how to use nse4 dumps

Cause all that matters here is passing the Fortinet fortinet nse4 exam. Cause all that you need is a high score of nse4 dumps Fortinet Network Security Expert 4 Written Exam (400) exam. The only one thing you need to do is downloading Exambible nse4 exam exam study guides now. We will not let you down with our money-back guarantee.


Free VCE & PDF File for Fortinet NSE4 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW NSE4 Exam Dumps (PDF & VCE):
Available on:

Q31. – (Topic 10) 

Which statements are true regarding traffic shaping that is applied in an application sensor, and associated with a firewall policy? (Choose two.) 

A. Shared traffic shaping cannot be used. 

B. Only traffic matching the application control signature is shaped. 

C. Can limit the bandwidth usage of heavy traffic applications. 

D. Per-IP traffic shaping cannot be used. 

Answer: B,C 

Q32. – (Topic 13) 

Which statements are correct for port pairing and forwarding domains? (Choose two.) 

A. They both create separate broadcast domains. 

B. Port Pairing works only for physical interfaces. 

C. Forwarding Domain only applies to virtual interfaces. 

D. They may contain physical and/or virtual interfaces. 

Answer: A,D 

Q33. – (Topic 15) 

Which IPsec mode includes the peer id information in the first packet? 

A. Main mode. 

B. Quick mode. 

C. Aggressive mode. 

D. IKEv2 mode. 


Q34. – (Topic 11) 

Examine the two static routes to the same destination subnet as shown below; then answer the question following it. config router static edit 1 set dst set distance 20 set priority 10 set device port1 next edit 2 set dst set distance 20 set priority 20 set device port2 



Which of the following statements correctly describes the static routing configuration provided above? 

A. The FortiGate evenly shares the traffic to through both routes. 

B. The FortiGate shares the traffic to through both routes, but the port2 route will carry approximately twice as much of the traffic. 

C. The FortiGate sends all the traffic to through port1. 

D. Only the route that is using port1 will show up in the routing table. 


Q35. – (Topic 1) 

How is the FortiGate password recovery process? 

A. Interrupt boot sequence, modify the boot registry and reboot. After changing the password, reset the boot registry. 

B. Log in through the console port using the “maintainer” account within several seconds of physically power cycling the FortiGate. 

C. Hold down the CTRL + Esc (Escape) keys during reboot, then reset the admin password. 

D. Interrupt the boot sequence and restore a configuration file for which the password has 

been modified. 


Q36. – (Topic 3) 

In which order are firewall policies processed on a FortiGate unit? 

A. From top to down, according with their sequence number. 

B. From top to down, according with their policy ID number. 

C. Based on best match. 

D. Based on the priority value. 


Q37. – (Topic 9) 

Which web filtering inspection mode inspects DNS traffic? 

A. DNS-based. 

B. FQDN-based. 

C. Flow-based. 

D. URL-based. 


Q38. – (Topic 8) 

Which two methods are supported by the web proxy auto-discovery protocol (WPAD) to automatically learn the URL where a PAC file is located? (Choose two.) 




D. IPv6 autoconfiguration 

Answer: A,C 

Q39. – (Topic 12) 

A FortiGate is operating in NAT/Route mode and configured with two virtual LAN (VLAN) sub-interfaces added to the same physical interface. 

Which one of the following statements is correct regarding the VLAN IDs in this scenario? 

A. The two VLAN sub-interfaces can have the same VLAN ID only if they have IP addresses in different subnets. 

B. The two VLAN sub-interfaces must have different VLAN IDs. 

C. The two VLAN sub-interfaces can have the same VLAN ID only if they belong to different VDOMs. 

D. The two VLAN sub-interfaces can have the same VLAN ID if they are connected to different L2 IEEE 802.1Q compliant switches. 


Q40. – (Topic 10) 

Which statements are correct regarding application control? (Choose two.) 

A. It is based on the IPS engine. 

B. It is based on the AV engine. 

C. It can be applied to SSL encrypted traffic. 

D. Application control cannot be applied to SSL encrypted traffic. 

Answer: A,C