Fortinet NSE6_FAC-6.4 - Fortinet NSE 6 - FortiAuthenticator 6.4 Exam

Page:    1 / 6   
Total 30 questions

Examine the screenshot shown in the exhibit.

Which two statements regarding the configuration are true? (Choose two.)

  • A. Guest users must fill in all the fields on the registration form.
  • B. All accounts registered through the guest portal must be validated through email.
  • C. All guest accounts created using the account registration feature will be placed under the Guest_Portal_Users group.
  • D. Guest user account will expire after eight hours.


Answer : BC

An administrator is integrating FortiAuthenticator with an existing RADIUS server with the intent of eventually replacing the RADIUS server with FortiAuthenticator.
How can FortiAuthenticator help facilitate this process?

  • A. By configuring the RADIUS accounting proxy
  • B. By enabling automatic REST API calls from the RADIUS server
  • C. By enabling learning mode in the RADIUS server configuration
  • D. By importing the RADIUS user records


Answer : A

You are an administrator for a large enterprise and you want to delegate the creation and management of guest users to a group of sponsors.
How would you associate the guest accounts with individual sponsors?

  • A. As an administrator, you can assign guest groups to individual sponsors.
  • B. Guest accounts are associated with the sponsor that creates the guest account.
  • C. You can automatically add guest accounts to groups associated with specific sponsors.
  • D. Select the sponsor on the guest portal, during registration.


Answer : B

You are a Wi-Fi provider and host multiple domains.
How do you delegate user accounts, user groups and permissions per domain when they are authenticating on a single FortiAuthenticator device?

  • A. Create realms.
  • B. Create user groups.
  • C. Create multiple directory trees on FortiAuthenticator.
  • D. Automatically import hosts from each domain as they authenticate.


Answer : C

You have implemented two-factor authentication to enhance security to sensitive enterprise systems.
How could you bypass the need for two-factor authentication for users accessing form specific secured networks?

  • A. Create an admin realm in the authentication policy.
  • B. Specify the appropriate RADIUS clients in the authentication policy.
  • C. Enable Adaptive Authentication in the portal policy.
  • D. Enable the Resolve user geolocation from their IP address option in the authentication policy.


Answer : B

Page:    1 / 6   
Total 30 questions