NSE4_JM

NSE4_JM

1st - 2nd Grade

9 Qs

quiz-placeholder

Similar activities

Quiz Fortinet module Antivirus

Quiz Fortinet module Antivirus

1st - 12th Grade

8 Qs

Communication

Communication

KG - University

8 Qs

Esercizi 1 di 3 (sezione 3): sicurezza in rete

Esercizi 1 di 3 (sezione 3): sicurezza in rete

1st - 3rd Grade

7 Qs

Post-Test Training Fortigate

Post-Test Training Fortigate

1st - 3rd Grade

14 Qs

Domain 1/Objective 3.3: Secure Network Designs

Domain 1/Objective 3.3: Secure Network Designs

2nd Grade

10 Qs

Mentoring2 CompTia Network+

Mentoring2 CompTia Network+

1st - 10th Grade

10 Qs

Digital logic

Digital logic

1st - 10th Grade

10 Qs

IB CS: Chap 1-4 Revision

IB CS: Chap 1-4 Revision

KG - University

10 Qs

NSE4_JM

NSE4_JM

Assessment

Quiz

Computers

1st - 2nd Grade

Hard

Created by

JMTelcom JMTelcom

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which three actions are valid for static URL filtering?

Allow

Block

Exempt

Shape

Warning

2.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate?

Trusted authentication

FortiTelemetry

SSH

Trusted host

HTTPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which is not a FortiGate feature?

Database auditing

Intrusion prevention

Web filtering

Application control

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What actions are possible with Application Control?

Warn

Allow

Block

Traffic Shaping

Quarantine

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

An administrator has configured a route-based site-to-site IPsec VPN. Which statement is correct regarding this IPsec VPN configuration?

The IPsec firewall policies must be placed at the top of the list.

This VPN cannot be used as a part of a hub and spoke topology.

Routes are automatically created based on the quick mode selectors.

A virtual IPsec interface is automatically created after the Phase 1 configuration is completed.

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What attributes are always included in a log header?

policyid

level

user

time

subtype

7.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which of the following settings can be configured per VDOM?

Operating mode (NAT/route or transparent)

Static routes

Hostname

System time

Firewall Policies

8.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which user group types does FortiGate support for firewall authentication?

RSSO

Firewall

LDAP

NTLM

FSSO

9.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which best describes the mechanism of a TCP SYN flood?

The attackers keeps open many connections with slow data transmission so that other clients cannot start new connections.

The attackers sends a packets designed to sync with the FortiGate

The attacker sends a specially crafted malformed packet, intended to crash the target by exploiting its parser.

The attacker starts many connections, but never acknowledges to fully form them