Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONNSE 4_lucas

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
NSE 4_lucas

Description:
pasta de estudo

Author:
lucas.bgomes
(Other tests from this author)

Creation Date:
16/05/2023

Category:
Others

Number of questions: 9
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Which statement describes a characteristic of automation stitches? They can run multiple actions simultaneously They can be run only on devices in the Security Fabric. They can have one or more triggers. They can be created on any device in the fabric.
Which timeout setting can be responsible for deleting SSL VPN associated sessions? SSL VPN idle-timeout SSL VPN http-request-body-timeout SSL VPN dtls-hello-timeout SSL VPN login-timeout.
What are two functions of ZTNA? (Choose two.) ZTNA manages access through the client only. ZTNA manages access for remote users only. ZTNA provides a security posture check. ZTNA provides role-based access.
Refer to the exhibit. The Root and Tojnternet VDOMs are configured In NAT mode. The DMZ and Local VDOMs are configured In transparent mode. The Root VDOM is the management VDOM. The Tojnternet VDOM allows LAN users to access the Internet. The Tojnternet VDOM Is the only VDOM with Internet access and is directly connected to the ISPmoce. What can you conclude about this configuration? A default static route is not required on the To_nternet VDOM to allow LAN users to access the Internet. Inter-VDOM links are required to allow traffic between the Local and DMZ VDOMs. Inter-VDOM links are not required between the Root and To_nternet VDOMs because the Root VDOM Is used only as a management VDOM Inter-VDOM links are required to allow traffic between the Local and Root VDOMs. .
What are two benefits of flow-based inspection compared to proxy-based inspection? (Choose two.) FortiGate uses fewer resources. FortiGate allocates two sessions per connection. FortiGate performs a more exhaustive inspection on traffic FortiGate adds less latency to traffic.
Refer to the exhibits. The exhibits show a firewall policy (Exhibit A) and an antivirus profile (Exhibit B). Why Is the user unable to receive a block replacement message when downloading an Infected file for the first time? The volume of traffic being Inspected is too high for this model of FortIGate. Flow-based Inspection is used, which resets the last packet to the user. he firewall policy performs a full content Inspection on the file. The intrusion prevention security profile must be enabled when using flow-based inspection mode.
Which statement correctly describes the use of reliable logging on FortiGate? Reliable logging is enabled by default in all configuration scenarios. Reliable logging can be configured only using the CLI. Reliable logging is required to encrypt the transmission of logs. Reliable logging prevents the loss of logs when the local disk is full.
Refer to the exhibits. Exhibit A shows a topology for a FortiGate HA cluster that performs proxy-based inspection on traffic. B shows the HA configuration the partial output of the "get sys ha status" command. Based on the exhibits, which two statements about the traffic passing through the cluster are true? (choose two) For non-load balanced connections, packets forwarded by the cluster to the server contain the virtual MAC address of port2 as source. For load balanced connections, the primary encapsulates TCP SYN packets before forwarding them to the secondary The cluster can load balance ICMP connections to the secondary. The traffic sourced from the client and destined to the server Is sent to FGT-1.
Based on the ZTNA tag, the security posture of the remote endpoint has changed. What will happen to endpoint active ZTNA sessions? They will be re-ebaluated to match the security policy. They will be re-evaluated to match the endpoint policy. They will be re-evaluated to match the ZTNA policy. They will be re-evaluated to match the firewall policy.
Report abuse Consent Terms of use