ExamGecko
Home / Fortinet / NSE6_FAC-6.4 / List of questions
Ask Question

Fortinet NSE6_FAC-6.4 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

You are the administrator of a global enterprise with three FortiAuthenticator devices. You would like to deploy them to provide active-passive HA at headquarters, with geographically distributed load balancing.

What would the role settings be?

One standalone and two load balancers B One standalone primary, one cluster member, and one load balancer
One standalone and two load balancers B One standalone primary, one cluster member, and one load balancer
Two cluster members and one backup
Two cluster members and one backup
Two cluster members and one load balancer
Two cluster members and one load balancer
Suggested answer: B
Explanation:

To deploy three FortiAuthenticator devices to provide active-passive HA at headquarters, with geographically distributed load balancing, the role settings would be:

One standalone primary, which acts as the master device for HA and load balancing One cluster member, which acts as the backup device for HA and load balancing One load balancer, which acts as a remote device that forwards authentication requests to the primary or cluster member device

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/high-availability#ha-and-load-balancing

asked 18/09/2024
Amarjeet Saini
41 questions

Question 22

Report Export Collapse

An administrator has an active directory (AD) server integrated with FortiAuthenticator. They want members of only specific AD groups to participate in FSSO with their corporate FortiGate firewalls.

How does the administrator accomplish this goal?

Configure a FortiGate filter on FortiAuthenticatoc
Configure a FortiGate filter on FortiAuthenticatoc
Configure a domain groupings list to identify the desired AD groups.
Configure a domain groupings list to identify the desired AD groups.
Configure fine-grained controls on FortiAuthenticator to designate AD groups.
Configure fine-grained controls on FortiAuthenticator to designate AD groups.
Configure SSO groups and assign them to FortiGate groups.
Configure SSO groups and assign them to FortiGate groups.
Suggested answer: D
Explanation:

To allow members of only specific AD groups to participate in FSSO with their corporate FortiGate firewalls, the administrator can configure SSO groups and assign them to FortiGate groups. SSO groups are groups of users or devices that are defined on FortiAuthenticator based on various criteria, such as user group membership, source IP address, MAC address, or device type. FortiGate groups are groups of users or devices that are defined on FortiGate based on various criteria, such as user group membership, firewall policy, or authentication method. By mapping SSO groups to FortiGate groups, the administrator can control which users or devices can access the network resources protected by FortiGate.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/single-sign-on#sso-groups

asked 18/09/2024
Dilara Unsal
35 questions

Question 23

Report Export Collapse

Which FSSO discovery method transparently detects logged off users without having to rely on external features such as WMI polling?

Windows AD polling
Windows AD polling
FortiClient SSO Mobility Agent
FortiClient SSO Mobility Agent
Radius Accounting
Radius Accounting
DC Polling
DC Polling
Suggested answer: B
Explanation:

FortiClient SSO Mobility Agent is a FSSO discovery method that transparently detects logged off users without having to rely on external features such as WMI polling. FortiClient SSO Mobility Agent is a software agent that runs on Windows devices and communicates with FortiAuthenticator to provide FSSO information. The agent can detect user logon and logoff events without using WMI polling, which can reduce network traffic and improve performance.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/single-sign-on#forticlient-sso-mobility-agent

asked 18/09/2024
Henri Geimer
40 questions

Question 24

Report Export Collapse

When generating a TOTP for two-factor authentication, what two pieces of information are used by the algorithm to generate the TOTP?

UUID and time
UUID and time
Time and seed
Time and seed
Time and mobile location
Time and mobile location
Time and FortiAuthenticator serial number
Time and FortiAuthenticator serial number
Suggested answer: B
Explanation:

TOTP stands for Time-based One-time Password, which is a type of OTP that is generated based on two pieces of information: time and seed. The time is the current timestamp that is synchronized between the client and the server. The seed is a secret key that is shared between the client and the server. The TOTP algorithm combines the time and the seed to generate a unique and short-lived OTP that can be used for two-factor authentication.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/two-factor-authentication#totp

asked 18/09/2024
Arnaldo Martinez 2-30793
48 questions

Question 25

Report Export Collapse

Which of the following is an OATH-based standard to generate event-based, one-time password tokens?

HOTP
HOTP
SOTP
SOTP
TOTP
TOTP
OLTP
OLTP
Suggested answer: A
Explanation:

Reference: https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/fortitoken.pdf HOTP stands for HMAC-based One-time Password, which is an OATH-based standard to generate event-based OTP tokens. HOTP uses a cryptographic hash function called HMAC (Hash-based Message Authentication Code) to generate OTPs based on two pieces of information: a secret key and a counter. The counter is incremented by one after each OTP generation, creating an eventbased sequence of OTPs.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/two-factor-authentication#hotp

asked 18/09/2024
Ackim Sanuka
40 questions

Question 26

Report Export Collapse

When configuring syslog SSO, which three actions must you take, in addition to enabling the syslog SSO method? (Choose three.)

Enable syslog on the FortiAuthenticator interface.
Enable syslog on the FortiAuthenticator interface.
Define a syslog source.
Define a syslog source.
Select a syslog rule for message parsing.
Select a syslog rule for message parsing.
Set the same password on both the FortiAuthenticator and the syslog server.
Set the same password on both the FortiAuthenticator and the syslog server.
Set the syslog UDP port on FortiAuthenticator.
Set the syslog UDP port on FortiAuthenticator.
Suggested answer: B, C, E
Explanation:

To configure syslog SSO, three actions must be taken, in addition to enabling the syslog SSO method:

Define a syslog source, which is a device that sends syslog messages to FortiAuthenticator containing user logon or logoff information.

Select a syslog rule for message parsing, which is a predefined or custom rule that defines how to extract the user name, IP address, and logon or logoff action from the syslog message.

Set the syslog UDP port on FortiAuthenticator, which is the port number that FortiAuthenticator listens on for incoming syslog messages.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/single-sign-on#syslog-sso

asked 18/09/2024
Mark Espena
29 questions

Question 27

Report Export Collapse

What capability does the inbound proxy setting provide?

It allows FortiAuthenticator to determine the origin source IP address after traffic passes through a proxy for system access,
It allows FortiAuthenticator to determine the origin source IP address after traffic passes through a proxy for system access,
It allows FortiAuthenticator to act as a proxy for remote authentication servers.
It allows FortiAuthenticator to act as a proxy for remote authentication servers.
It allows FortiAuthenticator the ability to round robin load balance remote authentication servers.
It allows FortiAuthenticator the ability to round robin load balance remote authentication servers.
It allows FortiAuthenticator system access to authenticating users, based on a geo IP address designation.
It allows FortiAuthenticator system access to authenticating users, based on a geo IP address designation.
Suggested answer: A
Explanation:

The inbound proxy setting provides the ability for FortiAuthenticator to determine the origin source

IP address after traffic passes through a proxy for system access. The inbound proxy setting allows FortiAuthenticator to use the X-Forwarded-For header in the HTTP request to identify the original client IP address. This can help FortiAuthenticator apply the correct authentication policy or portal policy based on the source IP address.

Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 906179/system-settings#inbound-proxy

asked 18/09/2024
Osman Rana
37 questions

Question 28

Report Export Collapse

Which two statement about the RADIUS service on FortiAuthenticator are true? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 29

Report Export Collapse

Which two statements about the self-service portal are true? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 30

Report Export Collapse

A digital certificate, also known as an X.509 certificate, contains which two pieces of information?

(Choose two.)

Become a Premium Member for full access
  Unlock Premium Member
Total 47 questions
Go to page: of 5