ExamGecko
Home / Fortinet / NSE6_FAC-6.4 / List of questions
Ask Question

Fortinet NSE6_FAC-6.4 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Examine the screenshot shown in the exhibit.

Fortinet NSE6_FAC-6.4 image Question 1 26622 09182024190503000000

Which two statements regarding the configuration are true? (Choose two.)

All guest accounts created using the account registration feature will be placed under the Guest_Portal_Users group
All guest accounts created using the account registration feature will be placed under the Guest_Portal_Users group
All accounts registered through the guest portal must be validated through email
All accounts registered through the guest portal must be validated through email
Guest users must fill in all the fields on the registration form
Guest users must fill in all the fields on the registration form
Guest user account will expire after eight hours
Guest user account will expire after eight hours
Suggested answer: A, B
Explanation:

The screenshot shows that the account registration feature is enabled for the guest portal and that the guest group is set to Guest_Portal_Users. This means that all guest accounts created using this feature will be placed under that group1. The screenshot also shows that email validation is enabled for the guest portal and that the email validation link expires after 24 hours. This means that all accounts registered through the guest portal must be validated through email within that time frame1.

Reference: 1 https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/guest-management#account-registration

asked 18/09/2024
Kaan K
37 questions

Question 2

Report Export Collapse

An administrator is integrating FortiAuthenticator with an existing RADIUS server with the intent of eventually replacing the RADIUS server with FortiAuthenticator.

How can FortiAuthenticator help facilitate this process?

By configuring the RADIUS accounting proxy
By configuring the RADIUS accounting proxy
By enabling automatic REST API calls from the RADIUS server
By enabling automatic REST API calls from the RADIUS server
By enabling learning mode in the RADIUS server configuration
By enabling learning mode in the RADIUS server configuration
By importing the RADIUS user records
By importing the RADIUS user records
Suggested answer: C
Explanation:

FortiAuthenticator can help facilitate the process of replacing an existing RADIUS server by enabling learning mode in the RADIUS server configuration. This allows FortiAuthenticator to learn user credentials from the existing RADIUS server and store them locally for future authentication requests2. This way, FortiAuthenticator can gradually take over the role of the RADIUS server without disrupting the user experience.

Reference: 2 https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/radius-service#learning-mode

asked 18/09/2024
GULNUR FICICILAR
29 questions

Question 3

Report Export Collapse

You are an administrator for a large enterprise and you want to delegate the creation and management of guest users to a group of sponsors.

How would you associate the guest accounts with individual sponsors?

As an administrator, you can assign guest groups to individual sponsors.
As an administrator, you can assign guest groups to individual sponsors.
Guest accounts are associated with the sponsor that creates the guest account.
Guest accounts are associated with the sponsor that creates the guest account.
You can automatically add guest accounts to groups associated with specific sponsors.
You can automatically add guest accounts to groups associated with specific sponsors.
Select the sponsor on the guest portal, during registration.
Select the sponsor on the guest portal, during registration.
Suggested answer: B
Explanation:

Guest accounts are associated with the sponsor that creates the guest account. A sponsor is a user who has permission to create and manage guest accounts on behalf of other users3. A sponsor can create guest accounts using the sponsor portal or the REST API3. The sponsor's username is recorded as a field in the guest account's profile3.

Reference: 3 https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/guest-management#sponsors

asked 18/09/2024
Joseph McCray
32 questions

Question 4

Report Export Collapse

You are a Wi-Fi provider and host multiple domains.

How do you delegate user accounts, user groups and permissions per domain when they are authenticating on a single FortiAuthenticator device?

Create realms.
Create realms.
Create user groups
Create user groups
Create multiple directory trees on FortiAuthenticator
Create multiple directory trees on FortiAuthenticator
Automatically import hosts from each domain as they authenticate.
Automatically import hosts from each domain as they authenticate.
Suggested answer: A
Explanation:

Realms are a way to delegate user accounts, user groups and permissions per domain when they are authenticating on a single FortiAuthenticator device. A realm is a logical grouping of users and groups based on a common attribute, such as a domain name or an IP address range. Realms allow administrators to apply different authentication policies and settings to different groups of users based on their realm membership.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/user-management#realms

asked 18/09/2024
Michael Ulrich
41 questions

Question 5

Report Export Collapse

You have implemented two-factor authentication to enhance security to sensitive enterprise systems.

How could you bypass the need for two-factor authentication for users accessing form specific secured networks?

Create an admin realm in the authentication policy
Create an admin realm in the authentication policy
Specify the appropriate RADIUS clients in the authentication policy
Specify the appropriate RADIUS clients in the authentication policy
Enable Adaptive Authentication in the portal policy
Enable Adaptive Authentication in the portal policy
Enable the Resolve user geolocation from their IP address option in the authentication policy.
Enable the Resolve user geolocation from their IP address option in the authentication policy.
Suggested answer: C
Explanation:

Adaptive Authentication is a feature that allows administrators to bypass the need for two-factor authentication for users accessing from specific secured networks. Adaptive Authentication uses geolocation information from IP addresses to determine whether a user is accessing from a trusted network or not. If the user is accessing from a trusted network, FortiAuthenticator can skip the second factor of authentication and grant access based on the first factor only.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/authentication-policies#adaptive-authentication

asked 18/09/2024
Máté Montvai
36 questions

Question 6

Report Export Collapse

Which network configuration is required when deploying FortiAuthenticator for portal services?

FortiAuthenticator must have the REST API access enable on port1
FortiAuthenticator must have the REST API access enable on port1
One of the DNS servers must be a FortiGuard DNS server
One of the DNS servers must be a FortiGuard DNS server
Fortigate must be setup as default gateway for FortiAuthenticator
Fortigate must be setup as default gateway for FortiAuthenticator
Policies must have specific ports open between FortiAuthenticator and the authentication clients
Policies must have specific ports open between FortiAuthenticator and the authentication clients
Suggested answer: D
Explanation:

When deploying FortiAuthenticator for portal services, such as guest portal, sponsor portal, user portal or FortiToken activation portal, the network configuration must allow specific ports to be open between FortiAuthenticator and the authentication clients. These ports are:

TCP 80 for HTTP access TCP 443 for HTTPS access TCP 389 for LDAP access TCP 636 for LDAPS access UDP 1812 for RADIUS authentication UDP 1813 for RADIUS accounting Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/portal-services#network-configuration

asked 18/09/2024
July Truong
38 questions

Question 7

Report Export Collapse

You are a FortiAuthenticator administrator for a large organization. Users who are configured to use

FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.

What can cause this issue?

FortiToken 200 license has expired
FortiToken 200 license has expired
One of the FortiAuthenticator devices in the active-active cluster has failed
One of the FortiAuthenticator devices in the active-active cluster has failed
Time drift between FortiAuthenticator and hardware tokens
Time drift between FortiAuthenticator and hardware tokens
FortiAuthenticator has lost contact with the FortiToken Cloud servers
FortiAuthenticator has lost contact with the FortiToken Cloud servers
Suggested answer: C
Explanation:

One possible cause of the issue is time drift between FortiAuthenticator and hardware tokens. Time drift occurs when the internal clocks of FortiAuthenticator and hardware tokens are not synchronized. This can result in mismatched one-time passwords (OTPs) generated by the hardware tokens and expected by FortiAuthenticator. To prevent this issue, FortiAuthenticator provides a time drift tolerance option that allows a certain number of seconds of difference between the clocks.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/two-factor-authentication#time-drift-tolerance

asked 18/09/2024
Landry Tankam
38 questions

Question 8

Report Export Collapse

Why would you configure an OCSP responder URL in an end-entity certificate?

To designate the SCEP server to use for CRL updates for that certificate
To designate the SCEP server to use for CRL updates for that certificate
To identify the end point that a certificate has been assigned to
To identify the end point that a certificate has been assigned to
To designate a server for certificate status checking
To designate a server for certificate status checking
To provide the CRL location for the certificate
To provide the CRL location for the certificate
Suggested answer: C
Explanation:

An OCSP responder URL in an end-entity certificate is used to designate a server for certificate status checking. OCSP stands for Online Certificate Status Protocol, which is a method of verifying whether a certificate is valid or revoked in real time. An OCSP responder is a server that responds to OCSP requests from clients with the status of the certificate in question. The OCSP responder URL in an end-entity certificate points to the location of the OCSP responder that can provide the status of that certificate.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/certificate-management#ocsp-responder

asked 18/09/2024
David Miller
32 questions

Question 9

Report Export Collapse

An administrator wants to keep local CA cryptographic keys stored in a central location.

Which FortiAuthenticator feature would provide this functionality?

SCEP support
SCEP support
REST API
REST API
Network HSM
Network HSM
SFTP server
SFTP server
Suggested answer: C
Explanation:

Network HSM is a feature that allows FortiAuthenticator to keep local CA cryptographic keys stored in a central location. HSM stands for Hardware Security Module, which is a physical device that provides secure storage and generation of cryptographic keys. Network HSM allows FortiAuthenticator to use an external HSM device to store and manage the private keys of its local CAs, instead of storing them locally on the FortiAuthenticator device.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/certificate-management#network-hsm

asked 18/09/2024
Zdenek Kugler
32 questions

Question 10

Report Export Collapse

Which option correctly describes an SP-initiated SSO SAML packet flow for a host without a SAML assertion?

Service provider contacts idendity provider, idendity provider validates principal for service provider, service provider establishes communication with principal
Service provider contacts idendity provider, idendity provider validates principal for service provider, service provider establishes communication with principal
Principal contacts idendity provider and is redirected to service provider, principal establishes connection with service provider, service provider validates authentication with identify provider
Principal contacts idendity provider and is redirected to service provider, principal establishes connection with service provider, service provider validates authentication with identify provider
Principal contacts service provider, service provider redirects principal to idendity provider, after succesfull authentication identify provider redirects principal to service provider
Principal contacts service provider, service provider redirects principal to idendity provider, after succesfull authentication identify provider redirects principal to service provider
Principal contacts idendity provider and authenticates, identity provider relays principal to service provider after valid authentication
Principal contacts idendity provider and authenticates, identity provider relays principal to service provider after valid authentication
Suggested answer: C
Explanation:

SP-initiated SSO SAML packet flow for a host without a SAML assertion is as follows:

Principal contacts service provider, requesting access to a protected resource.

Service provider redirects principal to identity provider, sending a SAML authentication request.

Principal authenticates with identity provider using their credentials.

After successful authentication, identity provider redirects principal back to service provider, sending a SAML response with a SAML assertion containing the principal's attributes.

Service provider validates the SAML response and assertion, and grants access to the principal.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/saml-service-provider#sp-initiated-sso

asked 18/09/2024
ali ghoubali
35 questions
Total 47 questions
Go to page: of 5
Search