Exam Details

  • Exam Code
    :NSE4_FGT-7.2
  • Exam Name
    :Fortinet NSE 4 - FortiOS 7.2
  • Certification
    :NSE4
  • Vendor
    :Fortinet
  • Total Questions
    :174 Q&As
  • Last Updated
    :May 07, 2024

Fortinet NSE4 NSE4_FGT-7.2 Questions & Answers

  • Question 1:

    Which two inspection modes can you use to configure a firewall policy on a profile-based next-generation firewall (NGFW)? (Choose two.)

    A. Proxy-based inspection

    B. Certificate inspection

    C. Flow-based inspection

    D. Full Content inspection

  • Question 2:

    Refer to the exhibit.

    The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile.

    An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category.

    What are two solutions for satisfying the requirement? (Choose two.)

    A. Configure a separate firewall policy with action Deny and an FQDN address object for *.download.com as destination address.

    B. Configure a web override rating for download.com and select Malicious Websites as the subcategory.

    C. Set the Freeware and Software Downloads category Action to Warning.

    D. Configure a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively.

  • Question 3:

    What are two functions of ZTNA? (Choose two.)

    A. ZTNA manages access through the client only.

    B. ZTNA manages access for remote users only.

    C. ZTNA provides a security posture check.

    D. ZTNA provides role-based access.

  • Question 4:

    Examine this output from a debug flow:

    Why did the FortiGate drop the packet?

    A. The next-hop IP address is unreachable.

    B. It failed the RPF check .

    C. It matched an explicitly configured firewall policy with the action DENY.

    D. It matched the default implicit firewall policy.

  • Question 5:

    Refer to the exhibit.

    The exhibit shows a diagram of a FortiGate device connected to the network and the firewall policy and IP pool configuration on the FortiGate device.

    Which two actions does FortiGate take on internet traffic sourced from the subscribers? (Choose two.)

    A. FortiGate allocates port blocks per user, based on the configured range of internal IP addresses.

    B. FortiGate allocates port blocks on a first-come, first-served basis.

    C. FortiGate generates a system event log for every port block allocation made per user.

    D. FortiGate allocates 128 port blocks per user.

  • Question 6:

    Which two attributes are required on a certificate so it can be used as a CA certificate on SSL Inspection? (Choose two.)

    A. The keyUsage extension must be set to keyCertSign.

    B. The common name on the subject field must use a wildcard name.

    C. The issuer must be a public CA.

    D. The CA extension must be set to TRUE.

  • Question 7:

    Examine this FortiGate configuration: How does the FortiGate handle web proxy traffic coming from the IP address 10.2.1.200 that requires authorization?

    A. It always authorizes the traffic without requiring authentication.

    B. It drops the traffic.

    C. It authenticates the traffic using the authentication scheme SCHEME2.

    D. It authenticates the traffic using the authentication scheme SCHEME1.

  • Question 8:

    An administrator needs to configure VPN user access for multiple sites using the same soft FortiToken. Each site has a FortiGate VPN gateway. What must an administrator do to achieve this objective?

    A. The administrator can register the same FortiToken on more than one FortiGate.

    B. The administrator must use a FortiAuthenticator device

    C. The administrator can use a third-party radius OTP server.

    D. The administrator must use the user self-registration server.

  • Question 9:

    Which statement about the policy ID number of a firewall policy is true?

    A. It is required to modify a firewall policy using the CLI.

    B. It represents the number of objects used in the firewall policy.

    C. It changes when firewall policies are reordered.

    D. It defines the order in which rules are processed.

  • Question 10:

    Refer to the exhibits.

    Exhibit A shows a topology for a FortiGate HA cluster that performs proxy-based inspection on traffic. Exhibit B shows the HA configuration and the partial output of the get system ha status command.

    Based on the exhibits, which two statements about the traffic passing through the cluster are true? (Choose two.)

    A. For non-load balanced connections, packets forwarded by the cluster to the server contain the virtual MAC address of port2 as source.

    B. The traffic sourced from the client and destined to the server is sent to FGT-1.

    C. The cluster can load balance ICMP connections to the secondary.

    D. For load balanced connections, the primary encapsulates TCP SYN packets before forwarding them to the secondary.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Fortinet exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NSE4_FGT-7.2 exam preparations and Fortinet certification application, do not hesitate to visit our Vcedump.com to find your solutions here.