Marcos Avila
Quiz by , created more than 1 year ago

NSE4 6.0 NSE4 6.0 Quiz on Firewall Authentication II, created by Marcos Avila on 17/09/2018.

1174
1
0
Marcos Avila
Created by Marcos Avila over 5 years ago
Close

Firewall Authentication II

Question 1 of 8

1

Which statement about guest user groups is true?

Select one of the following:

  • A. Guest user group accounts are temporary.

  • B. Guest user group account passwords are temporary.

Explanation

Question 2 of 8

1

Guest accounts are most commonly used for which of the following purposes?

Select one of the following:

  • A. To provide temporary visitor access to corporate network resources

  • B. To provide temporary visitor access to wireless networks

Explanation

Question 3 of 8

1

Firewall policies dictate whether a user or device can (or cannot) authenticate to a network. Which statement about firewail authentication is true?

Select one of the following:

  • A. Firewall policies can be configured to authenticate certificate users.

  • B. The order of the firewall policies always determines whether a user's credentials are determined actively or passively.

Explanation

Question 4 of 8

1

Which statement about active authentication is true?

Select one of the following:

  • A. Active authentication is always used before passive authentication.

  • B. The firewall policy must allow the HTTP, HTTPS, FTP, and/or Telnet protocols in order for the user to be prompted for credentials.

Explanation

Question 5 of 8

1

Authentication timeout

Three options for behavior:
- -No traffic for that amount of me

- expires after that amount of time. regardless of activity

- expires if no new session is created in that amount of time

Drag and drop to complete the text.

    Idle (default)
    Hard—Authentication
    New session-Authentication

Explanation

Question 6 of 8

1

Which statements about captive portal is true?

Select one of the following:

  • A. Captive portal must be hosted on a FortiGate device.

  • B. Captive portal can exempt specific devices from authenticating.

Explanation

Question 7 of 8

1

Which statement best describes the authentication idle timeout feature on FortiGate?

Select one of the following:

  • A. The length of time FortiGate waits for the user to enter their authentication credentials

  • B. The length of time an authenticated user is allowed to remain authenticated without any packets being generated by the host device

Explanation

Question 8 of 8

1

Which command would you use to identify the IP addresses of all authenticated users?

Select one of the following:

  • A. diagnose firewall auth clear

  • B. diagnose firewall auth list

Explanation