Win IT Exam with Last Dumps 2025


Fortinet NSE4_FGT-7.0 Exam

Page 4/11
Viewing Questions 31 40 out of 106 Questions
36.36%

Question 31
Refer to the exhibit.
Given the security fabric topology shown in the exhibit, which two statements are true? (Choose two.)
Image NSE4_FGT-7.0_31Q.jpg related to the Fortinet NSE4_FGT-7.0 Exam
A. There are five devices that are part of the security fabric.
B. There are 19 security recommendations for the security fabric.
C. Device detection is disabled on all FortiGate devices.
D. This security fabric topology is a logical topology view.
References:
https://docs.fortinet.com/document/fortigate/5.6.0/cookbook/761085/results https://docs.fortinet.com/document/fortimanager/6.2.0/new-features/736125/security-fabric-topology

Question 32
A network administrator is configuring a new IPsec VPN tunnel on FortiGate. The remote peer IP address is dynamic. In addition, the remote peer does not support a dynamic DNS update service.
What type of remote gateway should the administrator configure on FortiGate for the new IPsec VPN tunnel to work?
A. Dialup User
B. Static IP Address
C. Pre-shared Key
D. Dynamic DNS
Dialup user is used when the remote peer's IP address is unknown. The remote peer whose IP address is unknown acts as the dialup clien and this is often the case for branch offices and mobile VPN clients that use dynamic IP address and no dynamic DNS

Question 33
An administrator wants to configure Dead Peer Detection (DPD) on IPSEC VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when no traffic is observed in the tunnel.
Which DPD mode on FortiGate will meet the above requirement?
A. On Demand
B. Disabled
C. On Idle
D. Enabled
Reference: https://kb.fortinet.com/kb/documentLink.do?externalID=FD40813

Question 34
Which three statements about a flow-based antivirus profile are correct? (Choose three.)
A. IPS engine handles the process as a standalone
B. Flow-based inspection uses a hybrid of scanning modes available in proxy-based inspection.
C. If the virus is detected, the last packet is delivered to the client.
D. Optimized performance compared to proxy-based inspection.
E. FortiGate buffers the whole file but transmits to the client simultaneously.
Reference: https://forum.fortinet.com/tm.aspx?m=192309

Question 35
An administrator has configured a strict RPF check on FortiGate.
Which statement is true about the strict RPF check?
A. The strict RPF check is run on the first sent and reply packet of any new session.
B. Strict RPF checks the best route back to the source using the incoming interface.
C. Strict RPF checks only for the existence of at least one active route back to the source using the incoming interface.
D. Strict RPF allows packets back to sources with all active routes.
Reference: https://kb.fortinet.com/kb/documentLink.do?externalID=FD33955


Question 36
Refer to the exhibit.
Review the Intrusion Prevention System (IPS) profile signature settings.
Which statement is correct in adding the FTP.Login.Failed signature to the IPS sensor profile?
Image NSE4_FGT-7.0_36Q.png related to the Fortinet NSE4_FGT-7.0 Exam
A. Traffic matching the signature will be silently dropped and logged.
B. The signature setting uses a custom rating threshold.
C. The signature setting includes a group of other signatures.
D. Traffic matching the signature will be allowed and logged.

Question 37
Refer to the exhibit.
The exhibit shows the IPS sensor configuration.
If traffic matches this IPS sensor, which two actions is the sensor expected to take? (Choose two.)
Image NSE4_FGT-7.0_37Q.jpg related to the Fortinet NSE4_FGT-7.0 Exam
A. The sensor will block all attacks aimed at Windows servers.
B. The sensor will gather a packet log for all matched traffic.
C. The sensor will allow attackers matching the NTP.Spoofed.KoD.DoS signature.
D. The sensor will reset all connections that match these signatures.

Question 38
Which two attributes are required on a certificate so it can be used as a CA certificate on SSL Inspection? (Choose two.)
A. The CA extension must be set to TRUE.
B. The issuer must be a public CA.
C. The common name on the subject field must use a wildcard name.
D. The keyUsage extension must be set to keyCertSign.
https://www.reddit.com/r/fortinet/comments/c7j6jg/recommended_ssl_cert/

Question 39
A network administrator has enabled SSL certificate inspection and antivirus on FortiGate. When downloading an EICAR test file through HTTP, FortiGate detects the virus and blocks the file. When downloading the same file through HTTPS, FortiGate does not detect the virus and the file can be downloaded.
What is the reason for the failed virus detection by FortiGate?
A. Antivirus definitions are not up to date.
B. SSL/SSH Inspection profile is incorrect.
C. Antivirus profile configuration is incorrect.
D. Application control is not enabled.

Question 40
Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)
A. FortiTelemetry
B. HTTPS
C. SSH
D. FTM
https://docs.fortinet.com/document/fortigate/6.4.0/hardening-your-fortigate/995103/building-security-into-fortios