Exam Details

  • Exam Code
    :FCNSP.V5
  • Exam Name
    :Fortinet Certified Network Security Professional (FCNSP.v5)
  • Certification
    :Fortinet Certification
  • Vendor
    :Fortinet
  • Total Questions
    :120 Q&As
  • Last Updated
    :May 11, 2024

Fortinet Fortinet Certification FCNSP.V5 Questions & Answers

  • Question 11:

    Which of the following represents the method used on a FortiGate unit running FortiOS version 4.2 to apply traffic shaping to P2P traffic, such as BitTorrent?

    A. Apply a Traffic Shaper to a BitTorrent entry in an Application Control List.

    B. Enable the Shape option in a Firewall policy with a Service set to BitTorrent.

    C. Define a DLP Rule to match against BitTorrent traffic and include the rule in a DLP Sensor with Traffic Shaping enabled.

    D. Specify the amount of Rate Limiting to be applied to BitTorrent traffic through the P2P settings of the Firewall Policy Protocol Options.

  • Question 12:

    Select the answer that describes what the CLI command diag debug authd fsso list is used for.

    A. Monitors communications between the FSSO Collector Agent and FortiGate unit.

    B. Displays which users are currently logged on using FSSO.

    C. Displays a listing of all connected FSSO Collector Agents.

    D. Lists all DC Agents installed on all Domain Controllers.

  • Question 13:

    What advantages are there in using a hub-and-spoke IPSec VPN configuration instead of a fully- meshed set of IPSec tunnels? (Select all that apply.)

    A. Using a hub and spoke topology is required to achieve full redundancy.

    B. Using a hub and spoke topology simplifies configuration.

    C. Using a hub and spoke topology provides stronger encryption.

    D. Using a hub and spoke topology reduces the number of tunnels.

  • Question 14:

    What advantages are there in using a fully Meshed IPSec VPN configuration instead of a hub and spoke set of IPSec tunnels?

    A. Using a hub and spoke topology is required to achieve full redundancy.

    B. Using a full mesh topology simplifies configuration.

    C. Using a full mesh topology provides stronger encryption.

    D. Full mesh topology is the most fault-tolerant configuration.

  • Question 15:

    A network administrator needs to implement dynamic route redundancy between a FortiGate unit located in a remote office and a FortiGate unit located in the central office.

    The remote office accesses central resources using IPSec VPN tunnels through two different Internet providers.

    What is the best method for allowing the remote office access to the resources through the FortiGate unit used at the central office?

    A. Use two or more route-based IPSec VPN tunnels and enable OSPF on the IPSec virtual interfaces.

    B. Use two or more policy-based IPSec VPN tunnels and enable OSPF on the IPSec virtual interfaces.

    C. Use route-based VPNs on the central office FortiGate unit to advertise routes with a dynamic routing protocol and use a policy-based VPN on the remote office with two or more static default routes.

    D. Dynamic routing protocols cannot be used over IPSec VPN tunnels.

  • Question 16:

    The Host Check feature can be enabled on the FortiGate unit for SSL VPN connections. When this feature

    is enabled, the FortiGate unit probes the remote host computer to verify that it is "safe" before access is

    granted.

    Which of the following items is NOT an option as part of the Host Check feature?

    A. FortiClient Antivirus software

    B. Microsoft Windows Firewall software

    C. FortiClient Firewall software

    D. Third-party Antivirus software

  • Question 17:

    In the Tunnel Mode widget of the web portal, the administrator has configured an IP Pool and enabled split tunneling.

    Which of the following statements is true about the IP address used by the SSL VPN client?

    A. The IP pool specified in the SSL-VPN Tunnel Mode Widget Options will override the IP address range defined in the SSL-VPN Settings.

    B. Because split tunneling is enabled, no IP address needs to be assigned for the SSL VPN tunnel to be established.

    C. The IP address range specified in SSL-VPN Settings will override the IP address range in the SSL-VPN Tunnel Mode Widget Options.

  • Question 18:

    An issue could potentially occur when clicking Connect to start tunnel mode SSL VPN. The tunnel will start up for a few seconds, then shut down.

    Which of the following statements best describes how to resolve this issue?

    A. This user does not have permission to enable tunnel mode. Make sure that the tunnel mode widget has been added to that user's web portal.

    B. This FortiGate unit may have multiple Internet connections. To avoid this problem, use the appropriate CLI command to bind the SSL VPN connection to the original incoming interface.

    C. Check the SSL adaptor on the host machine. If necessary, uninstall and reinstall the adaptor from the tunnel mode portal.

    D. Make sure that only Internet Explorer is used. All other browsers are unsupported.

  • Question 19:

    You are the administrator in charge of a FortiGate unit which acts as a VPN gateway. You have chosen to use Interface Mode when configuring the VPN tunnel and you want users from either side to be able to initiate new sessions. There is only 1 subnet at either end and the FortiGate unit already has a default route.

    Which of the following configuration steps are required to achieve these objectives? (Select all that apply.)

    A. Create one firewall policy.

    B. Create two firewall policies.

    C. Add a route for the remote subnet.

    D. Add a route for incoming traffic.

    E. Create a phase 1 definition.

    F. Create a phase 2 definition.

  • Question 20:

    An administrator configures a VPN and selects the Enable IPSec Interface Mode option in the phase 1 settings.

    Which of the following statements are correct regarding the IPSec VPN configuration?

    A. To complete the VPN configuration, the administrator must manually create a virtual IPSec interface in Web Config under System > Network.

    B. The virtual IPSec interface is automatically created after the phase1 configuration.

    C. The IPSec policies must be placed at the top of the list.

    D. This VPN cannot be used as part of a hub and spoke topology.

    E. Routes were automatically created based on the address objects in the firewall policies.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Fortinet exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your FCNSP.V5 exam preparations and Fortinet certification application, do not hesitate to visit our Vcedump.com to find your solutions here.