November 30, 2020 by admin [2020.11] NSE4_FGT-6.2 practice test Welcome to your [2020.11] NSE4_FGT-6.2 practice test QUESTION 1 Which of the following statements about backing up logs from the CLI and downloading logs from the GUI are true? (Choose two.) A. Log downloads from the GUI are limited to the current filter view B. Log backups from the CLI cannot be restored to another FortiGate. C. Log backups from the CLI can be configured to upload to FTP as a scheduled time D. Log downloads from the GUI are stored as LZ4 compressed files. QUESTION 2 View the exhibitWhy is the administrator getting the error shown in the exhibit? A. The administrator must first enter the command edit global. B. The administrator admin does not have the privileges required to configure global settings. C. The global settings cannot be configured from the root VDOM context. D. The command config system global does not exist in FortiGate. None QUESTION 3 Which of the following FortiGate configuration tasks will create a route in the policy route table? (Choose two.) A. Static route created with a Named Address object B. Static route created with an Internet Services object C. SD-WAN route created for individual member interfaces D. SD-WAN rule created to route traffic based on link latency QUESTION 4 Which of the following statements are true when using WPAD with the DHCP discovery method? (Choose two.) A. If the DHCP method fails, browsers will try the DNS method. B. The browser needs to be preconfigured with the DHCP server\\’s IP address. C. The browser sends a DHCPINFORM request to the DHCP server. D. The DHCP server provides the PAC file for download. QUESTION 5 How does FortiGate verify the login credentials of a remote LDAP user? A. FortiGate regenerates the algorithm based on the login credentials and compares it to the algorithm stored on the LDAP server. B. FortiGate sends the user-entered credentials to the LDAP server for authentication. C. FortiGate queries the LDAP server for credentials. D. FortiGate queries its own database for credentials. None QUESTION 6 Examine this network diagram:What filter can be used in the command diagnose sniffer packet to capture the traffic between the client and the explicit web proxy? A. `host 10.0.0.50 and port 8080\\’ B. `host 10.0.0.50 and port 80\\’ C. `host 192.168.0.2 and port 8080\\’ D. `host 192.168.0.1 and port 80\\’ None QUESTION 7 Examine this PAC file configuration.Which of the following statements are true? (Choose two.) A. Browsers can be configured to retrieve this PAC file from the FortiGate. B. Any web request to the 172.25.120.0/24 subnet is allowed to bypass the proxy. C. All requests not sent to Fortinet.com or the 172.25.120.0/24 subnet, have to go through altproxy.corp.com: 8060. D. Any web request fortinet.com is allowed to bypass the proxy. QUESTION 8 How does FortiGate select the central SNAT policy that is applied to a TCP session? A. It selects the SNAT policy specified in the configuration of the outgoing interface. B. It selects the first matching central SNAT policy, reviewing from top to bottom. C. It selects the central SNAT policy with the lowest priority. D. It selects the SNAT policy specified in the configuration of the firewall policy that matches the traffic. None QUESTION 9 An administrator observes that the port1 interface cannot be configured with an IP address. What can be the reasons for that? (Choose three.) A. The interface has been configured for a one-arm sniffer. B. The interface is a member of a virtual wire pair. C. The operation mode is transparent. D. The interface is a member of a zone. E. Captive portal is enabled in the interface. QUESTION 10 View the certificate shown to the exhibit, and then answer the following question:The CA issued this certificate to which entity? A. A root CA B. A person C. A bridge CA D. A subordinate CA None QUESTION 11 Which of the following statements describe WMI polling mode for the FSSO collector agent? (Choose two.) A. The NetSessionEnum function is used to track user logoffs. B. WMI polling can increase bandwidth usage in large networks. C. The collector agent uses a Windows API to query DCs for user logins. D. The collector agent does not need to search for any security event logs. QUESTION 12 View the exhibit.Which users and user groups are allowed access to the network through the captive portal? A. Users and groups defined in the firewall policy. B. Only individual users? not groups? defined in the captive portal configuration C. Groups defined in the captive portal configuration D. All users None QUESTION 13 Examine the two static routes shown in the exhibit, then answer the following question.Which of the following is the expected FortiGate behavior regarding these two routes to the same destination? A. FortiGate will load balance all traffic across both routers. B. FortiGate will use the port1 route as the primary candidate. C. FortiGate will route twice as much traffic to the port2 route D. FortiGate will only actuate the port1 route in the routing table None Time's up