Free Fortinet FCP_FAC_AD-6.5 Exam Questions (page: 2)

Which three of the following can be used as SSO sources? (Choose three.)

  1. RADIUS accounting
  2. FortiClient SSO Mobility Agent
  3. SSH sessions
  4. FortiGate
  5. FortiAuthenticator in SAML SP role

Answer(s): A,B,D

Explanation:

RADIUS accounting can be used by FortiAuthenticator to obtain user identity and session details for SSO.

FortiClient SSO Mobility Agent reports user login events to FortiAuthenticator for SSO.

FortiGate can act as an SSO source by sending user authentication information to FortiAuthenticator.



You have implemented two-factor authentication to enhance security to sensitive enterprise systems.

How could you bypass the need for two-factor authentication for users accessing form specific secured networks?

  1. Enable Adaptive Authentication in the portal policy.
  2. Specify the appropriate RADIUS clients in the authentication policy.
  3. Create an admin realm in the authentication policy.
  4. Enable the Resolve user geolocation from their IP address option in the authentication policy

Answer(s): A

Explanation:

Enabling Adaptive Authentication in the portal policy allows FortiAuthenticator to apply contextual rules, such as bypassing two-factor authentication when users connect from specific secured networks.



When configuring an active-passive HA deployment, what is the recommended data synchronization path?

  1. Dedicated fiber channel
  2. Same VLAN
  3. Dedicated point-to-point VPN connection
  4. Direct cable connection

Answer(s): D

Explanation:

A direct cable connection is the recommended data synchronization path in an active-passive HA deployment because it provides the fastest, most reliable, and secure method for synchronizing data between FortiAuthenticator units without depending on external network infrastructure.



Which FSSO discovery method transparently detects logged off users without having to rely on external features such as WMI polling?

  1. RADIUS accounting
  2. FortiClient SSO mobility agent
  3. DC polling
  4. Windows AD polling

Answer(s): B

Explanation:

The FortiClient SSO Mobility Agent runs on the endpoint and communicates login and logoff events directly to FortiAuthenticator, allowing transparent detection of logged-off users without relying on external mechanisms like WMI polling.



When performing a remote LDAP server integration with FortiAuthenticator, how do server type templates assist with the integration?

  1. They autopopulate the simple and regular bind settings.
  2. They automatically set the LDAP user auto provisioning settings.
  3. They populate the query element fields with defined attribute and class values.
  4. They define the connection security and domain authentication settings for each LDAP server you integrate with.

Answer(s): C

Explanation:

Server type templates in FortiAuthenticator assist LDAP integration by prepopulating the query element fields with the correct attribute and class values for the selected LDAP server type, simplifying configuration and ensuring accurate directory queries.



Which two data items are not synchronized in an active-active HA deployment? (Choose two.)

  1. Group mappings
  2. User certificates
  3. FSSO events
  4. Seeds

Answer(s): C,D

Explanation:

In an active-active HA deployment, FSSO events and seeds are not synchronized between FortiAuthenticator units, as these are instance-specific and typically handled locally on each node.



Refer to the exhibit.



Which functionality does the Enable NTLM option provide?

  1. It allows FortiAuthenticator to message end users using the FortiClient for SSO.
  2. It forces FortiClient users to use two-factor authentication when using FortiClient for SSO.
  3. It prevents users from authenticating to an unauthorized AD server.
  4. It enables tracking and recording all authentications performed through FortiClient.

Answer(s): C

Explanation:

Enabling NTLM authentication in this FortiAuthenticator SSO configuration ensures that user authentication requests are validated against the specified domain, preventing users from authenticating to an unauthorized Active Directory server.



You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.

What can cause this issue?

  1. Time drift between FortiAuthenticator and hardware tokens
  2. The seed value on the tokens was incorrectly updated
  3. Token certificate was added to a CRL
  4. FortiAuthenticator has lost contact with the FortiCloud token provisioning servers

Answer(s): A

Explanation:

If there is time drift between FortiAuthenticator and FortiToken 200 hardware tokens, the one-time passwords generated will no longer match the expected values, causing all two-factor authentication attempts to fail for affected users.






Post your Comments and Discuss Fortinet FCP_FAC_AD-6.5 exam prep with other Community members:

FCP_FAC_AD-6.5 Exam Discussions & Posts