NSE4_JM

NSE4_JM

1st - 2nd Grade

9 Qs

quiz-placeholder

Similar activities

Partner event Game 1

Partner event Game 1

1st Grade

8 Qs

Gestión de la Seguridad de TI

Gestión de la Seguridad de TI

KG - University

10 Qs

Virtual Private Network

Virtual Private Network

1st - 3rd Grade

8 Qs

VMUG Puerto Rico

VMUG Puerto Rico

1st Grade

6 Qs

Questionário 001 - Home-Office & VPNs

Questionário 001 - Home-Office & VPNs

1st - 12th Grade

14 Qs

Windows 10 review (standard)

Windows 10 review (standard)

KG - University

9 Qs

TEMA 6: TRABAJANDO CON SERVICIOS DE RED

TEMA 6: TRABAJANDO CON SERVICIOS DE RED

1st - 3rd Grade

10 Qs

computer

computer

KG - University

10 Qs

NSE4_JM

NSE4_JM

Assessment

Quiz

Computers

1st - 2nd Grade

Hard

Created by

JMTelcom JMTelcom

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which three actions are valid for static URL filtering?

Allow

Block

Exempt

Shape

Warning

2.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate?

Trusted authentication

FortiTelemetry

SSH

Trusted host

HTTPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which is not a FortiGate feature?

Database auditing

Intrusion prevention

Web filtering

Application control

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What actions are possible with Application Control?

Warn

Allow

Block

Traffic Shaping

Quarantine

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

An administrator has configured a route-based site-to-site IPsec VPN. Which statement is correct regarding this IPsec VPN configuration?

The IPsec firewall policies must be placed at the top of the list.

This VPN cannot be used as a part of a hub and spoke topology.

Routes are automatically created based on the quick mode selectors.

A virtual IPsec interface is automatically created after the Phase 1 configuration is completed.

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What attributes are always included in a log header?

policyid

level

user

time

subtype

7.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which of the following settings can be configured per VDOM?

Operating mode (NAT/route or transparent)

Static routes

Hostname

System time

Firewall Policies

8.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which user group types does FortiGate support for firewall authentication?

RSSO

Firewall

LDAP

NTLM

FSSO

9.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which best describes the mechanism of a TCP SYN flood?

The attackers keeps open many connections with slow data transmission so that other clients cannot start new connections.

The attackers sends a packets designed to sync with the FortiGate

The attacker sends a specially crafted malformed packet, intended to crash the target by exploiting its parser.

The attacker starts many connections, but never acknowledges to fully form them