Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following NSE4_FGT-6.4 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is NSE4_FGT-7.2

NSE4_FGT-6.4 Exam Dumps - Fortinet NSE 4 - FortiOS 6.4

Go to page:
Question # 4

Refer to the exhibits.

The SSL VPN connection fails when a user attempts to connect to it. What should the user do to successfully connect to SSL VPN?

A.

Change the SSL VPN port on the client.

B.

Change the Server IP address.

C.

Change the idle-timeout.

D.

Change the SSL VPN portal to the tunnel.

Full Access
Question # 5

Refer to the web filter raw logs.

Based on the raw logs shown in the exhibit, which statement is correct?

A.

Social networking web filter category is configured with the action set to authenticate.

B.

The action on firewall policy ID 1 is set to warning.

C.

Access to the social networking web filter category was explicitly blocked to all users.

D.

The name of the firewall policy is all_users_web.

Full Access
Question # 6

A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added to the physical interface.

Which statements about the VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different subnets.

A.

The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in different subnets.

B.

The two VLAN sub interfaces must have different VLAN IDs.

C.

The two VLAN sub interfaces can have the same VLAN ID, only if they belong to different VDOMs.

D.

The two VLAN sub interfaces can have the same VLAN ID, only if they have IP addresses in the same subnet.

Full Access
Question # 7

What types of traffic and attacks can be blocked by a web application firewall (WAF) profile? (Choose three.)

A.

Traffic to botnetservers

B.

Traffic to inappropriate web sites

C.

Server information disclosure attacks

D.

Credit card data leaks

E.

SQL injection attacks

Full Access
Question # 8

What is the limitation of using a URL list and application control on the same firewall policy, in NGFW policy-based mode?

A.

It limits the scanning of application traffic to the DNS protocol only.

B.

It limits the scanning of application traffic to use parent signatures only.

C.

It limits the scanning of application traffic to the browser-based technology category only.

D.

It limits the scanning of application traffic to the application category only.

Full Access
Go to page: