Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following NSE4_FGT-6.2 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is NSE4_FGT-7.2

NSE4_FGT-6.2 Exam Dumps - Fortinet NSE 4 - FortiOS 6.2

Go to page:
Question # 17

Examine this PAC file configuration.

Which of the following statements are true? (Choose two.)

A.

Browsers can be configured to retrieve this PAC file from the FortiGate.

B.

Any web request to the 172.25.120.0/24 subnet is allowed to bypass the proxy.

C.

All requests not made to Fortinet.com or the 172.25.120.0/24 subnet, have to go through altproxy.corp.com: 8060.

D.

Any web request fortinet.com is allowed to bypass the proxy.

Full Access
Question # 18

Which statements about the firmware upgrade process on an active-active HA cluster are true? (Choose two.)

A.

The firmware image must be manually uploaded to each FortiGate.

B.

Only secondary FortiGate devices are rebooted.

C.

Uninterruptable upgrade is enabled by default.

D.

Traffic load balancing is temporally disabled while upgrading the firmware.

Full Access
Question # 19

Examine this FortiGate configuration:

Examine the output of the following debug command:

Based on the diagnostic outputs above, how is the FortiGate handling the traffic for new sessions that require inspection?

A.

It is allowed, but with no inspection

B.

It is allowed and inspected as long as the inspection is flow based

C.

It is dropped.

D.

It is allowed and inspected, as long as the only inspection required is antivirus.

Full Access
Question # 20

Which statement about the policy ID number of a firewall policy is true?

D18912E1457D5D1DDCBD40AB3BF70D5D

A.

It is required to modify a firewall policy using the CLI.

B.

It represents the number of objects used in the firewall policy.

C.

It changes when firewall policies are reordered.

D.

It defines the order in which rules are processed.

Full Access
Question # 21

Which of the following statements about NTLM authentication are correct? (Choose two.)

A.

It is useful when users log in to DCs that are not monitored by a collector agent.

B.

It takes over as the primary authentication method when configured alongside FSSO.

C.

Multi-domain environments require DC agents on every domain controller.

D.

NTLM-enabled web browsers are required.

Full Access
Go to page: