NSE4-5.4 Exam Questions - Online Test


NSE4-5.4 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Act now and download your Fortinet NSE4-5.4 test today! Do not waste time for the worthless Fortinet NSE4-5.4 tutorials. Download Renewal Fortinet Fortinet Network Security Expert - FortiOS 5.4 exam with real questions and answers and begin to learn Fortinet NSE4-5.4 with a classic professional.

P.S. Precise NSE4-5.4 preparation labs are available on Google Drive, GET MORE: https://drive.google.com/open?id=1qNqkyfzMtD_JBMTiOJF0Q0poKyl3pZ-7


New Fortinet NSE4-5.4 Exam Dumps Collection (Question 4 - Question 13)

New Questions 4

Which statements about application control are true? (Choose two.)

A. Enabling application control profile in a security profile enables application control for all the traffic flowing through the FortiGate.

B. It cannot take an action on unknown applications.

C. It can inspect encrypted traffic.

D. It can identify traffic from known applications, even when they are using non-standard TCP/UDP ports.

Answer: A,D



New Questions 5

An administrator has configured a dialup IPsec VPN with XAuth. Which method statement best describes this scenario?

A. Only digital certificates will be accepted as an authentication method in phase 1.

B. Dialup clients must provide a username and password for authentication.

C. Phase 1 negotiations will skip pre-shared key exchange.

D. Dialup clients must provide their local ID during phase 2 negotiations.

Answer: B



New Questions 6

View the exhibit.

The client cannot connect to the HTTP web server. The administrator run the FortiGate built-in sniffer and got the following output:

What should be done next to troubleshoot the problem?

A. Execute another sniffer in the FortiGate, this time with the filter u201chost 10.0.1.10u201d.

B. Run a sniffer in the web server.

C. Capture the traffic using an external sniffer connected to port1.

D. Execute a debug flow.

Answer: D



New Questions 7

You are tasked to architect a new IPsec deployment with the following criteria:

- There are two HQ sites that all satellite offices must connect to.

- The satellite offices do not need to communicate directly with other satellite offices.

- No dynamic routing will be used.

- The design should minimize the number of tunnels being configured. Which topology should be used to satisfy all of the requirements?

A. Redundant

B. Hub-and-spoke

C. Partial mesh

D. Fully meshed

Answer: B



New Questions 8

When using WPAD DNS method, what is the FQDN format that browsers use to query the DNS server?

A. wpad.<local-domain>

B. srv_tcp.wpad.<local-domain>

C. srv_proxy.<local-domain>/wpad.dat

D. proxy.<local-domain>.wpad

Answer: A



New Questions 9

An administrator has configured a route-based IPsec VPN between two FortiGates. Which statement about this IPsec VPN configuration is true?

A. A phase 2 configuration is not required.

B. This VPN cannot be used as part of a hub and spoke topology.

C. The IPsec firewall policies must be placed at the top of the list.

D. A virtual IPsec interface is automatically created after the phase 1 configuration is completed.

Answer: D



New Questions 10

Which of the following statements about advanced AD access mode for FSSO collector agent are true? (Choose two.)

A. It is only supported if DC agents are deployed.

B. FortiGate can act as an LDAP client configure the group filters.

C. It supports monitoring of nested groups.

D. It uses the Windows convention for naming, that is, Domain\Username.

Answer: B,D



New Questions 11

Which statements about One-to-One IP pool are true? (Choose two.)

A. It allows configuration of ARP replies.

B. It allows fixed mapping of an internal address range to an external address range.

C. It is used for destination NAT.

D. It does not use port address translation.

Answer: B,D



New Questions 12

How does FortiGate look for a matching firewall policy to process traffic?

A. From top to bottom, based on the sequence numbers.

B. Based on best match.

C. From top to bottom, based on the policy ID numbers.

D. From lower to higher, based on the priority value.

Answer: A



New Questions 13

Which statement is true regarding the policy ID numbers of firewall policies?

A. Change when firewall policies are re-ordered.

B. Defines the order in which rules are processed.

C. Are required to modify a firewall policy from the CLI.

D. Represent the number of objects used in the firewall policy.

Answer: C



P.S. Easily pass NSE4-5.4 Exam with Examcollection Precise Dumps & pdf vce, Try Free: http://www.examcollectionuk.com/NSE4-5.4-vce-download.html ( New Questions)