ExamGecko
Home / Fortinet / NSE6_FAC-6.4 / List of questions
Ask Question

Fortinet NSE6_FAC-6.4 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Which two types of digital certificates can you create in Fortiauthenticator? (Choose two)

User certificate
User certificate
Organization validation certificate
Organization validation certificate
Third-party root certificate
Third-party root certificate
Local service certificate
Local service certificate
Suggested answer: A, D
Explanation:

FortiAuthenticator can create two types of digital certificates: user certificates and local service certificates. User certificates are issued to users or devices for authentication purposes, such as VPN, wireless, or web access. Local service certificates are issued to FortiAuthenticator itself for securing its own services, such as HTTPS, RADIUS, or LDAP.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/certificate-management#certificate-types

asked 18/09/2024
Shameez Mohammed
44 questions

Question 12

Report Export Collapse

Which EAP method is known as the outer authentication method?

PEAP
PEAP
EAP-GTC
EAP-GTC
EAP-TLS
EAP-TLS
MSCHAPV2
MSCHAPV2
Suggested answer: A
Explanation:

PEAP is known as the outer authentication method because it establishes a secure tunnel between the client and the server using TLS. The inner authentication method, such as EAP-GTC, EAP-TLS, or MSCHAPV2, is then used to authenticate the client within the tunnel.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/wireless-802-1x-authentication#peap

asked 18/09/2024
Ajay Vijayan
39 questions

Question 13

Report Export Collapse

You want to monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP.

Which two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface? (Choose two)

Enable logging services
Enable logging services
Set the tresholds to trigger SNMP traps
Set the tresholds to trigger SNMP traps
Upload management information base (MIB) files to SNMP server
Upload management information base (MIB) files to SNMP server
Associate an ASN, 1 mapping rule to the receiving host
Associate an ASN, 1 mapping rule to the receiving host
Suggested answer: B, C
Explanation:

To monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP, two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface:

Set the thresholds to trigger SNMP traps for various system events, such as CPU usage, disk usage, memory usage, or temperature.

Upload management information base (MIB) files to SNMP server to enable the server to interpret the SNMP traps sent by FortiAuthenticator.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/system-settings#snmp

asked 18/09/2024
Andrea Chichiarelli
43 questions

Question 14

Report Export Collapse

Which two features of FortiAuthenticator are used for EAP deployment? (Choose two)

Certificate authority
Certificate authority
LDAP server
LDAP server
MAC authentication bypass
MAC authentication bypass
RADIUS server
RADIUS server
Suggested answer: A, D
Explanation:

Two features of FortiAuthenticator that are used for EAP deployment are certificate authority and

RADIUS server. Certificate authority allows FortiAuthenticator to issue and manage digital certificates for EAP methods that require certificate-based authentication, such as EAP-TLS or PEAP-EAP-TLS.

RADIUS server allows FortiAuthenticator to act as an authentication server for EAP methods that use RADIUS as a transport protocol, such as EAP-GTC or PEAP-MSCHAPV2.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/wireless-802-1x-authentication

asked 18/09/2024
Aur ROULIC
38 questions

Question 15

Report Export Collapse

How can a SAML metada file be used?

To defined a list of trusted user names
To defined a list of trusted user names
To import the required IDP configuration
To import the required IDP configuration
To correlate the IDP address to its hostname
To correlate the IDP address to its hostname
To resolve the IDP realm for authentication
To resolve the IDP realm for authentication
Suggested answer: B
Explanation:

A SAML metadata file can be used to import the required IDP configuration for SAML service provider mode. A SAML metadata file is an XML file that contains information about the identity provider (IDP) and the service provider (SP), such as their entity IDs, endpoints, certificates, and attributes. By importing a SAML metadata file from the IDP, FortiAuthenticator can automatically configure the necessary settings for SAML service provider mode.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/saml-service-provider#saml-metadata

asked 18/09/2024
Bogdan Paun
37 questions

Question 16

Report Export Collapse

A system administrator wants to integrate FortiAuthenticator with an existing identity management system with the goal of authenticating and deauthenticating users into FSSO.

What feature does FortiAuthenticator offer for this type of integration?

The ability to import and export users from CSV files
The ability to import and export users from CSV files
RADIUS learning mode for migrating users
RADIUS learning mode for migrating users
REST API
REST API
SNMP monitoring and traps
SNMP monitoring and traps
Suggested answer: C
Explanation:

REST API is a feature that allows FortiAuthenticator to integrate with an existing identity management system with the goal of authenticating and deauthenticating users into FSSO. REST API stands for Representational State Transfer Application Programming Interface, which is a method of exchanging data between different systems using HTTP requests and responses. FortiAuthenticator provides a REST API that can be used by external systems to perform various actions, such as creating, updating, deleting, or querying users and groups, or sending FSSO logon or logoff events.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/rest-api

asked 18/09/2024
RANA MANSOUR
39 questions

Question 17

Report Export Collapse

Which statement about captive portal policies is true, assuming a single policy has been defined?

Portal policies apply only to authentication requests coming from unknown RADIUS clients
Portal policies apply only to authentication requests coming from unknown RADIUS clients
All conditions in the policy must match before a user is presented with the captive portal.
All conditions in the policy must match before a user is presented with the captive portal.
Conditions in the policy apply only to wireless users.
Conditions in the policy apply only to wireless users.
Portal policies can be used only for BYODs.
Portal policies can be used only for BYODs.
Suggested answer: B
Explanation:

Captive portal policies are used to define the conditions and settings for presenting a captive portal to users who need to authenticate before accessing the network. A captive portal policy consists of a set of conditions and a set of actions. The conditions can be based on various attributes, such as source IP address, MAC address, user group, device type, or RADIUS client. The actions can include redirecting the user to a specific portal, applying a specific authentication method, or assigning a specific VLAN or firewall policy. A single policy can have multiple conditions, and all conditions in the policy must match before a user is presented with the captive portal.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/portal-services#captive-portal-policies

asked 18/09/2024
Prenolan Kamiah
45 questions

Question 18

Report Export Collapse

Which interface services must be enabled for the SCEP client to connect to Authenticator?

OCSP
OCSP
REST API
REST API
SSH
SSH
HTTP/HTTPS
HTTP/HTTPS
Suggested answer: D
Explanation:

HTTP/HTTPS are the interface services that must be enabled for the SCEP client to connect to FortiAuthenticator. SCEP stands for Simple Certificate Enrollment Protocol, which is a method of requesting and issuing digital certificates over HTTP or HTTPS. FortiAuthenticator supports SCEP as a certificate authority (CA) and can process SCEP requests from SCEP clients. To enable SCEP on FortiAuthenticator, the HTTP or HTTPS service must be enabled on the interface that receives the SCEP requests.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/certificate-management#scep

asked 18/09/2024
Kinzonji Tavares
46 questions

Question 19

Report Export Collapse

Which statement about the assignment of permissions for sponsor and administrator accounts is true?

Only administrator accounts permissions are assigned using admin profiles.
Only administrator accounts permissions are assigned using admin profiles.
Sponsor permissions are assigned using group settings.
Sponsor permissions are assigned using group settings.
Administrator capabilities are assigned by applying permission sets to admin groups.
Administrator capabilities are assigned by applying permission sets to admin groups.
Both sponsor and administrator account permissions are assigned using admin profiles.
Both sponsor and administrator account permissions are assigned using admin profiles.
Suggested answer: D
Explanation:

Both sponsor and administrator account permissions are assigned using admin profiles. An admin profile is a set of permissions that defines what actions an administrator or a sponsor can perform on

FortiAuthenticator. An admin profile can be assigned to an admin group or an individual admin user.

A sponsor is a special type of admin user who can create and manage guest accounts on behalf of other users.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/administrators#admin-profiles

asked 18/09/2024
Georgios Kavvalakis
36 questions

Question 20

Report Export Collapse

Which two protocols are the default management access protocols for administrative access for FortiAuthenticator? (Choose two)

Telnet
Telnet
HTTPS
HTTPS
SSH
SSH
SNMP
SNMP
Suggested answer: B, C
Explanation:

HTTPS and SSH are the default management access protocols for administrative access for FortiAuthenticator. HTTPS allows administrators to access the web-based GUI of FortiAuthenticator using a web browser and a secure connection. SSH allows administrators to access the CLI of FortiAuthenticator using an SSH client and an encrypted connection. Both protocols require the administrator to enter a valid username and password to log in.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administration-guide/906179/system-settings#management-access

asked 18/09/2024
Zoltan Mate
28 questions
Total 47 questions
Go to page: of 5