Download Fortinet.NSE5.PracticeTest.2018-04-02.181q.vcex

Download Exam

File Info

Exam Fortinet Network Security Analyst
Number NSE5
File Name Fortinet.NSE5.PracticeTest.2018-04-02.181q.vcex
Size 2 MB
Posted Apr 02, 2018
Download Fortinet.NSE5.PracticeTest.2018-04-02.181q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Encrypted backup files provide which of the following benefits? (Select all that apply.)


  1. Integrity of the backup file is protected since it cannot be easily modified when encrypted.
  2. Prevents the backup file from becoming corrupted.
  3. Protects details of the device's configuration settings from being discovered while the backup file is in transit. For example, transferred to a data centers for system recovery.
  4. A copy of the encrypted backup file is automatically pushed to the FortiGuard Distribution Service (FDS) for disaster recovery purposes. If the backup file becomes corrupt it can be retrieved through FDS.
  5. Fortinet Technical Support can recover forgotten passwords with a backdoor passphrase.
Correct answer: AC



Question 2

The FortiGate unit’s GUI provides a link to update the firmware. 
Clicking this link will perform which of the following actions?


  1. It will connect to the Fortinet Support site where the appropriate firmware version can be selected.
  2. It will send a request to the FortiGuard Distribution Network so that the appropriate firmware version can be pushed down to the FortiGate unit.
  3. It will present a prompt to allow browsing to the location of the firmware file.
  4. It will automatically connect to the Fortinet Support site to download the most recent firmware version for the FortiGate unit.
Correct answer: C



Question 3

Which of the following products is designed to manage multiple FortiGate devices?


  1. FortiGate device
  2. FortiAnalyzer device
  3. FortiClient device
  4. FortiManager device
  5. FortiMail device
  6. FortiBridge device
Correct answer: D



Question 4

Which of the following products provides dedicated hardware to analyze log data from multiple FortiGate devices?


  1. FortiGate device
  2. FortiAnalyzer device
  3. FortiClient device
  4. FortiManager device
  5. FortiMail device
  6. FortiBridge device
Correct answer: B



Question 5

Which of the following are valid FortiGate device interface methods for handling DNS requests? (Select all that apply.)


  1. Forward-only
  2. Non-recursive
  3. Recursive
  4. Iterative
  5. Conditional-forward
Correct answer: ABC



Question 6

The default administrator profile that is assigned to the default "admin" user on a FortGate device is:____________________.


  1. trusted-admin
  2. super_admin
  3. super_user
  4. admin
  5. fortinet-root
Correct answer: B



Question 7

Which of the following logging options are supported on a FortiGate unit? (Select all that apply.)


  1. LDAP
  2. Syslog
  3. FortiAnalyzer
  4. Local disk and/or memory
Correct answer: BCD



Question 8

In order to match an identity-based policy, the FortiGate unit checks the IP information. Once inside the policy, the following logic is followed:


  1. First, a check is performed to determine if the user’s login credentials are valid. Next, the user is checked to determine if they belong to any of the groups defined for that policy. Finally, user restrictions are determined and port, time, and UTM profiles are applied.
  2. First, user restrictions are determined and port, time, and UTM profiles are applied. Next, a check is performed to determine if the user’s login credentials are valid. Finally, the user is checked to determine if they belong to any of the groups defined for that policy.
  3. First, the user is checked to determine if they belong to any of the groups defined for that policy. Next, user restrictions are determined and port, time, and UTM profiles are applied. Finally, a check is performed to determine if the user’s login credentials are valid.
Correct answer: A



Question 9

Which of the following statements regarding the firewall policy authentication timeout is true?


  1. The authentication timeout is an idle timeout. This means that the FortiGate unit will consider a user to be “idle” if it does not see any packets coming from the user’s source IP.
  2. The authentication timeout is a hard timeout. This means that the FortiGate unit will remove the temporary policy for this user’s source IP after this timer has expired.
  3. The authentication timeout is an idle timeout. This means that the FortiGate unit will consider a user to be “idle” if it does not see any packets coming from the user’s source MAC.
  4. The authentication timeout is a hard timeout. This means that the FortiGate unit will remove the temporary policy for this user’s source MAC after this timer has expired.
Correct answer: A



Question 10

Two-factor authentication is supported using the following methods? (Select all that apply.)


  1. FortiToken
  2. Email
  3. SMS phone message
  4. Code books
Correct answer: ABC









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files