Act now and download your Fortinet NSE5 test today! Do not waste time for the worthless Fortinet NSE5 tutorials. Download Most recent Fortinet Fortinet Network Security Expert 5 Written Exam (500) exam with real questions and answers and begin to learn Fortinet NSE5 with a classic professional.

Q16. - (Topic 2) 

Review the IPsec Phase2 configuration shown in the Exhibit; then answer the question following it. 

Which of the following statements are correct regarding this configuration? (Select all that apply). 

A. The Phase 2 will re-key even if there is no traffic. 

B. There will be a DH exchange for each re-key. 

C. The sequence number of ESP packets received from the peer will not be checked. 

D. Quick mode selectors will default to those used in the firewall policy. 

Answer: A,B 


Q17. - (Topic 2) 

Review the CLI configuration below for an IPS sensor and identify the correct statements regarding this configuration from the choices below. (Select all that apply.) 

config ips sensor 

edit "LINUX_SERVER" 

set comment '' 

set replacemsg-group '' 

set log enable 

config entries 

edit 1 

set action default 

set application all 

set location server 

set log enable 

set log-packet enable 

set os Linux set protocol all 

set quarantine none 

set severity all 

set status default 

next 

end 

next 

end 

A. The sensor will log all server attacks for all operating systems. 

B. The sensor will include a PCAP file with a trace of the matching packets in the log message of any matched signature. 

C. The sensor will match all traffic from the address object ‘LINUX_SERVER’. 

D. The sensor will reset all connections that match these signatures. 

E. The sensor only filters which IPS signatures to apply to the selected firewall policy. 

Answer: B,E 


Q18. - (Topic 1) 

Under the System Information widget on the dashboard, which of the following actions are available for the system configuration? (Select all that apply.) 

A. Backup 

B. Restore 

C. Revisions 

D. Export 

Answer: A,B,C 


Q19. - (Topic 1) 

Which of the following antivirus and attack definition update options are supported by FortiGate units? (Select all that apply.) 

A. Manual update by downloading the signatures from the support site. 

B. Pull updates from the FortiGate device 

C. Push updates from the FortiGuard Distribution Network. 

D. ”update-AV/AS” command from the CLI 

Answer: A,B,C 


Q20. - (Topic 1) 

The ordering of firewall policies is very important. Policies can be re-ordered within the FortiGate unit’s GUI and also using the CLI. The command used in the CLI to perform this function is ______ . 

A. set order 

B. edit policy 

C. reorder 

D. move 

Answer:


Q21. - (Topic 3) 

An administrator logs into a FortiGate unit using an account which has been assigned a super_admin profile. Which of the following operations can this administrator perform? 

A. They can delete logged-in users who are also assigned the super_admin access profile. 

B. They can make changes to the super_admin profile. 

C. They can delete the admin account if the default admin user is not logged in. 

D. They can view all the system configuration settings but can not make changes. 

E. They can access configuration options for only the VDOMs to which they have been assigned. 

Answer:


Q22. - (Topic 2) 

What advantages are there in using a hub-and-spoke IPSec VPN configuration instead of a 

fully-meshed set of IPSec tunnels? (Select all that apply.) 

A. Using a hub and spoke topology is required to achieve full redundancy. 

B. Using a hub and spoke topology simplifies configuration because fewer tunnels are required. 

C. Using a hub and spoke topology provides stronger encryption. 

D. The routing at a spoke is simpler, compared to a meshed node. 

Answer: B,D 


Q23. - (Topic 3) 

A FortiGate administrator configures a Virtual Domain (VDOM) for a new customer. After creating the VDOM, the administrator is unable to reassign the dmz interface to the new VDOM as the option is greyed out in Web Config in the management VDOM. 

What would be a possible cause for this problem? 

A. The dmz interface is referenced in the configuration of another VDOM. 

B. The administrator does not have the proper permissions to reassign the dmz interface. 

C. Non-management VDOMs can not reference physical interfaces. 

D. The dmz interface is in PPPoE or DHCP mode. 

E. Reassigning an interface to a different VDOM can only be done through the CLI. 

Answer:


Q24. - (Topic 1) 

You wish to create a firewall policy that applies only to traffic intended for your web server. The server has an IP address of 192.168.2.2 and belongs to a class C subnet. When defining the firewall address for use in this policy, which one of the following addressing formats is correct? 

A. 192.168.2.0 / 255.255.255.0 

B. 192.168.2.2 / 255.255.255.0 

C. 192.168.2.0 / 255.255.255.255 

D. 192.168.2.2 / 255.255.255.255 

Answer:


Q25. - (Topic 3) 

An administrator is examining the attack logs and notices the following entry: 

type=ips subtype=signature pri=alert vd=root serial=1995 attack_id=103022611 src=69.45.64.22 dst=192.168.1.100 src_port=80 dst_port=4887 src_int=wlan dst_int=internal status=detected proto=6 service=4887/tcp user=N/A group=N/A msg=web_client: IE.IFRAME.BufferOverflow.B 

Based on the information displayed in this entry, which of the following statements are correct? (Select all that apply.) 

A. This is an HTTP server attack. 

B. The attack was detected and blocked by the FortiGate unit. 

C. The attack was against a FortiGate unit at the 192.168.1.100 IP address. 

D. The attack was detected and passed by the FortiGate unit. 

Answer: C,D 


Q26. - (Topic 1) 

A FortiGate unit can scan for viruses on which types of network traffic? (Select all that apply.) 

A. POP3 

B. FTP 

C. SMTP 

D. SNMP 

E. NetBios 

Answer: A,B,C 


Q27. - (Topic 1) 

Which of the following statements correctly describes how a FortiGate unit functions in Transparent mode? 

A. To manage the FortiGate unit, one of the interfaces must be designated as the management interface. This interface may not be used for forwarding data. 

B. An IP address is used to manage the FortiGate unit but this IP address is not associated with a specific interface. 

C. The FortiGate unit must use public IP addresses on the internal and external networks. 

D. The FortiGate unit uses private IP addresses on the internal network but hides them using address translation. 

Answer:


Q28. - (Topic 1) 

Which of the following regular expression patterns will make the terms "confidential data" case insensitive? 

A. \[confidential data] 

B. /confidential data/i 

C. i/confidential data/ 

D. "confidential data" 

E. /confidential data/c 

Answer:


Q29. - (Topic 1) 

When firewall policy authentication is enabled, only traffic on supported protocols will trigger an authentication challenge. 

Select all supported protocols from the following: 

A. SMTP 

B. SSH 

C. HTTP 

D. FTP 

E. SCP 

Answer: C,D 


Q30. - (Topic 3) 

A FortiGate unit is configured with three Virtual Domains (VDOMs) as illustrated in the exhibit. 

Which of the following statements are correct regarding these VDOMs? (Select all that apply.) 

A. The FortiGate unit supports any combination of these VDOMs in NAT/Route and Transparent modes. 

B. The FortiGate unit must be a model 1000 or above to support multiple VDOMs. 

C. A license had to be purchased and applied to the FortiGate unit before VDOM mode could be enabled. 

D. All VDOMs must operate in the same mode. 

E. Changing a VDOM operational mode requires a reboot of the FortiGate unit. 

F. An admin account can be assigned to one VDOM or it can have access to all three VDOMs. 

Answer: A,F