Ensurepass

QUESTION 1

Which of the following pieces of information can be included in the Destination Address field of a firewall policy? (Select all that apply.)

 

A.

An IP address pool.

B.

A virtual IP address.

C.

An actual IP address or an IP address group.

D.

An FQDN or Geographic value(s).

 

Correct Answer: BCD

 

 

QUESTION 2

You wish to create a firewall policy t
hat applies only to traffic intended for your web server. The server has an IP address of 192.168.2.2 and belongs to a class C subnet. When defining the firewall address for use in this policy, which one of the following addressing formats is correct?

 

A.

192.168.2.0 / 255.255.255.0

B.

192.168.2.2 / 255.255.255.0

C.

192.168.2.0 / 255.255.255.255

D.

192.168.2.2 / 255.255.255.255

 

Correct Answer: D

 

 

QUESTION 3

Examine the exhibit shown below; then answer the question following it. Which of the following statements best describes the green status indicators that appear next to the different FortiGuard Distribution Network services as illustrated in the exhibit?

 

clip_image001

 

A.

They indicate that the FortiGate unit is able to connect to the FortiGuard Distribution Network.

B.

They indicate that the FortiGate unit has the latest updates that are available from the FortiGuard Distribution Network.

C.

They indicate that updates are available and should be downloaded from the FortiGuard Distribution Network to the FortiGate unit.

D.

They indicate that the FortiGate unit is in the process of downloading updates from the FortiGuard Distribution Network.

 

Correct Answer: A

 

 

QUESTION 4

Each UTM feature has configurable UTM objects such as sensors, profiles or lists that define how the feature will function. How are UTM features applied to traffic?

 

A.

One or more UTM features are enabled in a firewall policy.

B.

In the system configuration for that UTM feature, you can identify the policies to which the feature is to be applied.

C.

Enable the appropriate UTM objects and identify one of them as the default.

D.

For each UTM object, identify which policy will use it.

 

Correct Answer: A

 

 

QUESTION 5

The command structure of the FortiGate CLI consists of commands, objects, branches, tables, and parameters. Which of the following items describes user?

 

A.

A command.

B.

An object.

C.

A table.

D.

A parameter.

 

Correct Answer: B

 

 

QUESTION 6

Which of the following is an advantage of using SNMP v3 instead of SNMP v1/v2 when querying the FortiGate unit?

 

A.

Packet encryption

B.

MIB-based report uploads

C.

SNMP access limits through access lists

D.

Running SNMP service on a non-standard port is possible

 

Correct Answer: A

 

 

QUESTION 7

Which of the following methods can be used to access the CLI? (Select all that apply.)

 

A.

By using a direct connection to a serial console.

B.

By using the CLI console window in the GUI.

C.

By using an SSH connection.

D.

By using a Telnet connection.

Correct Answer: ABCD

 

 

QUESTION 8

Which of the following regular expression patterns will make the terms “confidential data” case insensitive?

 

A.

[confidential data]

B.

/confidential data/i

C.

i/confidential data/

D.

“confidential data”

E.

/confidential data/c

 

Correct Answer: B

 

 

QUESTION 9

Examine the firewall configuration shown below; then answer the question following it. Which of the following statements are correct based on the firewall configuration illustrated in the exhibit? (Select all that apply.)

 

clip_image003

 

A.

A user can access the Internet using only the protocols that are supported by user authentication.

B.

A user can access the Internet using any protocol except HTTP, HTTPS, Telnet, and FTP. These require authentication before the user will be allowed access.

C.

A user must authenticate using the HTTP, HTTPS, SSH, FTP, or Telnet protocol before they can access any services.

D.

A user cannot access the Internet using any protocols unless the user has passed firewall authentication.

 

Correct Answer: AD

 

 

QUESTION 10

When backing up the configuration file on a FortiGate unit, the contents can be encrypted by enabling the encrypt option and supplying a password. If the password is forgotten, the configuration file can still be restored using which of the following methods?

 

A.

Selecting the recover password option during the restore process.

B.

Having the password emailed to the administrative user by selecting the Forgot Password option.

C.

Sending the configuration file to Fortinet Support for decryption.

D.

If the password is forgotten, there is no way to use the file.

 

Correct Answer: D

 

Free VCE & PDF File for Fortinet NSE5 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.