Fortinet NSE4_FGT-7.2 Practice Test - Questions Answers, Page 15
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 141
 
                            
                            
                                Refer to the exhibit.
Based on the ZTNA tag, the security posture of the remote endpoint has changed.
What will happen to endpoint active ZTNA sessions?
Question 142
 
                            
                            
                                What are two features of collector agent advanced mode? (Choose two.)
Question 143
 
                            
                            
                                An administrator wants to simplify remote access without asking users to provide user credentials.
Which access control method provides this solution?
Question 144
 
                            
                            
                                What are two characteristics of FortiGate HA cluster virtual IP addresses? (Choose two.)
Question 145
 
                            
                            
                                Refer to the exhibits.
Exhibit A shows a network diagram. Exhibit B shows the firewall policy configuration and a VIP object configuration.
The WAN (port1) interface has the IP address 10.200.1.1/24.
The LAN (port3) interface has the IP address 10.0.1.254/24.
The administrator disabled the WebServer firewall policy.
Which IP address will be used to source NAT the traffic, if a user with address 10.0.1.10 connects over SSH to the host with address 10.200.3.1?
Question 146
 
                            
                            
                                Refer to the exhibit.
The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile.
An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category.
What are two solutions for satisfying the requirement? (Choose two.)
Question 147
 
                            
                            
                                Which statement about the deployment of the Security Fabric in a multi-VDOM environment is true?
Question 148
 
                            
                            
                                Refer to the exhibits.
Exhibit A shows the application sensor configuration. Exhibit B shows the Excessive-Bandwidth and Apple filter details.
Based on the configuration, what will happen to Apple FaceTime if there are only a few calls originating or incoming?
Question 149
 
                            
                            
                                Which statement is correct regarding the security fabric?
Question 150
 
                            
                            
                                If Internet Service is already selected as Destination in a firewall policy, which other configuration object can be selected for the Destination field of a firewall policy?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question