aiotestking uk

NSE5 Exam Questions - Online Test


NSE5 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 2) 

Examine the following log message for IPS and identify the valid responses below. (Select all that apply.) 

2012-07-01 09:54:28 oid=2 log_id=18433 type=ips subtype=anomaly pri=alert vd=root severity="critical" src="192.168.3.168" dst="192.168.3.170" src_int="port2" serial=0 status="detected" proto=1 service="icmp" count=1 attack_name="icmp_flood" icmp_id="0xa8a4" icmp_type="0x08" icmp_code="0x00" attack_id=16777316 sensor="1" ref="http://www.fortinet.com/ids/VID16777316" msg="anomaly: icmp_flood, 51 > threshold 50" 

A. The target is 192.168.3.168. 

B. The target is 192.168.3.170. 

C. The attack was detected and blocked. 

D. The attack was detected only. 

E. The attack was TCP based. 

Answer: B,D 

Q2. - (Topic 3) 

Which of the following features could be used by an administrator to block FTP uploads while still allowing FTP downloads? 

A. Anti-Virus File-Type Blocking 

B. Data Leak Prevention 

C. Network Admission Control 

D. FortiClient Check 

Answer:

Q3. - (Topic 2) 

In Transparent Mode, forward-domain is an attribute of ______________. 

A. an interface 

B. a firewall policy 

C. a static route 

D. a virtual domain 

Answer:

Q4. - (Topic 3) 

The transfer of encrypted files or the use of encrypted protocols between users and servers on the internet can frustrate the efforts of administrators attempting to monitor traffic passing through the FortiGate unit and ensuring user compliance to corporate rules. 

Which of the following items will allow the administrator to control the transfer of encrypted data through the FortiGate unit? (Select all that apply.) 

A. Encrypted protocols can be scanned through the use of the SSL proxy. 

B. DLP rules can be used to block the transmission of encrypted files. 

C. Firewall authentication can be enabled in the firewall policy, preventing the use of encrypted communications channels. 

D. Application control can be used to monitor the use of encrypted protocols; alerts can be sent to the administrator through email when the use of encrypted protocols is attempted. 

Answer: A,B,D 

Q5. - (Topic 1) 

Which of the following methods can be used to access the CLI? (Select all that apply.) 

A. By using a direct connection to a serial console. 

B. By using the CLI console window in the GUI. 

C. By using an SSH connection. 

D. By using a Telnet connection. 

Answer: A,B,C,D 

Q6. - (Topic 3) 

Which of the following tasks fall under the responsibility of the SSL proxy in a typical HTTPS connection? (Select all that apply.) 

A. The web client SSL handshake. 

B. The web server SSL handshake. 

C. File buffering. 

D. Communication with the urlfilter process. 

Answer: A,B 

Q7. - (Topic 1) 

You wish to create a firewall policy that applies only to traffic intended for your web server. The web server has an IP address of 192.168.2.2 and a /24 subnet mask. When defining the firewall address for use in this policy, which one of the following addresses is correct? 

A. 192.168.2.0 / 255.255.255.0 

B. 192.168.2.2 / 255.255.255.0 

C. 192.168.2.0 / 255.255.255.255 

D. 192.168.2.2 / 255.255.255.255 

Answer:

Q8. - (Topic 1) 

Each UTM feature has configurable UTM objects such as sensors, profiles or lists that define how the feature will function. 

An administrator must assign a set of UTM features to a group of users. 

Which of the following is the correct method for doing this? 

A. Enable a set of unique UTM features under "Edit User Group". 

B. The administrator must enable the UTM features in an identify-based policy applicable to the user group. 

C. When defining the UTM objects, the administrator must list the user groups which will use the UTM object. 

D. The administrator must apply the UTM features directly to a user object. 

Answer:

Q9. - (Topic 1) 

Which of the following are valid FortiGate device interface methods for handling DNS requests? (Select all that apply.) 

A. Forward-only 

B. Non-recursive 

C. Recursive 

D. Iterative 

E. Conditional-forward 

Answer: A,B,C 

Q10. - (Topic 2) 

Review the IPsec phase1 configuration in the Exhibit shown below; then answer the question following it. 

Which of the following statements are correct regarding this configuration? (Select all that apply). 

A. The phase1 is for a route-based VPN configuration. 

B. The phase1 is for a policy-based VPN configuration. 

C. The local gateway IP is the address assigned to port1. 

D. The local gateway IP address is 10.200.3.1. 

Answer: A,C