NSE5 Exam - Fortinet Network Security Expert 5 Written Exam (500)

certleader.com

Q1. - (Topic 1) 

When browsing to an internal web server using a web-mode SSL VPN bookmark, from which of the following source IP addresses would the web server consider the HTTP request to be initiated? 

A. The remote user's virtual IP address. 

B. The FortiGate unit's internal IP address. 

C. The remote user's public IP address. 

D. The FortiGate unit's external IP address. 

Answer:

Q2. - (Topic 3) 

An administrator wishes to generate a report showing Top Traffic by service type. They notice that web traffic overwhelms the pie chart and want to exclude the web traffic from the report. 

Which of the following statements best describes how to do this? 

A. In the Service field of the Data Filter, type 80/tcp and select the NOT checkbox. 

B. Add the following entry to the Generic Field section of the Data Filter: service="!web". 

C. When editing the chart, uncheck wlog to indicate that Web Filtering data is being excluded when generating the chart. 

D. When editing the chart, enter 'http' in the Exclude Service field. 

Answer:

Q3. - (Topic 1) 

The command structure of the FortiGate CLI consists of commands, objects, branches, tables, and parameters. Which of the following items describes user? 

A. A command. 

B. An object. 

C. A table. 

D. A parameter. 

Answer:

Q4. - (Topic 1) 

In order to match an identity-based policy, the FortiGate unit checks the IP information. Once inside the policy, the following logic is followed: 

A. First, a check is performed to determine if the user’s login credentials are valid. Next, the user is checked to determine if they belong to any of the groups defined for that policy. Finally, user restrictions are determined and port, time, and UTM profiles are applied. 

B. First, user restrictions are determined and port, time, and UTM profiles are applied. Next, a check is performed to determine if the user’s login credentials are valid. Finally, the user is checked to determine if they belong to any of the groups defined for that policy. 

C. First, the user is checked to determine if they belong to any of the groups defined for that policy. Next, user restrictions are determined and port, time, and UTM profiles are applied. Finally, a check is performed to determine if the user’s login credentials are valid. 

Answer:

Q5. - (Topic 1) 

Alert emails enable the FortiGate unit to send email notifications to an email address upon detection of a pre-defined event type. Which of the following are some of the available event types in Web Config? (Select all that apply.) 

A. Intrusion detected. 

B. Successful firewall authentication. 

C. Oversized file detected. 

D. DHCP address assigned. 

E. FortiGuard Web Filtering rating error detected. 

Answer:

Q6. - (Topic 1) 

How is traffic routed onto an SSL VPN tunnel from the FortiGate unit side? 

A. A static route must be configured by the administrator using the ssl.root interface as the outgoing interface. 

B. Assignment of an IP address to the client causes a host route to be added to the FortiGate unit’s kernel routing table. 

C. A route back to the SSLVPN IP pool is automatically created on the FortiGate unit. 

D. The FortiGate unit adds a route based upon the destination address in the SSL VPN firewall policy. 

Answer:

Q7. - (Topic 3) 

A network administrator needs to implement dynamic route redundancy between a FortiGate unit located in a remote office and a FortiGate unit located in the central office. 

The remote office accesses central resources using IPSec VPN tunnels through two different Internet providers. 

What is the best method for allowing the remote office access to the resources through the FortiGate unit used at the central office? 

A. Use two or more route-based IPSec VPN tunnels and enable OSPF on the IPSec virtual interfaces. 

B. Use two or more policy-based IPSec VPN tunnels and enable OSPF on the IPSec virtual interfaces. 

C. Use route-based VPNs on the central office FortiGate unit to advertise routes with a dynamic routing protocol and use a policy-based VPN on the remote office with two or more static default routes. 

D. Dynamic routing protocols cannot be used over IPSec VPN tunnels. 

Answer:

Q8. - (Topic 1) 

Which of the following authentication types are supported by FortiGate units? (Select all that apply.) 

A. Kerberos 

B. LDAP 

C. RADIUS 

D. Local Users 

Answer: B,C,D 

Q9. - (Topic 3) 

In which of the following report templates would you configure the charts to be included in the report? 

A. Layout Template 

B. Data Filter Template 

C. Output Template 

D. Schedule Template 

Answer: A

Q10. - (Topic 3) 

Both the FortiGate and FortiAnalyzer units can notify administrators when certain alert conditions are met. 

Considering this, which of the following statements is NOT correct? 

A. On a FortiGate device, the alert condition is based either on the severity level or on the log type, but not on a combination of the two. 

B. On a FortiAnalyzer device, the alert condition is based either on the severity level or on the log type, but not on a combination of the two. 

C. Only a FortiAnalyzer device can send the alert notification in the form of a syslog message. 

D. Both the FortiGate and FortiAnalyzer devices can send alert notifications in the form of an email alert. 

Answer: