Get all latest (August) Fortinet FCNSA.v5 Actual Test 11-20

Ensurepass

 

QUESTION 11

What are the valid sub-types for a Firewall type policy? (Select all that apply)

 

A.

Device Identity

B.

Address

C.

User Identity

D.

Schedule

E.

SSL VPN

 

Correct Answer: ABC

 

 

QUESTION 12

Which of the following methods can be used to access the CLI? (Select all that apply.)

 

A.

By using a direct connection to a serial console.

B.

By using the CLI console window in Web Config.

C.

By using an SSH connection.

D.

By using a Telnet connection.

 

Correct Answer: ABCD

 

 

QUESTION 13

You wish to create a firewall policy that applies only to traffic intended for your web server. The server has an IP address of 192.168.2.2 and belongs to a class C subnet.When defining the firewall address for use in this policy, which one of the following addressing formats is correct?

 

A.

192.168.2.0 / 255.255.255.0

B.

192.168.2.2 / 255.255.255.0

C.

192.168.2.0 / 255.255.255.255

D.

192.168.2.2 / 255.255.255.255

 

Correct Answer: D

 

 

QUESTION 14

Which of the following network protocols are supported for administrative access to a FortiGate unit?

 

A.

HTTPS, HTTP, SSH, TELNET, PING, SNMP

B.

FTP, HTTPS, NNTP, TCP, WINS

C.

HTTP, NNTP, SMTP, DHCP

D.

Telnet, FTP, RLOGIN, HTTP, HTTPS, DDNS

E.

Telnet, UDP, NNTP, SMTP

 

Correct Answer: A

 

 

QUESTION 15

Which of the following regular expression patterns will make the terms “confidential data” case insensitive?

 

A.

[confidential data]

B.

/confidential data/i

C.

i/confidential data/

D.

“confidential data”

E.

/confidential data/c

 

Correct Answer: B

 

 

 

 

 

QUESTION 16

The command structure of the FortiGate CLI consists of commands, objects, branches, tables, and parameters. Which of the following items describes user?

 

A.

A command.

B.

An object.

C.

A table.

D.

A parameter.

 

Correct Answer: B

 

 

QUESTION 17

Which of the following statements are correct regarding logging to memory on a FortiGate unit? (Select all that apply.)

 

A.

When the system has reached its capacity for log messages, the FortiGate unit will stop logging to memory.

B.

When the system has reached its capacity for log messages, the FortiGate unit overwrites the oldest messages.

C.

If the FortiGate unit is reset or loses power, log entries captured to memory will be lost.

D.

None of the above.

 

Correct Answer: BC

 

 

QUESTION 18

An administrator configures a FortiGate unit in Transparent mode on the 192.168.11.0 subnet. Automatic Discovery is enabled to detect any available FortiAnalyzers on the network. Which of the following FortiAnalyzers will be detected? (Select all that apply.)

 

A.

192.168.11.100

B.

192.168.11.251

C.

192.168.10.100

D.

192.168.10.251

 

Correct Answer: AB

 

 

QUESTION 19

In addition to AntiVirus services, the FortiGuard Subscription Services provide IPS, Web Filtering, and ___________ services.

 

Correct Answer: antispam

 

 

 

 

 

 

 

 

 

 

QUESTION 20

An end user logs into the SSL VPN portal and selects the Tunnel Mode option by clicking on the “Connect” button. The administrator has not enabled split tunneling and so the end user must access the Internet through the SSL VPN Tunnel. Which firewall policies are needed to allow the end user to not only access the internal network but also reach the Internet?

 

A.

clip_image002

B.

clip_image004

C.

clip_image006

D.

clip_image008

 

Correct Answer: A

 

Free VCE & PDF File for Fortinet FCNSA.v5 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in FCNSA.v5 Real Exam (August) and tagged , , , , , , . Bookmark the permalink.