ExamGecko
Home / Fortinet / NSE6_WCS-6.4 / List of questions
Ask Question

Fortinet NSE6_WCS-6.4 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

A customer needs a recursive DNS for AWS VPC and on-premises networks, The customer also wants to create conditional forwarding rules and DNS endpoints to resolve custom names in AWS private hosted zones and on-premises

DNS servers.

Which Amazon service can be used to achieve this scenario?

AWS mapping service
AWS mapping service
Amazon route 53
Amazon route 53
AWS DynamoOB service
AWS DynamoOB service
AWS Lambda service
AWS Lambda service
Suggested answer: B
asked 18/09/2024
Tomislav Bodrozic
41 questions

Question 12

Report Export Collapse

Which product you Can use as AWS WAF web access control lists (web ACLS) to minimize the effects Of a DDOS attack?

AWS Protector
AWS Protector
AWS GuardDuty
AWS GuardDuty
AWS Inspector
AWS Inspector
AWS Shield
AWS Shield
Suggested answer: D
asked 18/09/2024
Venish Arumugam
41 questions

Question 13

Report Export Collapse

As part of the security plan you have been tasked with deploying a FortiGate in AWS.

Which two are the security responsibility of the customer in a cloud environment? (Choose two.)

Virtualization platform
Virtualization platform
Traffic encryption
Traffic encryption
User management
User management
Storage infrastructure
Storage infrastructure
Suggested answer: B, C
asked 18/09/2024
San Min Oo
49 questions

Question 14

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_WCS-6.4 image Question 14 26902 09182024190659000000

An administrator configured a FortiGate device to connect to me AWS API to retrieve resource values from the AWS console to create dynamic objects tor the FortiGate policies. The administrator is unable to retrieve AWS dynamic objects on FortiGate.

Which three reasons can explain btw? (Choose three.)

AWS was not able to validate credentials provided by the AWS Lab SON connector.
AWS was not able to validate credentials provided by the AWS Lab SON connector.
The AWS Lab SON connector failed to connect on port 401.
The AWS Lab SON connector failed to connect on port 401.
The AWS Lab SON connector failed to retrieve the instance list.
The AWS Lab SON connector failed to retrieve the instance list.
The AWS API call is not supported on XML version I . O.
The AWS API call is not supported on XML version I . O.
The AWS Lab SON connector is configured with an invalid AWS access or secret key
The AWS Lab SON connector is configured with an invalid AWS access or secret key
Suggested answer: A, C, E
asked 18/09/2024
Christian Gyssels
46 questions

Question 15

Report Export Collapse

Which statement is true about an Elastic Network Interface (ENI)?

Once ENI detaches from one instance. it cannot reattach to another instance.
Once ENI detaches from one instance. it cannot reattach to another instance.
You can detach primary ENI from an AWS instance.
You can detach primary ENI from an AWS instance.
An ENI cannot move between AZs.
An ENI cannot move between AZs.
When you move an ENI, network traffic is not redirected to the new instance.
When you move an ENI, network traffic is not redirected to the new instance.
Suggested answer: C
asked 18/09/2024
Juan Gonzalez
43 questions

Question 16

Report Export Collapse

Which two statements are correct about AWS Network Access Control Lists (NACLS)? (Choose two.)

NACLs are stateless: responses to allowed inbound traffic are subject to the rules for outbound traffic.
NACLs are stateless: responses to allowed inbound traffic are subject to the rules for outbound traffic.
An NACL has separate inbound and outbound rules, and each rule can either allow or deny traffic.
An NACL has separate inbound and outbound rules, and each rule can either allow or deny traffic.
By default. each custom NACL allows all inbound and outbound traffic unless you add new rules,
By default. each custom NACL allows all inbound and outbound traffic unless you add new rules,
VPC automatically comes with a modifiable default NACL, and by default it denies all inbound and outbound IPv4 traffic.
VPC automatically comes with a modifiable default NACL, and by default it denies all inbound and outbound IPv4 traffic.
Suggested answer: A, B
asked 18/09/2024
Junwei Li
41 questions

Question 17

Report Export Collapse

Which features are only available on FortiWeb when compared to Fortinet Managed Rules for AWS WAF?

FortiWeb meets PCI 6.6 compliance.
FortiWeb meets PCI 6.6 compliance.
FortiWeb can scan web application vulnerabilities.
FortiWeb can scan web application vulnerabilities.
FortiWeb provides a WAF subscription (FortiGuard) option.
FortiWeb provides a WAF subscription (FortiGuard) option.
FortiWeb provides web application attack signatures.
FortiWeb provides web application attack signatures.
Suggested answer: B
asked 18/09/2024
Ali S Zahedi
44 questions

Question 18

Report Export Collapse

Which three Fortinet products are available in Amazon Web Services in both on-demand and bring your own license (BYOL) formats? (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_WCS-6.4 image Question 19 26907 09182024190659000000

An administrator wants to update the database package from the Internet to a database server configured with IP address Which statement is correct about traffic from server IP address 10.0.1.7 to the internet. based on the diagrarm?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

An MSSP deployed 16 FortiGate VMS With the default AWS security groups and network access lists using an on-demand license from Amazon Web Services (AWS) Marketplace. They are using a thirdparty configuration backup application to back up and track changes for the FortiGate configurations.

It can connect to the FortiGate devices using only the SSH protocol, A customer is using the correct username and password configured on the FortiGate devices. but they are unable to log in using the SSH protocol.

What can be the reason Why this authentication is failing?

Become a Premium Member for full access
  Unlock Premium Member
Total 30 questions
Go to page: of 3
Search

Related questions