Exam Details

  • Exam Code
    :NSE5
  • Exam Name
    :Fortinet Network Security Expert 5 Written Exam (500)
  • Certification
    :Fortinet Certifications
  • Vendor
    :Fortinet
  • Total Questions
    :320 Q&As
  • Last Updated
    :Jul 12, 2025

Fortinet Fortinet Certifications NSE5 Questions & Answers

  • Question 251:

    An administrator wishes to generate a report showing Top Traffic by service type, but wants to exclude SMTP traffic from the report.

    Which of the following statements best describes how to do this?

    A. In the Service field of the Data Filter, type 25/smtp and select the NOT checkbox.

    B. Add the following entry to the Generic Field section of the Data Filter: service="!smtp".

    C. When editing the chart, uncheck mlog to indicate that Mail Filtering data is being excluded when generating the chart.

    D. When editing the chart, enter 'dns' in the Exclude Service field.

  • Question 252:

    SSL Proxy is used to decrypt the SSL-encrypted traffic. After decryption, where is the traffic buffered in preparation for content inspection?

    A. The file is buffered by the application proxy.

    B. The file is buffered by the SSL proxy.

    C. In the upload direction, the file is buffered by the SSL proxy. In the download direction, the file is buffered by the application proxy.

    D. No file buffering is needed since a stream-based scanning approach is used for SSL content inspection.

  • Question 253:

    Which permissions can be configured for a `Restricted Admin' profile? (Choose three.)

    A. Web Filter Profile

    B. DLP Profile

    C. IPS Sensor

    D. Firewall Policy

    E. Application Sensor

  • Question 254:

    A FortiGate unit can provide which of the following capabilities? (Select all that apply.)

    A. Email filtering

    B. Firewall

    C. VPN gateway

    D. Mail relay

    E. Mail server

  • Question 255:

    Bob wants to send Alice a file that is encrypted using public key cryptography.

    Which of the following statements is correct regarding the use of public key cryptography in this scenario?

    A. Bob will use his private key to encrypt the file and Alice will use her private key to decrypt the file.

    B. Bob will use his public key to encrypt the file and Alice will use Bob's private key to decrypt the file.

    C. Bob will use Alice's public key to encrypt the file and Alice will use her private key to decrypt the file.

    D. Bob will use his public key to encrypt the file and Alice will use her private key to decrypt the file.

    E. Bob will use Alice's public key to encrypt the file and Alice will use Bob's public key to decrypt the file.

  • Question 256:

    Identify the correct properties of a partial mesh VPN deployment: A. VPN tunnels interconnect between every single location.

    B. VPN tunnels are not configured between every single location.

    C. Some locations are reached via a hub location.

    D. There are no hub locations in a partial mesh.

  • Question 257:

    What two statements are correct regarding administrative users and accounts? (Choose two.)

    A. Administrative user accounts can exist locally or remotely.

    B. Administrative user login information is available to all administrators through the Web- based manager.

    C. Administrative users must be assigned an administrative profile.

    D. Administrative user access is restricted by administrative profiles only.

  • Question 258:

    What are the methods available to register a device? (Choose two.)

    A. A supported device can request registration.

    B. An administrator from a supported device can use a CLI command to automatically connect to FortiAnalyzer without intervention from a FortiAnalyzer administrator.

    C. A FortiAnalyzer can register a supported device through the Device Registration wizard.

    D. A FortiAnalyzer automatically registers all supported devices on the same Local Area Network (LAN) by default.

  • Question 259:

    What are the valid sub-types for a Firewall type policy? (Select all that apply)

    A. Device Identity

    B. Address

    C. User Identity

    D. Schedule

    E. SSL VPN

  • Question 260:

    Which of the following statements is correct regarding the NAC Quarantine feature?

    A. With NAC quarantine, files can be quarantined not only as a result of antivirus scanning, but also for other forms of content inspection such as IPS and DLP.

    B. NAC quarantine does a client check on workstations before they are permitted to have administrative access to FortiGate.

    C. NAC quarantine allows administrators to isolate clients whose network activity poses a security risk.

    D. If you chose the quarantine action, you must decide whether the quarantine type is NAC quarantine or File quarantine.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Fortinet exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NSE5 exam preparations and Fortinet certification application, do not hesitate to visit our Vcedump.com to find your solutions here.