NSE 6 Network Security Specialist NSE6_FAC-6.1リアル試験問題と無料最新回答2023年06月25日
NSE6_FAC-6.1究極な学習ガイド
質問 # 16
You want to monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP.
Which two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface?
(Choose two)
- A. Enable logging services
- B. Upload management information base (MIB) files to SNMP server
- C. Associate an ASN, 1 mapping rule to the receiving host
- D. Set the tresholds to trigger SNMP traps
正解:B、D
質問 # 17
What happens when a certificate is revoked? (Choose two)
- A. All certificates signed by a revoked CA certificate are automatically revoked
- B. External CAs will priodically query Fortiauthenticator and automatically download revoked certificates
- C. Revoked certificates are automatically added to the CRL
- D. Revoked certificates cannot be reinstated for any reason
正解:B、C
質問 # 18
Refer to the exhibit.
Examine the screenshot shown in the exhibit.
Which two statements regarding the configuration are true? (Choose two)
- A. All accounts registered through the guest portal must be validated through email
- B. Guest users must fill in all the fields on the registration form
- C. Guest user account will expire after eight hours
- D. All guest accounts created using the account registration feature will be placed under the Guest_Portal_Users group
正解:A、D
質問 # 19
Which FSSO discovery method transparently detects logged off users without having to rely on external features such as WMI polling?
- A. Windows AD polling
- B. FortiClient SSO Mobility Agent
- C. Radius Accounting
- D. DC Polling
正解:B
質問 # 20
Which two are supported captive or guest portal authentication methods? (Choose two)
- A. Email
- B. Linkedln
- C. Apple ID
- D. Instagram
正解:A、B
質問 # 21
How can a SAML metada file be used?
- A. To import the required IDP configuration
- B. To defined a list of trusted user names
- C. To resolve the IDP realm for authentication
- D. To correlate the IDP address to its hostname
正解:A
質問 # 22
Which three of the following can be used as SSO sources? (Choose three)
- A. FortiClient SSO Mobility Agent
- B. Fortigate
- C. FortiAuthenticator in SAML SP role
- D. RADIUS accounting
- E. SSH Sessions
正解:A、C、D
質問 # 23
Which two statements about the EAP-TTLS authentication method are true? (Choose two)
- A. Uses digital certificates only on the server side
- B. Uses mutualauthentication
- C. Requires an EAP server certificate
- D. Support a port access control (wired) solution only
正解:A、C
質問 # 24
Which two types of digital certificates can you create in Fortiauthenticator? (Choose two)
- A. Third-party root certificate
- B. Usercertificate
- C. Organization validation certificate
- D. Local service certificate
正解:B、D
質問 # 25
Which two protocols are the default management access protocols for administrative access for FortiAuthenticator? (Choose two)
- A. SNMP
- B. HTTPS
- C. SSH
- D. Telnet
正解:B、C
質問 # 26
Which two SAML roles can Fortiauthenticator be configured as? (Choose two)
- A. Assertion server
- B. Principal
- C. Service provider
- D. Idendity provider
正解:C、D
質問 # 27
A device or useridentity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentialis.
In this case, which user idendity discovery method can Fortiauthenticator use?
- A. Portal authentication
- B. Radius accounting
- C. Kerberos-base authentication
- D. Syslog messaging or SAML IDP
正解:A
質問 # 28
......
究極なガイド準備NSE6_FAC-6.1認定試験NSE 6 Network Security Specialist:https://www.jpntest.com/shiken/NSE6_FAC-6.1-mondaishu