Act now and download your Fortinet NSE5 test today! Do not waste time for the worthless Fortinet NSE5 tutorials. Download Regenerate Fortinet Fortinet Network Security Expert 5 Written Exam (500) exam with real questions and answers and begin to learn Fortinet NSE5 with a classic professional.

2021 Sep NSE5 real exam

Q51. - (Topic 1) 

What are the valid sub-types for a Firewall type policy? (Select all that apply) 

A. Device Identity 

B. Address 

C. User Identity 

D. Schedule 

E. SSL VPN 

Answer: A,B,C 


Q52. - (Topic 3) 

What advantages are there in using a hub-and-spoke IPSec VPN configuration instead of a fully-meshed set of IPSec tunnels? (Select all that apply.) 

A. Using a hub and spoke topology is required to achieve full redundancy. 

B. Using a hub and spoke topology simplifies configuration. 

C. Using a hub and spoke topology provides stronger encryption. 

D. Using a hub and spoke topology reduces the number of tunnels. 

Answer: B,D 


Q53. - (Topic 2) 

Shown below is a section of output from the debug command diag ip arp list. 

index=2 ifname=port1 172.20.187.150 00:09:0f:69:03:7e state=00000004 use=4589 confirm=4589 update=2422 ref=1 

In the output provided, which of the following best describes the IP address 172.20.187.150? 

A. It is the primary IP address of the port1 interface. 

B. It is one of the secondary IP addresses of the port1 interface. 

C. It is the IP address of another network device located in the same LAN segment as the FortiGate unit’s port1 interface. 

Answer: C 


Q54. - (Topic 1) 

Which of the following statements regarding Banned Words are correct? (Select all that apply.) 

A. The FortiGate unit can scan web pages and email messages for instances of banned words. 

B. When creating a banned word list, an administrator can indicate either specific words or patterns. 

C. Banned words can be expressed as simple text, wildcards or regular expressions. 

D. Content is automatically blocked if a single instance of a banned word appears. 

E. The FortiGate unit updates banned words on a periodic basis. 

Answer: A,B,C 


Q55. - (Topic 3) 

Which of the following methods does the FortiGate unit use to determine the availability of a web cache using Web Cache Communication Protocol (WCCP)? 

A. The FortiGate unit receives periodic "Here I am" messages from the web cache. 

B. The FortiGate unit polls all globally-defined web cache servers at a regular intervals. 

C. The FortiGate using uses the health check monitor to verify the availability of a web cache server. 

D. The web cache sends an "I see you" message which is captured by the FortiGate unit. 

Answer: C 


NSE5 download

Improved NSE5 practice:

Q56. - (Topic 1) 

Which of the statements below are true regarding firewall policy disclaimers? (Select all that apply.) 

A. User must accept the disclaimer to proceed with the authentication process. 

B. The disclaimer page is customizable. 

C. The disclaimer cannot be used in combination with user authentication. 

D. The disclaimer can only be applied to wireless interfaces. 

Answer: A,B 


Q57. - (Topic 2) 

Two FortiGate devices fail to form an HA cluster, the device hostnames are STUDENT and REMOTE. Exhibit A shows the command output of 'show system ha' for the STUDENT device. Exhibit B shows the command output of 'show system ha' for the REMOTE device. 

Exhibit A: 


Exhibit B 


Which one of the following is the most likely reason that the cluster fails to form? 

A. Password 

B. HA mode 

C. Hearbeat 

D. Override 

Answer: B 


Q58. - (Topic 3) 

An administrator configures a VPN and selects the Enable IPSec Interface Mode option in the phase 1 settings. 

Which of the following statements are correct regarding the IPSec VPN configuration? 

A. To complete the VPN configuration, the administrator must manually create a virtual IPSec interface in Web Config under System > Network. 

B. The virtual IPSec interface is automatically created after the phase1 configuration. 

C. The IPSec policies must be placed at the top of the list. 

D. This VPN cannot be used as part of a hub and spoke topology. 

E. Routes were automatically created based on the address objects in the firewall policies. 

Answer: B 


Q59. - (Topic 3) 

The following diagnostic output is displayed in the CLI: 

diag firewall auth list 

policy iD. 9, srC. 192.168.3.168, action: accept, timeout: 13427 

user: forticlient_chk_only, group: 

flag (80020): auth timeout_ext, flag2 (40): exact 

group iD. 0, av group: 0 

----- 1 listed, 0 filtered ------

Based on this output, which of the following statements is correct? 

A. Firewall policy 9 has endpoint compliance enabled but not firewall authentication. 

B. The client check that is part of an SSL VPN connection attempt failed. 

C. This user has been associated with a guest profile as evidenced by the group id of 0. 

D. An auth-keepalive value has been enabled. 

Answer: A 


Q60. - (Topic 3) 

Which of the following statements correctly describes the deepscan option for HTTPS? 

A. When deepscan is disabled, only the web server certificate is inspected; no decryption of content occurs. 

B. Enabling deepscan will perform further checks on the server certificate. 

C. Deepscan is only applicable to mail protocols, where all IP addresses in the header are checked. 

D. With deepscan enabled, archived files will be decompressed before scanning for a more comprehensive file inspection. 

Answer: A