Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

NSE6_FAC-6.4 Sample Questions Answers

Questions 4

A device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentialis.

In this case, which user idendity discovery method can Fortiauthenticator use?

Options:

A.

Syslog messaging or SAML IDP

B.

Kerberos-base authentication

C.

Radius accounting

D.

Portal authentication

Buy Now
Questions 5

Which two protocols are the default management access protocols for administrative access for FortiAuthenticator? (Choose two)

Options:

A.

Telnet

B.

HTTPS

C.

SSH

D.

SNMP

Buy Now
Questions 6

When you are setting up two FortiAuthenticator devices in active-passive HA, which HA role must you select on the master FortiAuthenticator?

Options:

A.

Active-passive master

B.

Standalone master

C.

Cluster member

D.

Load balancing master

Buy Now
Questions 7

You have implemented two-factor authentication to enhance security to sensitive enterprise systems.

How could you bypass the need for two-factor authentication for users accessing form specific secured networks?

Options:

A.

Create an admin realm in the authentication policy

B.

Specify the appropriate RADIUS clients in the authentication policy

C.

Enable Adaptive Authentication in the portal policy

D.

Enable the Resolve user geolocation from their IP address option in the authentication policy.

Buy Now
Questions 8

Which two statements about the self-service portal are true? (Choose two)

Options:

A.

Self-registration information can be sent to the user through email or SMS

B.

Realms can be used to configure which seld-registered users or groups can authenticate on the network

C.

Administrator approval is required for all self-registration

D.

Authenticating users must specify domain name along with username

Buy Now
Questions 9

Which two are supported captive or guest portal authentication methods? (Choose two)

Options:

A.

Linkedln

B.

Apple ID

C.

Instagram

D.

Email

Buy Now
Questions 10

Why would you configure an OCSP responder URL in an end-entity certificate?

Options:

A.

To designate the SCEP server to use for CRL updates for that certificate

B.

To identify the end point that a certificate has been assigned to

C.

To designate a server for certificate status checking

D.

To provide the CRL location for the certificate

Buy Now
Questions 11

Which option correctly describes an SP-initiated SSO SAML packet flow for a host without a SAML assertion?

Options:

A.

Service provider contacts idendity provider, idendity provider validates principal for service provider, service provider establishes communication with principal

B.

Principal contacts idendity provider and is redirected to service provider, principal establishes connection with service provider, service provider validates authentication with identify provider

C.

Principal contacts service provider, service provider redirects principal to idendity provider, after succesfull authentication identify provider redirects principal to service provider

D.

Principal contacts idendity provider and authenticates, identity provider relays principal to service provider after valid authentication

Buy Now
Questions 12

An administrator has an active directory (AD) server integrated with FortiAuthenticator. They want members of only specific AD groups to participate in FSSO with their corporate FortiGate firewalls.

How does the administrator accomplish this goal?

Options:

A.

Configure a FortiGate filter on FortiAuthenticatoc

B.

Configure a domain groupings list to identify the desired AD groups.

C.

Configure fine-grained controls on FortiAuthenticator to designate AD groups.

D.

Configure SSO groups and assign them to FortiGate groups.

Buy Now
Questions 13

You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.

What can cause this issue?

Options:

A.

FortiToken 200 license has expired

B.

One of the FortiAuthenticator devices in the active-active cluster has failed

C.

Time drift between FortiAuthenticator and hardware tokens

D.

FortiAuthenticator has lost contact with the FortiToken Cloud servers

Buy Now
Questions 14

Which method is the most secure way of delivering FortiToken data once the token has been seeded?

Options:

A.

Online activation of the tokens through the FortiGuard network

B.

Shipment of the seed files on a CD using a tamper-evident envelope

C.

Using the in-house token provisioning tool

D.

Automatic token generation using FortiAuthenticator

Buy Now
Exam Code: NSE6_FAC-6.4
Exam Name: Fortinet NSE 6 - FortiAuthenticator 6.4
Last Update: Dec 3, 2024
Questions: 47
$66  $164.99
$50  $124.99
$42  $104.99
buy now NSE6_FAC-6.4