Free NSE6_FAC-6.4 Exam Braindumps (page: 3)

Page 2 of 13

You have implemented two-factor authentication to enhance security to sensitive enterprise systems.

How could you bypass the need for two-factor authentication for users accessing form specific secured networks?

  1. Create an admin realm in the authentication policy
  2. Specify the appropriate RADIUS clients in the authentication policy
  3. Enable Adaptive Authentication in the portal policy
  4. Enable the Resolve user geolocation from their IP address option in the authentication policy.

Answer(s): C

Explanation:

Adaptive Authentication is a feature that allows administrators to bypass the need for two-factor authentication for users accessing from specific secured networks. Adaptive Authentication uses geolocation information from IP addresses to determine whether a user is accessing from a trusted network or not. If the user is accessing from a trusted network, FortiAuthenticator can skip the second factor of authentication and grant access based on the first factor only.


Reference:

https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administration- guide/906179/authentication-policies#adaptive-authentication



Which network configuration is required when deploying FortiAuthenticator for portal services?

  1. FortiAuthenticator must have the REST API access enable on port1
  2. One of the DNS servers must be a FortiGuard DNS server
  3. Fortigate must be setup as default gateway for FortiAuthenticator
  4. Policies must have specific ports open between FortiAuthenticator and the authentication clients

Answer(s): D

Explanation:

When deploying FortiAuthenticator for portal services, such as guest portal, sponsor portal, user portal or FortiToken activation portal, the network configuration must allow specific ports to be open between FortiAuthenticator and the authentication clients. These ports are:

TCP 80 for HTTP access

TCP 443 for HTTPS access

TCP 389 for LDAP access

TCP 636 for LDAPS access

UDP 1812 for RADIUS authentication

UDP 1813 for RADIUS accounting


Reference:

https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administration- guide/906179/portal-services#network-configuration



You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.

What can cause this issue?

  1. FortiToken 200 license has expired
  2. One of the FortiAuthenticator devices in the active-active cluster has failed
  3. Time drift between FortiAuthenticator and hardware tokens
  4. FortiAuthenticator has lost contact with the FortiToken Cloud servers

Answer(s): C

Explanation:

One possible cause of the issue is time drift between FortiAuthenticator and hardware tokens. Time drift occurs when the internal clocks of FortiAuthenticator and hardware tokens are not synchronized. This can result in mismatched one-time passwords (OTPs) generated by the hardware tokens and expected by FortiAuthenticator. To prevent this issue, FortiAuthenticator provides a time drift tolerance option that allows a certain number of seconds of difference between the clocks.


Reference:

https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administration- guide/906179/two-factor-authentication#time-drift-tolerance



Why would you configure an OCSP responder URL in an end-entity certificate?

  1. To designate the SCEP server to use for CRL updates for that certificate
  2. To identify the end point that a certificate has been assigned to
  3. To designate a server for certificate status checking
  4. To provide the CRL location for the certificate

Answer(s): C

Explanation:

An OCSP responder URL in an end-entity certificate is used to designate a server for certificate status checking. OCSP stands for Online Certificate Status Protocol, which is a method of verifying whether a certificate is valid or revoked in real time. An OCSP responder is a server that responds to OCSP requests from clients with the status of the certificate in question. The OCSP responder URL in an end-entity certificate points to the location of the OCSP responder that can provide the status of that certificate.


Reference:

https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administration- guide/906179/certificate-management#ocsp-responder






Post your Comments and Discuss Fortinet NSE6_FAC-6.4 exam with other Community members:

NSE6_FAC-6.4 Discussions & Posts