Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE6_FAC-6.4 Exam

Certification Provider: Fortinet
Exam Name: Fortinet NSE 6 - FortiAuthenticator 6.4
Duration: 60 Minutes
Number of questions in our database: 47
Exam Version: Apr. 16, 2024
NSE6_FAC-6.4 Exam Official Topics:
  • Topic 1: Understand and configure administrative accounts and roles/ Configure tokens and two-factor authentication
  • Topic 2: Use local authentication events for Fortinet Single Sign-On (FSSO)/ Implement RADIUS profiles and realms for RADIUS authentication
  • Topic 3: Implement SAML roles on FortiAuthenticator for the SAML SSO service/ Configure FortiAuthenticator for deployment
  • Topic 4: Use FortiAuthenticator portal services to authenticate local and remote users/ Configure and manage supported remote authentication services
  • Topic 5: Use the FortiAuthenticator certificate management service to generate local certificates/ Configure and manage user accounts
  • Topic 6: Integrate FortiAuthenticator with Active Directory (AD) to detect logon events/ Describe key concepts of PKI and digital certificates
  • Topic 7: Use third-party logon events via RADIUS single sign-on (RSSO), tags, and logs to generate FSSO events/ Configure advanced system settings
Disscuss Fortinet NSE6_FAC-6.4 Topics, Questions or Ask Anything Related

Currently there are no comments in this discussion, be the first to comment!

Free Fortinet NSE6_FAC-6.4 Exam Actual Questions

The questions for NSE6_FAC-6.4 were last updated On Apr. 16, 2024

Question #1

Which method is the most secure way of delivering FortiToken data once the token has been seeded?

Reveal Solution Hide Solution
Correct Answer: A

Online activation of the tokens through the FortiGuard network is the most secure way of delivering FortiToken data once the token has been seeded because it eliminates the risk of seed files being compromised during transit or storage. The other methods involve physical or manual delivery of seed files which can be intercepted, lost, or stolen. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372403/fortitoken


Question #2

You are the administrator of a global enterprise with three FortiAuthenticator devices. You would like to deploy them to provide active-passive HA at headquarters, with geographically distributed load balancing.

What would the role settings be?

Reveal Solution Hide Solution
Correct Answer: B

To deploy three FortiAuthenticator devices to provide active-passive HA at headquarters, with geographically distributed load balancing, the role settings would be:

One standalone primary, which acts as the master device for HA and load balancing

One cluster member, which acts as the backup device for HA and load balancing

One load balancer, which acts as a remote device that forwards authentication requests to the primary or cluster member device


Question #3

Which two SAML roles can Fortiauthenticator be configured as? (Choose two)

Reveal Solution Hide Solution
Correct Answer: A, D

FortiAuthenticator can be configured as a SAML identity provider (IdP) or a SAML service provider (SP). As an IdP, FortiAuthenticator authenticates users and issues SAML assertions to SPs. As an SP, FortiAuthenticator receives SAML assertions from IdPs and grants access to users based on the attributes in the assertions. Principal and assertion server are not valid SAML roles. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372407/saml


Question #4

You want to monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP.

Which two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface? (Choose two)

Reveal Solution Hide Solution
Correct Answer: B, C

To monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP, two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface:

Set the thresholds to trigger SNMP traps for various system events, such as CPU usage, disk usage, memory usage, or temperature.

Upload management information base (MIB) files to SNMP server to enable the server to interpret the SNMP traps sent by FortiAuthenticator.


Question #5

Which statement about captive portal policies is true, assuming a single policy has been defined?

Reveal Solution Hide Solution
Correct Answer: B

Captive portal policies are used to define the conditions and settings for presenting a captive portal to users who need to authenticate before accessing the network. A captive portal policy consists of a set of conditions and a set of actions. The conditions can be based on various attributes, such as source IP address, MAC address, user group, device type, or RADIUS client. The actions can include redirecting the user to a specific portal, applying a specific authentication method, or assigning a specific VLAN or firewall policy. A single policy can have multiple conditions, and all conditions in the policy must match before a user is presented with the captive portal.



Unlock all NSE6_FAC-6.4 Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now

Save Cancel