Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE6_FAC-6.4 Exam

Certification Provider: Fortinet
Exam Name: Fortinet NSE 6 - FortiAuthenticator 6.4
Duration: 60 Minutes
Number of questions in our database: 47
Exam Version: Feb. 09, 2024
NSE6_FAC-6.4 Exam Official Topics:
  • Topic 1: Understand and configure administrative accounts and roles/ Configure tokens and two-factor authentication
  • Topic 2: Use local authentication events for Fortinet Single Sign-On (FSSO)/ Implement RADIUS profiles and realms for RADIUS authentication
  • Topic 3: Implement SAML roles on FortiAuthenticator for the SAML SSO service/ Configure FortiAuthenticator for deployment
  • Topic 4: Use FortiAuthenticator portal services to authenticate local and remote users/ Configure and manage supported remote authentication services
  • Topic 5: Use the FortiAuthenticator certificate management service to generate local certificates/ Configure and manage user accounts
  • Topic 6: Integrate FortiAuthenticator with Active Directory (AD) to detect logon events/ Describe key concepts of PKI and digital certificates
  • Topic 7: Use third-party logon events via RADIUS single sign-on (RSSO), tags, and logs to generate FSSO events/ Configure advanced system settings

Free Fortinet NSE6_FAC-6.4 Exam Actual Questions

The questions for NSE6_FAC-6.4 were last updated On Feb. 09, 2024

Question #1

You want to monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP.

Which two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface? (Choose two)

Reveal Solution Hide Solution
Correct Answer: B, C

To monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP, two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface:

Set the thresholds to trigger SNMP traps for various system events, such as CPU usage, disk usage, memory usage, or temperature.

Upload management information base (MIB) files to SNMP server to enable the server to interpret the SNMP traps sent by FortiAuthenticator.


Question #2

Which statement about captive portal policies is true, assuming a single policy has been defined?

Reveal Solution Hide Solution
Correct Answer: B

Captive portal policies are used to define the conditions and settings for presenting a captive portal to users who need to authenticate before accessing the network. A captive portal policy consists of a set of conditions and a set of actions. The conditions can be based on various attributes, such as source IP address, MAC address, user group, device type, or RADIUS client. The actions can include redirecting the user to a specific portal, applying a specific authentication method, or assigning a specific VLAN or firewall policy. A single policy can have multiple conditions, and all conditions in the policy must match before a user is presented with the captive portal.


Question #3

Which method is the most secure way of delivering FortiToken data once the token has been seeded?

Reveal Solution Hide Solution
Correct Answer: A

Online activation of the tokens through the FortiGuard network is the most secure way of delivering FortiToken data once the token has been seeded because it eliminates the risk of seed files being compromised during transit or storage. The other methods involve physical or manual delivery of seed files which can be intercepted, lost, or stolen. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372403/fortitoken


Question #4

At a minimum, which two configurations are required to enable guest portal services on FortiAuthenticator? (Choose two)

Reveal Solution Hide Solution
Correct Answer: A, B

enable guest portal services on FortiAuthenticator, you need to configure a portal policy that defines the conditions for presenting the guest portal to users and the authentication methods to use. You also need to configure at least one post-login service that defines what actions to take after a user logs in successfully, such as sending an email confirmation, assigning a VLAN, or creating a user account. Configuring a RADIUS client or an external authentication portal are optional steps that depend on your network setup and requirements. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372404/guest-management


Question #5

When you are setting up two FortiAuthenticator devices in active-passive HA, which HA role must you select on the master FortiAuthenticator?

Reveal Solution Hide Solution
Correct Answer: A

When you are setting up two FortiAuthenticator devices in active-passive HA, you need to select the active-passive master role on the master FortiAuthenticator device. This role means that the device will handle all requests and synchronize data with the slave device until a failover occurs. The slave device must be configured as an active-passive slave role. The other roles are used for different HA modes, such as standalone (no HA), cluster (active-active), or load balancing (active-active with load balancing). Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372411/high-availability



Unlock all NSE6_FAC-6.4 Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now
Disscuss Fortinet NSE6_FAC-6.4 Topics, Questions or Ask Anything Related

Save Cancel