NSE5 Premium Bundle

NSE5 Premium Bundle

Fortinet Network Security Expert 5 Written Exam (500) Certification Exam

4.5 
(22605 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Fortinet NSE5 Free Practice Questions

Q1. - (Topic 2) 

Two FortiGate devices fail to form an HA cluster, the device hostnames are STUDENT and REMOTE. Exhibit A shows the command output of 'show system ha' for the STUDENT device. Exhibit B shows the command output of 'show system ha' for the REMOTE device. 

Exhibit A: 

Exhibit B 

Which one of the following is the most likely reason that the cluster fails to form? 

A. Password 

B. HA mode 

C. Hearbeat 

D. Override 

Answer:

Q2. - (Topic 2) 

What are the requirements for a cluster to maintain TCP connections after device or link failover? (Select all that apply.) 

A. Enable session pick-up. 

B. Only applies to connections handled by a proxy. 

C. Only applies to UDP and ICMP connections. 

D. Connections must not be handled by a proxy. 

Answer: A,D 

Q3. - (Topic 1) 

Which statement is correct regarding virus scanning on a FortiGate unit? 

A. Virus scanning is enabled by default. 

B. Fortinet Customer Support enables virus scanning remotely for you. 

C. Virus scanning must be enabled in a protection profile and the protection profile must be assigned to a firewall policy. 

D. Enabling virus scanning in a protection profile enables virus scanning for all traffic flowing through the FortiGate. 

Answer:

Q4. - (Topic 1) 

The ordering of firewall policies is very important. Policies can be re-ordered within the FortiGate Web Config and also using the CLI. The command used in the CLI to perform this function is __________. 

A. set order 

B. edit policy 

C. reorder 

D. move 

Answer:

Q5. - (Topic 1) 

Which of the following regular expression patterns will make the terms "confidential data" case insensitive? 

A. \[confidential data] 

B. /confidential data/i 

C. i/confidential data/ 

D. "confidential data" 

E. /confidential data/c 

Answer:

Q6. - (Topic 2) 

Which of the following statements correctly describe Transparent Mode operation? (Select all that apply.) 

A. The FortiGate unit acts as transparent bridge and routes traffic using Layer-2 forwarding. 

B. Ethernet packets are forwarded based on destination MAC addresses NOT IPs. 

C. The device is transparent to network hosts. 

D. Permits inline traffic inspection and firewalling without changing the IP scheme of the network. 

E. All interfaces must be on different IP subnets. 

Answer: A,B,C,D 

Q7. - (Topic 1) 

Which of the following statements is correct regarding URL Filtering on the FortiGate unit? 

A. The available actions for URL Filtering are Allow and Block. 

B. Multiple URL Filter lists can be added to a single Web filter profile. 

C. A FortiGuard Web Filtering Override match will override a block action in the URL filter list. 

D. The available actions for URL Filtering are Allow, Block and Exempt. 

Answer:

Q8. - (Topic 3) 

Which of the following statements is correct based on the firewall configuration illustrated in the exhibit? 

A. A user can access the Internet using only the protocols that are supported by user authentication. 

B. A user can access the Internet using any protocol except HTTP, HTTPS, Telnet, and FTP. These require authentication before the user will be allowed access. 

C. A user must authenticate using the HTTP, HTTPS, SSH, FTP, or Telnet protocol before they can access any services. 

D. A user cannot access the Internet using any protocols unless the user has passed firewall authentication. 

Answer:

Q9. - (Topic 3) 

Which of the following statements is correct regarding the FortiGuard Services Web Filtering Override configuration as illustrated in the exhibit? 

A. Any client on the same subnet as the authenticated user is allowed to access www.yahoo.com/images/. 

B. A client with an IP of address 10.10.10.12 is allowed access to any subdirectory that is part of the www.yahoo.com web site. 

C. A client with an IP address of 10.10.10.12 is allowed access to the www.yahoo.com/images/ web site and any of its offsite URLs. 

D. A client with an IP address of 10.10.10.12 is allowed access to any URL under the www.yahoo.com web site, including any subdirectory URLs, until August 7, 2009. 

E. Any client on the same subnet as the authenticated user is allowed to access www.yahoo.com/images/ until August 7, 2009. 

Answer:

Q10. - (Topic 1) 

Which of the following methods can be used to access the CLI? (Select all that apply.) A. By using a direct connection to a serial console. 

B. By using the CLI console window in Web Config. 

C. By using an SSH connection. 

D. By using a Telnet connection. 

Answer: A,B,C,D 

Q11. - (Topic 2) 

Review the output of the command get router info routing-table database shown in the Exhibit below; then answer the question following it. 

Which of the following statements are correct regarding this output? (Select all that apply). 

A. There will be six routes in the routing table. 

B. There will be seven routes in the routing table. 

C. There will be two default routes in the routing table. 

D. There will be two routes for the 10.0.2.0/24 subnet in the routing table. 

Answer: A,C 

Q12. - (Topic 3) 

An administrator is examining the attack logs and notices the following entry: 

device_id=FG100A3907508962 log_id=18432 subtype=anomaly type=ips timestamp=1270017358 pri=alert itime=1270017893 severity=critical src=192.168.1.52 dst=64.64.64.64 src_int=internal serial=0 status=clear_session proto=6 service=http vd=root count=1 src_port=35094 dst_port=80 attack_id=100663402 sensor=protect-servers ref=http://www.fortinet.com/ids/VID100663402 msg="anomaly: tcp_src_session, 2 > threshold 1" policyid=0 carrier_ep=N/A profile=N/A dst_int=N/A user=N/A group=N/A 

Based solely upon this log message, which of the following statements is correct? 

A. This attack was blocked by the HTTP protocol decoder. 

B. This attack was caught by the DoS sensor "protect-servers". 

C. This attack was launched against the FortiGate unit itself rather than a host behind the FortiGate unit. 

D. The number of concurrent connections to destination IP address 64.64.64.64 has exceeded the configured threshold. 

Answer:

Q13. - (Topic 1) 

Which of the following statements is correct regarding URL Filtering on the FortiGate unit? 

A. The FortiGate unit can filter URLs based on patterns using text and regular expressions. 

B. The available actions for URL Filtering are Allow and Block. 

C. Multiple URL Filter lists can be added to a single Web filter profile. 

D. A FortiGuard Web Filtering Override match will override a block action in the URL filter list. 

Answer:

Q14. - (Topic 1) 

A FortiGate unit can act as which of the following? (Select all that apply.) 

A. Antispam filter 

B. Firewall 

C. VPN gateway 

D. Mail relay 

E. Mail server 

Answer: A,B,C 

Q15. - (Topic 3) 

In which of the following report templates would you configure the charts to be included in the report? 

A. Layout Template 

B. Data Filter Template 

C. Output Template 

D. Schedule Template 

Answer: A

START NSE5 EXAM