Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
FCNSA.v5 Examination questions (September)

Achieve New Updated (September) Fortinet FCNSA.v5 Examination Questions 11-20

September 24, 2015

Ensurepass

 

QUESTION 11

What are the valid sub-types for a Firewall type policy? (Select all that apply)

 

 

 

 

 

A.

Device Identity

B.

Address

C.

User Identity

D.

Schedule

E.

SSL VPN

 

Answer: ABC

 

 

QUESTION 12

Which of the following methods can be used to access the CLI? (Select all that apply.)

 

A.

By using a direct connection to a serial console.

B.

By using the CLI console window in Web Config.

C.

By using an SSH connection.

D.

By using a Telnet connection.

 

Answer: ABCD

 

 

QUESTION 13

You wish to create a firewall policy that applies only to traffic intended for your web server. The server has an IP address of 192.168.2.2 and belongs to a class C subnet.When defining the firewall address for use in this policy, which one of the following addressing formats is correct?

 

A.

192.168.2.0 / 255.255.255.0

B.

192.168.2.2 / 255.255.255.0

C.

192.168.2.0 / 255.255.255.255

D.

192.168.2.2 / 255.255.255.255

 

Answer: D

 

 

QUESTION 14

Which of the following network protocols are supported for administrative access to a FortiGate unit?

 

 

 

 

 

A.

HTTPS, HTTP, SSH, TELNET, PING, SNMP

B.

FTP, HTTPS, NNTP, TCP, WINS

C.

HTTP, NNTP, SMTP, DHCP

D.

Telnet, FTP, RLOGIN, HTTP, HTTPS, DDNS

E.

Telnet, UDP, NNTP, SMTP

 

Answer: A

 

 

QUESTION 15

Which of the following regular expression patterns will make the terms “confidential data” case insensitive?

 

A.

\[confidential data]

B.

/confidential data/i

C.

i/confidential data/

D.

“confidential data”

E.

/confidential data/c

 

Answer: B

 

 

QUESTION 16

The command structure of the FortiGate CLI consists of commands, objects, branches, tables, and parameters. Which of the following items describes user?

 

A.

A command.

B.

An object.

C.

A table.

D.

A parameter.

 

Answer: B

 

 

QUESTION 17

Which of the following statements are correct regarding logging to memory on a FortiGate unit? (Select all that apply.)

 

 

 

 

 

A.

When the system has reached its capacity for log messages, the FortiGate unit will stop logging to memory.

B.

When the system has reached its capacity for log messages, the FortiGate unit overwrites the oldest messages.

C.

If the FortiGate unit is reset or loses power, log entries captured to memory will be lost.

D.

None of the above.

 

Answer: BC

 

 

QUESTION 18

An administrator configures a FortiGate unit in Transparent mode on the 192.168.11.0 subnet. Automatic Discovery is enabled to detect any available FortiAnalyzers on the network.

 

Which of the following FortiAnalyzers will be detected? (Select all that apply.)

 

A.

192.168.11.100

B.

192.168.11.251

C.

192.168.10.100

D.

192.168.10.251

 

Answer: AB

 

 

QUESTION 19

CORRECT TEXT

 

In addition to AntiVirus services, the FortiGuard Subscription Services provide IPS, Web Filtering, and ___________ services.

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 20

An end user logs into the SSL VPN portal and selects the Tunnel Mode option by clicking on the “Connect” button. The administrator has not enabled split tunneling and so the end user must access the Internet through the SSL VPN Tunnel.

 

 

 

 

Which firewall policies are needed to allow the end user to not only access the internal network but also reach the Internet?

 

A.

clip_image001

B.

clip_image002

C.

clip_image003

D.

clip_image004

 

 

A.Exhibit A

 

B.Exhibit B

 

C.Exhibit C

 

D.Exhibit D

 

 

 

 

 

Answer: A

Free VCE & PDF File for Fortinet FCNSA.v5 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …