2017/July Fortinet NSE6 Exam Dumps with PDF and VCE New Updated in www.Braindump2go.com Today!
100% NSE6 Real Exam Questions! 100% NSE6 Exam Pass Guaranteed!
1.|2017 New NSE6 Exam Dumps (PDF & VCE) 205Q&As Download:
2.|2017 New NSE6 Exam Questions & Answers Download:
Which devices can receive logs from FortiSandbox? (Choose two.)
A. SNMP manager
FortiGate is configured to send suspicious files to a FortiSandbox for in-line inspection.
The administrator creates a new VDOM, and then generates some traffic so what the new VDOM sends a file to the FortiSandbox for the first time.
Which is true regarding this scenario?
A. FortiSandbox will store the file, but not inspect it until the administrator manually authorizes the new VDOM.
B. Before generating traffic, the administrator can push the VDOM configuration from the FortiGate to the FortiSandbox.
Then when FortiSandbox receives the file, FortiSandbox will inspect the file.
C. FortiSandbox can be pre-configured to automatically authorize the new VDOM and inspect the file.
D. FortiSandbox will store the file, but not inspect it until the administrator manually adds the new VDOM to the FortiSandbox configuration.
Which two types of digital certificates can you create in FortiAuthenticator? (Choose two.)
A. 3rd-party root certificate
B. Local services certificate
C. User certificate
Which is true regarding Microsoft Office on FortiSandbox?
A. Microsoft Word documents (.docx) are not inspected.
B. Office 365 files are not supported.
C. Microsoft Office is not included. You must purchase it separately, then manually install it in the applicable VMs on FortiSandbox.
D. Office 2013 is installed in one of the VMs.
Which is not a supported captive portal authentication method?
A. SMS self-registration
B. Facebook authentication
C. Apple ID authentication
D. MAC address authentication
An administrator is running the following sniffer in a FortiADC:
What information is included in the output of the sniffer? (Choose two.)
A. IP headers
B. Ethernet headers
C. IP payload
D. Port names
Which protocols can a FortiSandbox inspect when is deployed in sniffer mode? (Choose two.)
Which of the following statements best describe what a SYN cookie does when a SYN packet is received?
A. It replies with a SYN/ACK packet containing a cookie value on the TCP acknowledge field.
B. It replies with a RST packet if the SYN packet doesn’t contain the right cookie in the sequence field.
C. It replies with two SYN/ACK packets. One containing the right acknowledge values, and one containing a wrong acknowledge value.
D. It sends a SYN/ACK with a cookie in the sequence field.
Which of the following features are available in all FortiADC models? (Choose three.)
A. Intrusion protection signatures
B. SSL acceleration
C. HTTP cookie persistence
D. Source IP persistence
E. Antivirus scanning
The sender validation techniques SPF and DKIM rely on data provided by what type of entity?
A. The upstream MTA
B. The sender’s LDAP server
C. The sender’s DNS records
D. The sender’s email envelope
What is the maximum number of sites (or peers) supported in a global load-balancing solution based on FortiADC?
What statement is true for the self-service portal? (Choose two.)
A. Administrator approval is required for all self-registrations
B. Self-registration information can be sent to the user through email and SMS
C. Realms can be used to configure what self-registered users or groups can access the network
D. Users self-register through the social portal splash screen
Which FortiADC log severity level corresponds to Log Severity Level 2?
Which methods can be used to submit files to FortiSandbox for inspection? (Choose two.)
A. File shares
B. FTP upload
C. SFTP upload
D. JSON API
Which FortiGate process sends files to FortiSandbox for inspection?
If FortiSandbox connects to FortiGuard through a web proxy server, which FortiSandbox interface must have access to the proxy server?
Which of the following statements about virtual tunneling for outbound link load balancing are true? (Choose three.)
A. Two dispatch algorithms are supported: weighted round robin and source-destination hash.
B. A virtual tunnel can combine point-to-point and multipoint IP tunnels.
C. Link policies are used to specify which traffic is sent through each virtual tunnel.
D. Contains IP tunnels that encapsulate the traffic using a GRE-based proprietary protocol.
E. Each virtual tunnel can contain no more than three IP tunnels.
You want to allow guests to authenticate to your network through Facebook. What configuration is required on FortiAuthenticator? (Choose two.)
A. A RADIUS client, in order to enable the social portal
B. A user group
C. An external authentication portal
D. A Facebook key and secret
If the corporate email policy dictates that SMTP over SSL/TLS is preferred for inbound SMTP connections and required for outbound SMTP connections, which FortiMail configuration object would be used?
A. Recipient policies
B. IP policies
C. Access control rules
D. Session profiles
Which protocols can FortiSandbox use to connect to a network file share? (Choose two.)
In transparent mode, when choosing between using the built-in MTA or using the transparent proxy, what difference might be encountered regarding mail routing?
A. The transparent proxy can only be enabled on a route mode interface.
B. In split-horizon DNS setups, the transparent proxy will get confused and route mail back to the sender.
C. The built-in MTA may decide to route the message to a different next-hop MTA.
D. The transparent proxy may decide to route the message to a different next-hop MTA.
1.|2017 New NSE6 Exam Dumps (PDF & VCE) 205Q&As Download:
2.|2017 New NSE6 Study Guide Video:
|One Time Purchase||✔||✖||✖||✖||✖|
|100% Pass Guarantee||✔||✖||✖||✖||✖|
|100% Money Back||✔||✖||✖||✖||✖|