ExamGecko
Home Home / Fortinet / NSE6_FAC-6.4

Fortinet NSE6_FAC-6.4 Practice Test - Questions Answers, Page 4

Question list
Search
Search

What are three key features of FortiAuthenticator? (Choose three)

A.
Identity management device
A.
Identity management device
Answers
B.
Log server
B.
Log server
Answers
C.
Certificate authority
C.
Certificate authority
Answers
D.
Portal services
D.
Portal services
Answers
E.
RSSO Server
E.
RSSO Server
Answers
Suggested answer: A, C, D

Explanation:

FortiAuthenticator is a user and identity management solution that provides strong authentication, wireless 802.1X authentication, certificate management, RADIUS AAA (authentication, authorization, and accounting), and Fortinet Single Sign-On (FSSO). It also offers portal services for guest management, self-service password reset, and device registration. It is not a log server or an RSSO server. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/release-notes

Which method is the most secure way of delivering FortiToken data once the token has been seeded?

A.
Online activation of the tokens through the FortiGuard network
A.
Online activation of the tokens through the FortiGuard network
Answers
B.
Shipment of the seed files on a CD using a tamper-evident envelope
B.
Shipment of the seed files on a CD using a tamper-evident envelope
Answers
C.
Using the in-house token provisioning tool
C.
Using the in-house token provisioning tool
Answers
D.
Automatic token generation using FortiAuthenticator
D.
Automatic token generation using FortiAuthenticator
Answers
Suggested answer: A

Explanation:

Online activation of the tokens through the FortiGuard network is the most secure way of delivering FortiToken data once the token has been seeded because it eliminates the risk of seed files being compromised during transit or storage. The other methods involve physical or manual delivery of seed files which can be intercepted, lost, or stolen. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372403/fortitoken

At a minimum, which two configurations are required to enable guest portal services on FortiAuthenticator? (Choose two)

A.
Configuring a portal policy
A.
Configuring a portal policy
Answers
B.
Configuring at least on post-login service
B.
Configuring at least on post-login service
Answers
C.
Configuring a RADIUS client
C.
Configuring a RADIUS client
Answers
D.
Configuring an external authentication portal
D.
Configuring an external authentication portal
Answers
Suggested answer: A, B

Explanation:

To enable guest portal services on FortiAuthenticator, you need to configure a portal policy that defines the conditions for presenting the guest portal to users and the authentication methods to use. You also need to configure at least one post-login service that defines what actions to take after a user logs in successfully, such as sending an email confirmation, assigning a VLAN, or creating a user account. Configuring a RADIUS client or an external authentication portal are optional steps that depend on your network setup and requirements. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372404/guestmanagement

Which two are supported captive or guest portal authentication methods? (Choose two)

A.
Linkedln
A.
Linkedln
Answers
B.
Apple ID
B.
Apple ID
Answers
C.
Instagram
C.
Instagram
Answers
D.
Email
D.
Email
Answers
Suggested answer: A, D

Explanation:

FortiAuthenticator supports various captive or guest portal authentication methods, including social media login with Linkedln, Facebook, Twitter, Google+, or WeChat; email verification; SMS verification; voucher code; username and password; and MAC address bypass. Apple ID and Instagram are not supported as authentication methods. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372404/guestmanagement/ 372405/authentication-methods

A device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentialis.

In this case, which user idendity discovery method can Fortiauthenticator use?

A.
Syslog messaging or SAML IDP
A.
Syslog messaging or SAML IDP
Answers
B.
Kerberos-base authentication
B.
Kerberos-base authentication
Answers
C.
Radius accounting
C.
Radius accounting
Answers
D.
Portal authentication
D.
Portal authentication
Answers
Suggested answer: D

Explanation:

Portal authentication is a user identity discovery method that can be used when a device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentials. Portal authentication requires users to enter their credentials on a web page before accessing network resources. The other methods are used for transparent identification of domain devices or users. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372406/useridentity-discovery

Which two SAML roles can Fortiauthenticator be configured as? (Choose two)

A.
Idendity provider
A.
Idendity provider
Answers
B.
Principal
B.
Principal
Answers
C.
Assertion server
C.
Assertion server
Answers
D.
Service provider
D.
Service provider
Answers
Suggested answer: A, D

Explanation:

FortiAuthenticator can be configured as a SAML identity provider (IdP) or a SAML service provider (SP). As an IdP, FortiAuthenticator authenticates users and issues SAML assertions to SPs. As an SP, FortiAuthenticator receives SAML assertions from IdPs and grants access to users based on the attributes in the assertions. Principal and assertion server are not valid SAML roles. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372407/saml

What happens when a certificate is revoked? (Choose two)

A.
Revoked certificates cannot be reinstated for any reason
A.
Revoked certificates cannot be reinstated for any reason
Answers
B.
All certificates signed by a revoked CA certificate are automatically revoked
B.
All certificates signed by a revoked CA certificate are automatically revoked
Answers
C.
Revoked certificates are automatically added to the CRL
C.
Revoked certificates are automatically added to the CRL
Answers
D.
External CAs will priodically query Fortiauthenticator and automatically download revoked certificates
D.
External CAs will priodically query Fortiauthenticator and automatically download revoked certificates
Answers
Suggested answer: B, C

Explanation:

When a certificate is revoked, it means that it is no longer valid and should not be trusted by any entity. Revoked certificates are automatically added to the certificate revocation list (CRL) which is published by the issuing CA and can be checked by other parties. If a CA certificate is revoked, all certificates signed by that CA are also revoked and added to the CRL. Revoked certificates can be reinstated if the reason for revocation is resolved, such as a compromised private key being recovered or a misissued certificate being corrected. External CAs do not query FortiAuthenticator for revoked certificates, but they can use protocols such as SCEP or OCSP to exchange certificate information with FortiAuthenticator. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administrationguide/ 372408/certificate-management

You are the administrator of a large network that includes a large local user datadabase on the current Fortiauthenticatior. You want to import all the local users into a new Fortiauthenticator device.

Which method should you use to migrate the local users?

A.
Import users using RADIUS accounting updates.
A.
Import users using RADIUS accounting updates.
Answers
B.
Import the current directory structure.
B.
Import the current directory structure.
Answers
C.
Import users from RADUIS.
C.
Import users from RADUIS.
Answers
D.
Import users using a CSV file.
D.
Import users using a CSV file.
Answers
Suggested answer: D

Explanation:

The best method to migrate local users from one FortiAuthenticator device to another is to export the users from the current device as a CSV file and then import the CSV file into the new device. This method preserves all the user attributes and settings and allows you to modify them if needed before importing. The other methods are not suitable for migrating local users because they either require an external RADIUS server or do not transfer all the user information. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372409/usermanagement

Which three of the following can be used as SSO sources? (Choose three)

A.
FortiClient SSO Mobility Agent
A.
FortiClient SSO Mobility Agent
Answers
B.
SSH Sessions
B.
SSH Sessions
Answers
C.
FortiAuthenticator in SAML SP role
C.
FortiAuthenticator in SAML SP role
Answers
D.
Fortigate
D.
Fortigate
Answers
E.
RADIUS accounting
E.
RADIUS accounting
Answers
Suggested answer: A, D, E

Explanation:

FortiAuthenticator supports various SSO sources that can provide user identity information to other devices in the network, such as FortiGate firewalls or FortiAnalyzer log servers. Some of the supported SSO sources are:

FortiClient SSO Mobility Agent: A software agent that runs on Windows devices and sends user login information to FortiAuthenticator.

FortiGate: A firewall device that can send user login information from various sources, such as FSSO agents, captive portals, VPNs, or LDAP servers, to FortiAuthenticator.

RADIUS accounting: A protocol that can send user login information from RADIUS servers or clients, such as wireless access points or VPN concentrators, to FortiAuthenticator.

SSH sessions and FortiAuthenticator in SAML SP role are not valid SSO sources because they do not provide user identity information to other devices in the network. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372410/singlesign-on

Which two capabilities does FortiAuthenticator offer when acting as a self-signed or local CA?

(Choose two)

A.
Validating other CA CRLs using OSCP
A.
Validating other CA CRLs using OSCP
Answers
B.
Importing other CA certificates and CRLs
B.
Importing other CA certificates and CRLs
Answers
C.
Merging local and remote CRLs using SCEP
C.
Merging local and remote CRLs using SCEP
Answers
D.
Creating, signing, and revoking of X.509 certificates
D.
Creating, signing, and revoking of X.509 certificates
Answers
Suggested answer: B, D

Explanation:

FortiAuthenticator can act as a self-signed or local CA that can issue certificates to users, devices, or other CAs. It can also import other CA certificates and CRLs to trust them and validate their certificates. It can also create, sign, and revoke X.509 certificates for various purposes, such as VPN authentication, web server encryption, or wireless security. It cannot validate other CA CRLs using OCSP or merge local and remote CRLs using SCEP because these are protocols that require communication with external CAs. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administrationguide/ 372408/certificate-management

Total 47 questions
Go to page: of 5