Braindump2go Fortinet FCNSA.v5 Practice Tests Latest Questions Free Share (1-14)
An administrator wants to assign a set of UTM features to a
group of users. Which of the following is the correct method for doing this?
A. Enable a set of unique UTM profiles under “Edit User Group”.
B. The administrator must enable the UTM profiles in an identity-based policy
applicable to the user group.
C. When defining the UTM objects, the
administrator must list the user groups which will use the UTM object.
D. The administrator must apply the UTM features directly to a user object.
When firewall policy authentication is enabled, only traffic on
supported protocols will trigger an authentication challenge.
supported protocols from the following:
A client can create a secure connection to a FortiGate device
using SSL VPN in web-only mode.
Which one of the following statements is
correct regarding the use of web-only mode SSL VPN?
A. Web-only mode supports SSL version 3 only.
B. A Fortinet-supplied
plug-in is required on the web client to use web-only mode SSL VPN.
C. Web-only mode requires the user to have a web browser that supports 64-bit
D. The JAVA run-time environment must be installed on the
client to be able to connect to a web- only mode SSL VPN.
A client can establish a secure connection to a corporate
network using SSL VPN in tunnel mode.
Which of the following statements are
correct regarding the use of tunnel mode SSL VPN? (Select all that apply.)
A. Split tunneling can be enabled when using tunnel mode SSL VPN.
B. Client software is required to be able to use a tunnel mode SSL VPN.
C. Users attempting to create a tunnel mode SSL VPN connection must be
authenticated by at least one SSL VPN policy.
D. The source IP address
used by the client for the tunnel mode SSL VPN is assigned by the FortiGate
In an IPSec gateway-to-gateway configuration, two FortiGate
units create a VPN tunnel between two separate private networks.
Which of the
following configuration steps must be performed on both FortiGate units to
support this configuration? (Select all that apply.)
A. Create firewall policies to control traffic between the IP source and
B. Configure the appropriate user groups on the
FortiGate units to allow users access to the IPSec VPN connection.
the operating mode of the FortiGate unit to IPSec VPN mode.
D. Define the
Phase 2 parameters that the FortiGate unit needs to create a VPN tunnel with the
E. Define the Phase 1 parameters that the FortiGate unit
needs to authenticate the remote peers.
How is traffic routed onto an SSL VPN tunnel from the FortiGate
A. A static route must be configured by the administrator using the
ssl.root interface as the outgoing interface.
B. Assignment of an IP
address to the client causes a host route to be added to the FortiGate unit’s
kernel routing table.
C. A route back to the SSLVPN IP pool is
automatically created on the FortiGate unit.
D. The FortiGate unit adds a
route based upon the destination address in the SSL VPN firewall policy.
An end user logs into the full-access SSL VPN portal and
selects the Tunnel Mode option by clicking on the “Connect” button. The
administrator has enabled split tunneling.
Given that the user authenticates against the SSL VPN policy shown in the
image below, which statement below identifies the route that is added to the
client’s routing table.
A. A route to destination matching the `WIN2K3′ address object.
route to the destination matching the `all’ address object.
C. A default
D. No route is added.
Which of the following antivirus and attack definition update
options are supported by FortiGate units? (Select all that apply.)
A. Manual update by downloading the signatures from the support
B. Pull updates from the FortiGate device
C. Push updates from
the FortiGuard Distribution Network.
D. “update-AV/AS” command from the
A FortiGate AntiVirus profile can be configured to scan for
viruses on SMTP, FTP, POP3, and SMB protocols using which inspection mode?
Which of the following statements regarding Banned Words are
correct? (Select all that apply.)
A. The FortiGate unit can scan web pages and email messages for instances
of banned words.
B. When creating a banned word list, an administrator can
indicate either specific words or patterns.
C. Banned words can be
expressed as simple text, wildcards or regular expressions.
D. Content is
automatically blocked if a single instance of a banned word appears.
E. The FortiGate unit updates banned words on a periodic basis.
Which statement is correct regarding virus scanning on a
A. Virus scanning is enabled by default.
B. Fortinet Customer
Support enables virus scanning remotely for you.
C. Virus scanning must be
enabled in a UTM security profile and the UTM security profile must be assigned
to a firewall policy.
D. Enabling virus scanning in a UTM security profile
enables virus scanning for all traffic flowing through the FortiGate device.
Which of the following statements are correct regarding URL
filtering on the FortiGate unit? (Select all that apply.)
A. The allowed actions for URL Filtering include Allow, Block and
B. The allowed actions for URL Filtering are Allow and
C. The FortiGate unit can filter URLs based on patterns using text
and regular expressions.
D. Any URL accessible by a web browser can be
blocked using URL Filtering.
E. Multiple URL Filter lists can be added to
a single protection profile.
Which of the following regular expression patterns will make
the terms “confidential data” case insensitive?
A. \[confidential data]
B. /confidential data/i
C. i/confidential data/
D. “confidential data”
Which of the following spam filtering methods are supported on
the FortiGate unit? (Select all that apply.)
A. IP Address Check
B. Open Relay Database List (ORDBL)
C. Black/White List
D. Return Email DNS Check
E. Email Checksum
Braindump2go New Released Fortinet
FCNSA.v5 Dump PDF Free Download, 130 Questions in all, Passing Your Exam 100%