NSE4_JM
Quiz
•
Computers
•
1st - 2nd Grade
•
Hard

JMTelcom JMTelcom
Used 1+ times
FREE Resource
Enhance your content
9 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which three actions are valid for static URL filtering?
Allow
Block
Exempt
Shape
Warning
2.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate?
Trusted authentication
FortiTelemetry
SSH
Trusted host
HTTPS
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which is not a FortiGate feature?
Database auditing
Intrusion prevention
Web filtering
Application control
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What actions are possible with Application Control?
Warn
Allow
Block
Traffic Shaping
Quarantine
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An administrator has configured a route-based site-to-site IPsec VPN. Which statement is correct regarding this IPsec VPN configuration?
The IPsec firewall policies must be placed at the top of the list.
This VPN cannot be used as a part of a hub and spoke topology.
Routes are automatically created based on the quick mode selectors.
A virtual IPsec interface is automatically created after the Phase 1 configuration is completed.
6.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What attributes are always included in a log header?
policyid
level
user
time
subtype
7.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which of the following settings can be configured per VDOM?
Operating mode (NAT/route or transparent)
Static routes
Hostname
System time
Firewall Policies
8.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which user group types does FortiGate support for firewall authentication?
RSSO
Firewall
LDAP
NTLM
FSSO
9.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which best describes the mechanism of a TCP SYN flood?
The attackers keeps open many connections with slow data transmission so that other clients cannot start new connections.
The attackers sends a packets designed to sync with the FortiGate
The attacker sends a specially crafted malformed packet, intended to crash the target by exploiting its parser.
The attacker starts many connections, but never acknowledges to fully form them
Similar Resources on Wayground
10 questions
Mulai karir sebagai Network Engineer dengan MikroTik
Quiz
•
KG - Professional Dev...
12 questions
M7 & M8
Quiz
•
1st - 3rd Grade
10 questions
Virus Informáticos 2024
Quiz
•
2nd Grade
10 questions
Segurança Física e Lógica
Quiz
•
1st Grade
10 questions
Hackers and Viruses
Quiz
•
1st Grade
10 questions
Nowe technologie
Quiz
•
1st - 6th Grade
9 questions
NAVEGADORES WEB
Quiz
•
1st - 12th Grade
9 questions
Convocatoria 2021
Quiz
•
1st - 12th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Verbs
Quiz
•
2nd Grade
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
18 questions
D189 1st Grade OG 1c Concept 37-38
Quiz
•
1st Grade
20 questions
addition
Quiz
•
1st - 3rd Grade
20 questions
Subject and predicate in sentences
Quiz
•
1st - 3rd Grade
20 questions
Place Value
Quiz
•
KG - 3rd Grade
10 questions
Exploring Force and Motion Concepts
Interactive video
•
1st - 5th Grade
30 questions
Multiplication Facts 1-12
Quiz
•
2nd - 5th Grade