Fortinet Network Security Expert 6 Sample Questions:
1. Which methods can be used to submit files to FortiSandbox for inspection? (Choose two.)
A) FTP upload
B) File shares
C) SFTP upload
D) JSON API
2. Two FortiADC devices (ADC-1 and ADC-2) form an HA cluster. The following exhibits shows the HA configuration for both FortiADC devices:
If both FortiADC devices are up and operational. which FortiADC is the HA active
FortiADC?
A) FortiADC-2
B) The FortiADC that has the highest HA uptime value
C) FortiADC-1
D) The FortiADC that has the highest-sorting serial number
3. If the corporate email policy dictates that SMTP over SSL/TLS is preferred for inbound
SMTP connections and required for outbound SMTP connections, which FortiMail configuration object would be used?
A) Recipient policies
B) Session profiles
C) Access control rules
D) IP policies
4. You are a FortiAuthenticator administrator for a large organization, and suddenly all of the
FortiToken 200 users in the organization are unable to authenticate using their tokens.
What is the most probable reason?
A) The tokens have all been locked.
B) The FortiAuthenticator system time is not synchronized using NTP and has drifted.
C) The X.509 certificates on the tokens, or the root CA certificate that signed the certificates, have been revoked.
D) The clocks on all the tokens have drifted and require re-synchronizing.
5. What is the maximum number of sites (or peers) supported in a global load-balancing solution based on FortiADC?
A) 32
B) 2
C) 64
D) 256
Solutions:
Question # 1 Answer: B,D | Question # 2 Answer: A | Question # 3 Answer: C | Question # 4 Answer: B,D | Question # 5 Answer: D |