Downloadable Fortinet NSE4 Prep Online

we provide Certified Fortinet NSE4 exam cost which are the best for clearing NSE4 test, and to get certified by Fortinet Fortinet Network Security Expert 4 Written Exam (400). The NSE4 Questions & Answers covers all the knowledge points of the real NSE4 exam. Crack your Fortinet NSE4 Exam with latest dumps, guaranteed!

Also have NSE4 free dumps questions for you:

Page: 1 / 25
Total 301 questions Full Exam Access
Question 1
Which statement is correct concerning creating a custom signature?
My answer: -
Reference answer: A
Reference analysis:

None

Question 2
Two FortiGate units with NP6 processors form an active-active cluster. The cluster is doing security profile (UTM) inspection over all the user traffic.
What statements are true regarding the sessions that the master unit is offloading to the slave unit for inspection? (Choose two.)
My answer: -
Reference answer: BC
Reference analysis:

None

Question 3
Which of the following statements are correct concerning the IPsec phase 1 and phase 2, shown in the exhibit? (choose two)
NSE4 dumps exhibit
My answer: -
Reference answer: CD
Reference analysis:

None

Question 4
Which portion of the configuration does an administrator specify the type of IPsec configuration (either policy-based or route-based)?
My answer: -
Reference answer: D
Reference analysis:

None

Question 5
Two devices are in an HA cluster, the device hostnames are STUDENT and REMOTE. Exhibit A shows the command output of diagnose sys session stat for the STUDENT device. Exhibit B shows the command output of diagnose sys session stat for the REMOTE device.
Exhibit A:
NSE4 dumps exhibit
Exhibit B:
NSE4 dumps exhibit
Given the information provided in the exhibits, which of the following statements are correct? (Choose two.)
My answer: -
Reference answer: AD
Reference analysis:

None

Question 6
Files reported as "suspicious" were subject to which Antivirus check"?
My answer: -
Reference answer: D
Reference analysis:

None

Question 7
A client can create a secure connection to a FortiGate device using SSL VPN in web-only mode. Which one of the following statements is correct regarding the use of web-only mode SSL VPN?
My answer: -
Reference answer: C
Reference analysis:

None

Question 8
The exhibit shows a part output of the diagnostic command 'diagnose debug application ike 255', taken during establishment of a VPN. Which of the following statement are correct concerning this output? (choose two)
NSE4 dumps exhibit
My answer: -
Reference answer: BD
Reference analysis:

None

Question 9
Which action does the FortiGate take when link health monitor times out?
My answer: -
Reference answer: D
Reference analysis:

None

Question 10
Which two statements are true about IPsec VPNs and SSL VPNs? (Choose two.)
My answer: -
Reference answer: AD
Reference analysis:

None

Question 11
Which is an advantage of using SNMP v3 instead of SNMP v1/v2 when querying a FortiGate unit?
My answer: -
Reference answer: C
Reference analysis:

None

Question 12
Which commands are appropriate for investigating high CPU? (Choose two.)
My answer: -
Reference answer: AD
Reference analysis:

None

Question 13
Which of the following are possible actions for static URL filtering? (Choose three.)
My answer: -
Reference answer: ABC
Reference analysis:

None

Question 14
With FSSO DC-agent mode, a domain user could authenticate either against the domain controller running the collector agent and domain controller agent, or a domain controller running only the domain controller agent.
If you attempt to authenticate with a domain controller running only the domain controller agent, which statements are correct? (Choose two.)
My answer: -
Reference answer: AC
Reference analysis:

None

Question 15
A FortiGate is configured with three virtual domains (VDOMs). Which of the following statements is correct regarding multiple VDOMs?
My answer: -
Reference answer: D
Reference analysis:

None

Question 16
Of the following information, what can be recorded by a Data Leak Prevention sensor configured to do a summary archiving? (Choose three.)
My answer: -
Reference answer: BCE
Reference analysis:

None

Question 17
What is the maximum number of FortiAnalyzer/FortiManager devices a FortiGate unit can be configured to send logs to?
My answer: -
Reference answer: C
Reference analysis:

None

Question 18
Which of the following statements are true about the SSL Proxy certificate that must be used for SSL Content Inspection? (Choose two.)
My answer: -
Reference answer: CD
Reference analysis:

None

Question 19
An Internet browser is using the WPAD DNS method to discover the PAC file’s URL. The DNS server replies to the browser’s request with the IP address 10.100.1.10. Which URL will the browser use to download the PAC file?
My answer: -
Reference answer: C
Reference analysis:

None

Question 20
Which of the following combinations of two FortiGate device configurations (side A and side B), can be used to successfully establish an IPsec VPN between them? (choose two)
My answer: -
Reference answer: BC
Reference analysis:

None

Question 21
How do you configure a FortiGate to apply traffic shaping to P2P traffic, such as BitTorrent?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
Regarding the use of web-only mode SSL VPN, which statement is correct?
My answer: -
Reference answer: C
Reference analysis:

None

Question 23
Which IP packets can be hardware-accelerated by a NP6 processor? (Choose two.)
My answer: -
Reference answer: BC
Reference analysis:

None

Question 24
Which statement is in advantage of using a hub and spoke IPsec VPN configuration instead of a fully-meshed set of IPsec tunnels?
My answer: -
Reference answer: B
Reference analysis:

None

Question 25
Which of the following actions can be used to back up the keys and digital certificates in a FortiGate device? (Choose two.)
My answer: -
Reference answer: AD
Reference analysis:

None

Question 26
When configuring LDAP on the FortiGate as a remote database for users, what is not a part of the configuration?
My answer: -
Reference answer: C
Reference analysis:

None

Question 27
Which is one of the conditions that must be met for offloading the encryption and decryption of IPsec traffic to an NP6 processor?
My answer: -
Reference answer: C
Reference analysis:

None

Question 28
Which of the following statements are true regarding traffic accelerated by an NP processor? (Choose two.)
My answer: -
Reference answer: AD
Reference analysis:

None

Page: 1 / 25
Total 301 questions Full Exam Access