Free NSE4_FGT-5.6 Exam Braindumps (page: 13)

Page 12 of 47

Which of the following authentication methods can be used for SSL VPN authentication? (Choose two.)

  1. Local password authentication
  2. LDAP
  3. FortiTelemetry
  4. FSSO
  5. Extended Authentication (XAuth)

Answer(s): A,B



Which of the following actions can be used with the FortiGuard quota feature? (Choose three.)

  1. Allow
  2. Block
  3. Monitor
  4. Warning
  5. Authenticate

Answer(s): A,B,C



You are tasked to architect a new IPsec deployment with the following criteria:
- There are two HQ sites that all satellite offices must connect to.
- The satellite offices do not need to communicate directly with other satellite offices.
- No dynamic routing will be used.
- The design should minimize the number of tunnels being configured.
Which topology should be used to satisfy all of the requirements? Response:

  1. Redundant
  2. Hub-and-spoke
  3. Partial mesh
  4. Fully meshed

Answer(s): B



Which statements are true regarding local logging to disk? (Choose two.)

  1. By default, logs older than seven (7) days are deleted from disk.
  2. You can configure performance statistic logging for local disk logging to occur every 1-15 minutes.
  3. If local disk logging is disabled, logs display in the Fortiview dashboards in real-time only.
  4. Disk logging is supported on all FortiGate models.
  5. Disk logging cannot be enabled if remote logging to FortiAnalyzer is configured.

Answer(s): A,B






Post your Comments and Discuss Fortinet NSE4_FGT-5.6 exam with other Community members:

NSE4_FGT-5.6 Discussions & Posts