Our pass rate is high to 98.9% and the similarity percentage between our NSE5 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Fortinet NSE5 exam in just one try? I am currently studying for the Fortinet NSE5 exam. Latest Fortinet NSE5 Test exam practice questions and answers, Try Fortinet NSE5 Brain Dumps First.

Q33. - (Topic 1) 

Each UTM feature has configurable UTM objects such as sensors, profiles or lists that define how the feature will function. How are UTM features applied to traffic? 

A. One or more UTM features are enabled in a firewall policy. 

B. In the system configuration for that UTM feature, you can identify the policies to which the feature is to be applied. 

C. Enable the appropriate UTM objects and identify one of them as the default. 

D. For each UTM object, identify which policy will use it. 

Answer:


Q34. - (Topic 1) 

Which Fortinet products & features could be considered part of a comprehensive solution to monitor and prevent the leakage of senstive data? (Select all that apply.) 

A. Archive non-compliant outgoing e-mails using FortiMail. 

B. Restrict unofficial methods of transferring files such as P2P using Application Control lists on a FortiGate. 

C. Monitor database activity using FortiAnalyzer. 

D. Apply a DLP sensor to a firewall policy. 

E. Configure FortiClient to prevent files flagged as sensitive from being copied to a USB disk. 

Answer: A,B,D 


Q35. - (Topic 3) 

A network administrator needs to implement dynamic route redundancy between a FortiGate unit located in a remote office and a FortiGate unit located in the central office. 

The remote office accesses central resources using IPSec VPN tunnels through two different Internet providers. 

What is the best method for allowing the remote office access to the resources through the FortiGate unit used at the central office? 

A. Use two or more route-based IPSec VPN tunnels and enable OSPF on the IPSec virtual interfaces. 

B. Use two or more policy-based IPSec VPN tunnels and enable OSPF on the IPSec virtual interfaces. 

C. Use route-based VPNs on the central office FortiGate unit to advertise routes with a dynamic routing protocol and use a policy-based VPN on the remote office with two or more static default routes. 

D. Dynamic routing protocols cannot be used over IPSec VPN tunnels. 

Answer:


Q36. - (Topic 1) 

Which of the following network protocols can be used to access a FortiGate unit as an administrator? 

A. HTTPS, HTTP, SSH, TELNET, PING, SNMP 

B. FTP, HTTPS, NNTP, TCP, WINS 

C. HTTP, NNTP, SMTP, DHCP 

D. Telnet, FTP, RLOGIN, HTTP, HTTPS, DDNS 

E. Telnet, UDP, NNTP, SMTP 

Answer:


Q37. - (Topic 2) 

FSSO provides a single sign on solution to authenticate users transparently to a FortiGate unit using credentials stored in Windows Active Directory. 

Which of the following statements are correct regarding FSSO in a Windows domain environment when NTLM and Polling Mode are not used? (Select all that apply.) 

A. An FSSO Collector Agent must be installed on every domain controller. 

B. An FSSO Domain Controller Agent must be installed on every domain controller. 

C. The FSSO Domain Controller Agent will regularly update user logon information on the FortiGate unit. 

D. The FSSO Collector Agent will retrieve user information from the Domain Controller Agent and will send the user logon information to the FortiGate unit. 

E. For non-domain computers, the only way to allow FSSO authentication is to install an FSSO client. 

Answer: B,D 


Q38. - (Topic 1) 

Which of the following antivirus and attack definition update features are supported by FortiGate units? (Select all that apply.) 

A. Manual, user-initiated updates from the FortiGuard Distribution Network. 

B. Hourly, daily, or weekly scheduled antivirus and attack definition and antivirus engine updates from the FortiGuard Distribution Network. 

C. Push updates from the FortiGuard Distribution Network. 

D. Update status including version numbers, expiry dates, and most recent update dates and times. 

Answer: A,B,C,D 


Q39. - (Topic 2) 

Review the output of the command get router info routing-table database shown in the Exhibit below; then answer the question following it. 

Which of the following statements are correct regarding this output? (Select all that apply). 

A. There will be six routes in the routing table. 

B. There will be seven routes in the routing table. 

C. There will be two default routes in the routing table. 

D. There will be two routes for the 10.0.2.0/24 subnet in the routing table. 

Answer: A,C 


Q40. - (Topic 1) 

An administrator wants to assign a set of UTM features to a group of users. Which of the following is the correct method for doing this? 

A. Enable a set of unique UTM profiles under "Edit User Group". 

B. The administrator must enable the UTM profiles in an identity-based policy applicable to the user group. 

C. When defining the UTM objects, the administrator must list the user groups which will use the UTM object. 

D. The administrator must apply the UTM features directly to a user object. 

Answer: