ExamGecko
Home Home / Fortinet / NSE6_FAC-6.4

Fortinet NSE6_FAC-6.4 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Which two types of digital certificates can you create in Fortiauthenticator? (Choose two)

A.
User certificate
A.
User certificate
Answers
B.
Organization validation certificate
B.
Organization validation certificate
Answers
C.
Third-party root certificate
C.
Third-party root certificate
Answers
D.
Local service certificate
D.
Local service certificate
Answers
Suggested answer: A, D

Explanation:

FortiAuthenticator can create two types of digital certificates: user certificates and local service certificates. User certificates are issued to users or devices for authentication purposes, such as VPN, wireless, or web access. Local service certificates are issued to FortiAuthenticator itself for securing its own services, such as HTTPS, RADIUS, or LDAP.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/certificate-management#certificate-types

Which EAP method is known as the outer authentication method?

A.
PEAP
A.
PEAP
Answers
B.
EAP-GTC
B.
EAP-GTC
Answers
C.
EAP-TLS
C.
EAP-TLS
Answers
D.
MSCHAPV2
D.
MSCHAPV2
Answers
Suggested answer: A

Explanation:

PEAP is known as the outer authentication method because it establishes a secure tunnel between the client and the server using TLS. The inner authentication method, such as EAP-GTC, EAP-TLS, or MSCHAPV2, is then used to authenticate the client within the tunnel.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/wireless-802-1x-authentication#peap

You want to monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP.

Which two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface? (Choose two)

A.
Enable logging services
A.
Enable logging services
Answers
B.
Set the tresholds to trigger SNMP traps
B.
Set the tresholds to trigger SNMP traps
Answers
C.
Upload management information base (MIB) files to SNMP server
C.
Upload management information base (MIB) files to SNMP server
Answers
D.
Associate an ASN, 1 mapping rule to the receiving host
D.
Associate an ASN, 1 mapping rule to the receiving host
Answers
Suggested answer: B, C

Explanation:

To monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP, two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface:

Set the thresholds to trigger SNMP traps for various system events, such as CPU usage, disk usage, memory usage, or temperature.

Upload management information base (MIB) files to SNMP server to enable the server to interpret the SNMP traps sent by FortiAuthenticator.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/system-settings#snmp

Which two features of FortiAuthenticator are used for EAP deployment? (Choose two)

A.
Certificate authority
A.
Certificate authority
Answers
B.
LDAP server
B.
LDAP server
Answers
C.
MAC authentication bypass
C.
MAC authentication bypass
Answers
D.
RADIUS server
D.
RADIUS server
Answers
Suggested answer: A, D

Explanation:

Two features of FortiAuthenticator that are used for EAP deployment are certificate authority and

RADIUS server. Certificate authority allows FortiAuthenticator to issue and manage digital certificates for EAP methods that require certificate-based authentication, such as EAP-TLS or PEAP-EAP-TLS.

RADIUS server allows FortiAuthenticator to act as an authentication server for EAP methods that use RADIUS as a transport protocol, such as EAP-GTC or PEAP-MSCHAPV2.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/wireless-802-1x-authentication

How can a SAML metada file be used?

A.
To defined a list of trusted user names
A.
To defined a list of trusted user names
Answers
B.
To import the required IDP configuration
B.
To import the required IDP configuration
Answers
C.
To correlate the IDP address to its hostname
C.
To correlate the IDP address to its hostname
Answers
D.
To resolve the IDP realm for authentication
D.
To resolve the IDP realm for authentication
Answers
Suggested answer: B

Explanation:

A SAML metadata file can be used to import the required IDP configuration for SAML service provider mode. A SAML metadata file is an XML file that contains information about the identity provider (IDP) and the service provider (SP), such as their entity IDs, endpoints, certificates, and attributes. By importing a SAML metadata file from the IDP, FortiAuthenticator can automatically configure the necessary settings for SAML service provider mode.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/saml-service-provider#saml-metadata

A system administrator wants to integrate FortiAuthenticator with an existing identity management system with the goal of authenticating and deauthenticating users into FSSO.

What feature does FortiAuthenticator offer for this type of integration?

A.
The ability to import and export users from CSV files
A.
The ability to import and export users from CSV files
Answers
B.
RADIUS learning mode for migrating users
B.
RADIUS learning mode for migrating users
Answers
C.
REST API
C.
REST API
Answers
D.
SNMP monitoring and traps
D.
SNMP monitoring and traps
Answers
Suggested answer: C

Explanation:

REST API is a feature that allows FortiAuthenticator to integrate with an existing identity management system with the goal of authenticating and deauthenticating users into FSSO. REST API stands for Representational State Transfer Application Programming Interface, which is a method of exchanging data between different systems using HTTP requests and responses. FortiAuthenticator provides a REST API that can be used by external systems to perform various actions, such as creating, updating, deleting, or querying users and groups, or sending FSSO logon or logoff events.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/rest-api

Which statement about captive portal policies is true, assuming a single policy has been defined?

A.
Portal policies apply only to authentication requests coming from unknown RADIUS clients
A.
Portal policies apply only to authentication requests coming from unknown RADIUS clients
Answers
B.
All conditions in the policy must match before a user is presented with the captive portal.
B.
All conditions in the policy must match before a user is presented with the captive portal.
Answers
C.
Conditions in the policy apply only to wireless users.
C.
Conditions in the policy apply only to wireless users.
Answers
D.
Portal policies can be used only for BYODs.
D.
Portal policies can be used only for BYODs.
Answers
Suggested answer: B

Explanation:

Captive portal policies are used to define the conditions and settings for presenting a captive portal to users who need to authenticate before accessing the network. A captive portal policy consists of a set of conditions and a set of actions. The conditions can be based on various attributes, such as source IP address, MAC address, user group, device type, or RADIUS client. The actions can include redirecting the user to a specific portal, applying a specific authentication method, or assigning a specific VLAN or firewall policy. A single policy can have multiple conditions, and all conditions in the policy must match before a user is presented with the captive portal.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/portal-services#captive-portal-policies

Which interface services must be enabled for the SCEP client to connect to Authenticator?

A.
OCSP
A.
OCSP
Answers
B.
REST API
B.
REST API
Answers
C.
SSH
C.
SSH
Answers
D.
HTTP/HTTPS
D.
HTTP/HTTPS
Answers
Suggested answer: D

Explanation:

HTTP/HTTPS are the interface services that must be enabled for the SCEP client to connect to FortiAuthenticator. SCEP stands for Simple Certificate Enrollment Protocol, which is a method of requesting and issuing digital certificates over HTTP or HTTPS. FortiAuthenticator supports SCEP as a certificate authority (CA) and can process SCEP requests from SCEP clients. To enable SCEP on FortiAuthenticator, the HTTP or HTTPS service must be enabled on the interface that receives the SCEP requests.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/certificate-management#scep

Which statement about the assignment of permissions for sponsor and administrator accounts is true?

A.
Only administrator accounts permissions are assigned using admin profiles.
A.
Only administrator accounts permissions are assigned using admin profiles.
Answers
B.
Sponsor permissions are assigned using group settings.
B.
Sponsor permissions are assigned using group settings.
Answers
C.
Administrator capabilities are assigned by applying permission sets to admin groups.
C.
Administrator capabilities are assigned by applying permission sets to admin groups.
Answers
D.
Both sponsor and administrator account permissions are assigned using admin profiles.
D.
Both sponsor and administrator account permissions are assigned using admin profiles.
Answers
Suggested answer: D

Explanation:

Both sponsor and administrator account permissions are assigned using admin profiles. An admin profile is a set of permissions that defines what actions an administrator or a sponsor can perform on

FortiAuthenticator. An admin profile can be assigned to an admin group or an individual admin user.

A sponsor is a special type of admin user who can create and manage guest accounts on behalf of other users.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/administrators#admin-profiles

Which two protocols are the default management access protocols for administrative access for FortiAuthenticator? (Choose two)

A.
Telnet
A.
Telnet
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
SSH
C.
SSH
Answers
D.
SNMP
D.
SNMP
Answers
Suggested answer: B, C

Explanation:

HTTPS and SSH are the default management access protocols for administrative access for FortiAuthenticator. HTTPS allows administrators to access the web-based GUI of FortiAuthenticator using a web browser and a secure connection. SSH allows administrators to access the CLI of FortiAuthenticator using an SSH client and an encrypted connection. Both protocols require the administrator to enter a valid username and password to log in.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administration-guide/906179/system-settings#management-access

Total 47 questions
Go to page: of 5