NSE4-5.4 Exam Questions - Online Test


NSE4-5.4 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Want to know Certleader NSE4-5.4 Exam practice test features? Want to lear more about Fortinet Fortinet Network Security Expert - FortiOS 5.4 certification experience? Study Realistic Fortinet NSE4-5.4 answers to Up to the minute NSE4-5.4 questions at Certleader. Gat a success with an absolute guarantee to pass Fortinet NSE4-5.4 (Fortinet Network Security Expert - FortiOS 5.4) test on your first attempt.

P.S. Realistic NSE4-5.4 guidance are available on Google Drive, GET MORE: https://drive.google.com/open?id=1xSlEaFFo1TkP1Im8lI2_FaBp164pASCS


New Fortinet NSE4-5.4 Exam Dumps Collection (Question 2 - Question 11)

Question No: 2

Which of the following statements about central NAT are true? (Choose two.)

A. IP tool references must be removed from existing firewall policies before enabling central NAT.

B. Central NAT can be enabled or disabled from the CLI only.

C. Source NAT, using central NAT, requires at least one central SNAT policy.

D. Destination NAT, using central NAT, requires a VIP object as the destination address in a firewall policy.

Answer: A,C


Question No: 3

Which of the following statements describe WMI polling mode for FSSO collector agent? (Choose two.)

A. The collector agent does not need to search any security event logs.

B. WMI polling can increase bandwidth usage with large networks.

C. The NetSessionEnum function is used to track user logoffs.

D. The collector agent uses a Windows API to query DCs for user logins.

Answer: B,D


Question No: 4

Which traffic inspection features can be executed by a security processor (SP)? (Choose three.)

A. TCP SYN proxy

B. SIP session helper

C. Proxy-based antivirus

D. Attack signature matching

E. Flow-based web filtering

Answer: C,D,E


Question No: 5

Which statements best describe auto discovery VPN (ADVPN). (Choose two.)

A. It requires the use of dynamic routing protocols so that spokes can learn the routes to other spokes.

B. ADVPN is only supported with IKEv2.

C. Tunnels are negotiated dynamically between spokes.

D. Every spoke requires a static tunnel to be configured to other spokes so that phase 1 and phase 2 proposals are defined in advance.

Answer: A,C


Question No: 6

View the exhibit.

What is the effect of the Disconnect Cluster Member operation as shown in the exhibit? (Choose two.)

A. The HA mode changes to standalone.

B. The firewall policies are deleted on the disconnected member.

C. The system hostname is set to the FortiGate serial number.

D. The port3 is configured with an IP address for management access.

Answer: A,D


Question No: 7

Which configuration objects can be selected for the Source filed of a firewall policy? (Choose two.)

A. FQDN address

B. IP pool

C. User or user group

D. Firewall service

Answer: B,C


Question No: 8

View the exhibit.

When Role is set to Undefined, which statement is true?

A. The GUI provides all the configuration options available for the port1 interface.

B. You cannot configure a static IP address for the port1 interface because it allows only DHCP addressing mode.

C. Firewall policies can be created from only the port1 interface to any interface.

D. The port1 interface is reserved for management only.

Answer: A


Question No: 9

Under what circumstance would you enable LEARN as the Action on a firewall policy?

A. You want FortiGate to compile security feature activity from various security-related logs, such as virus and attack logs.

B. You want FortiGate to monitor a specific security profile in a firewall policy, and provide recommendations for that profile.

C. You want to capture data across all traffic and security vectors, and receive learning logs and a report with recommendations.

D. You want FortiGate to automatically modify your firewall policies as it learns your networking behavior.

Answer: B


Question No: 10

Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection? (Choose two.)

A. SP3

B. CP8

C. NP4

D. NP6

Answer: C,D

Explanation: Sessions that require proxy-based security features (for example, virus scanning, IPS, application control and so on) are not fast pathed and must be processed by the CPU. Sessions that require flow-based security features can be offloaded to NP4 or NP6 network processors if the FortiGate supports NTurbo.


Question No: 11

Which traffic sessions can be offloaded to a NP6 processor? (Choose two.)

A. IPv6

B. RIP

C. GRE

D. NAT64

Answer: A,D


Recommend!! Get the Realistic NSE4-5.4 dumps in VCE and PDF From Dumpscollection, Welcome to download: http://www.dumpscollection.net/dumps/NSE4-5.4/ (New Q&As Version)