN is going up or down?
正確答案: D
問題19
Review the configuration for FortiClient IPsec shown in the exhibit.

Which statement is correct regarding this configuration?

Which statement is correct regarding this configuration?
正確答案: B