Download Fortinet Network Security Analyst.NSE5.PracticeTest.2018-04-02.181q.vcex

Vendor: Fortinet
Exam Code: NSE5
Exam Name: Fortinet Network Security Analyst
Date: Apr 02, 2018
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Encrypted backup files provide which of the following benefits? (Select all that apply.)
  1. Integrity of the backup file is protected since it cannot be easily modified when encrypted.
  2. Prevents the backup file from becoming corrupted.
  3. Protects details of the device's configuration settings from being discovered while the backup file is in transit. For example, transferred to a data centers for system recovery.
  4. A copy of the encrypted backup file is automatically pushed to the FortiGuard Distribution Service (FDS) for disaster recovery purposes. If the backup file becomes corrupt it can be retrieved through FDS.
  5. Fortinet Technical Support can recover forgotten passwords with a backdoor passphrase.
Correct answer: AC
Question 2
The FortiGate unit’s GUI provides a link to update the firmware. 
Clicking this link will perform which of the following actions?
  1. It will connect to the Fortinet Support site where the appropriate firmware version can be selected.
  2. It will send a request to the FortiGuard Distribution Network so that the appropriate firmware version can be pushed down to the FortiGate unit.
  3. It will present a prompt to allow browsing to the location of the firmware file.
  4. It will automatically connect to the Fortinet Support site to download the most recent firmware version for the FortiGate unit.
Correct answer: C
Question 3
Which of the following products is designed to manage multiple FortiGate devices?
  1. FortiGate device
  2. FortiAnalyzer device
  3. FortiClient device
  4. FortiManager device
  5. FortiMail device
  6. FortiBridge device
Correct answer: D
Question 4
Which of the following products provides dedicated hardware to analyze log data from multiple FortiGate devices?
  1. FortiGate device
  2. FortiAnalyzer device
  3. FortiClient device
  4. FortiManager device
  5. FortiMail device
  6. FortiBridge device
Correct answer: B
Question 5
Which of the following are valid FortiGate device interface methods for handling DNS requests? (Select all that apply.)
  1. Forward-only
  2. Non-recursive
  3. Recursive
  4. Iterative
  5. Conditional-forward
Correct answer: ABC
Question 6
The default administrator profile that is assigned to the default "admin" user on a FortGate device is:____________________.
  1. trusted-admin
  2. super_admin
  3. super_user
  4. admin
  5. fortinet-root
Correct answer: B
Question 7
Which of the following logging options are supported on a FortiGate unit? (Select all that apply.)
  1. LDAP
  2. Syslog
  3. FortiAnalyzer
  4. Local disk and/or memory
Correct answer: BCD
Question 8
In order to match an identity-based policy, the FortiGate unit checks the IP information. Once inside the policy, the following logic is followed:
  1. First, a check is performed to determine if the user’s login credentials are valid. Next, the user is checked to determine if they belong to any of the groups defined for that policy. Finally, user restrictions are determined and port, time, and UTM profiles are applied.
  2. First, user restrictions are determined and port, time, and UTM profiles are applied. Next, a check is performed to determine if the user’s login credentials are valid. Finally, the user is checked to determine if they belong to any of the groups defined for that policy.
  3. First, the user is checked to determine if they belong to any of the groups defined for that policy. Next, user restrictions are determined and port, time, and UTM profiles are applied. Finally, a check is performed to determine if the user’s login credentials are valid.
Correct answer: A
Question 9
Which of the following statements regarding the firewall policy authentication timeout is true?
  1. The authentication timeout is an idle timeout. This means that the FortiGate unit will consider a user to be “idle” if it does not see any packets coming from the user’s source IP.
  2. The authentication timeout is a hard timeout. This means that the FortiGate unit will remove the temporary policy for this user’s source IP after this timer has expired.
  3. The authentication timeout is an idle timeout. This means that the FortiGate unit will consider a user to be “idle” if it does not see any packets coming from the user’s source MAC.
  4. The authentication timeout is a hard timeout. This means that the FortiGate unit will remove the temporary policy for this user’s source MAC after this timer has expired.
Correct answer: A
Question 10
Two-factor authentication is supported using the following methods? (Select all that apply.)
  1. FortiToken
  2. Email
  3. SMS phone message
  4. Code books
Correct answer: ABC
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!