Exam4Training

Fortinet FCP_FAC_AD-6.5 FCP—FortiAuthenticator 6.5 Administrator Online Training

Question #1

Which two features of FortiAuthenticator are used for EAP deployment? (Choose two)

  • A . Certificate authority
  • B . LDAP server
  • C . MAC authentication bypass
  • D . RADIUS server

Reveal Solution Hide Solution

Correct Answer: AD
Question #2

Which EAP method is known as the outer authentication method?

  • A . MSCHAPv2
  • B . PEAP
  • C . EAP-GTC
  • D . EAP-TLS

Reveal Solution Hide Solution

Correct Answer: B
Question #3

You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate.

You have verified that only the users with two-factor authentication are experiencing the issue.

What can cause this issue?

  • A . FortiToken 200 license has expired.
  • B . One of the FortiAuthenticator devices in the active-active cluster has failed.
  • C . Time drift between FortiAuthenticator and hardware tokens.
  • D . FortiAuthenticator has lost contact with the FortiToken Cloud servers.

Reveal Solution Hide Solution

Correct Answer: C
Question #4

What is the function of RADIUS profiles and realms in authentication?

  • A . They provide secure encryption for user data
  • B . They enable remote access to user files
  • C . They authenticate users based on their IP addresses
  • D . They manage authentication settings and methods for RADIUS users

Reveal Solution Hide Solution

Correct Answer: D
Question #5

Which protocol is commonly used for RADIUS single sign-on (RSSO) to integrate third-party logon events with Fortinet Single Sign-On (FSSO)?

  • A . HTTP
  • B . SNMP
  • C . RADIUS
  • D . DNS

Reveal Solution Hide Solution

Correct Answer: C
Question #6

A device that is 802.1X non-compliant must be connected to the network.

Which authentication method can you use to authenticate the device with FortiAuthenticator?

  • A . EAP-TTLS
  • B . EAP-TLS
  • C . MAC-based authentication
  • D . Machine-based authentication

Reveal Solution Hide Solution

Correct Answer: C
Question #7

You are the administrator of a large network and you want to track your users by leveraging the FortiClient SSO Mobility Agent. As part of the deployment you want to make sure that a bad actor will not be allowed to authenticate with an unauthorized AD server and appear as a legitimate user when reported by the agent.

Which option can prevent such an attack?

  • A . Add only the trusted AD servers to a valid servers group.
  • B . Change the Secret key in the Enable authentication option for the FortiClient Mobility Agent Service.
  • C . Enable the Enable RADIUS accounting SSO clients method.
  • D . Enable the Enable NTLM option in the FortiClient Mobility Agent Service.

Reveal Solution Hide Solution

Correct Answer: D
Question #8

Which of the following services can be configured for remote authentication in FortiAuthenticator?

  • A . Online shopping
  • B . Social media integration
  • C . Remote desktop access
  • D . Virtual reality gaming

Reveal Solution Hide Solution

Correct Answer: C
Question #9

In a PKI infrastructure, what is the purpose of the root certificate?

  • A . It is used for encrypting sensitive user data
  • B . It is a backup certificate for emergency situations
  • C . It is the certificate of the end user in a communication
  • D . It is the highest-level certificate that signs other certificates

Reveal Solution Hide Solution

Correct Answer: D
Question #10

Which of the following is a recommended practice when configuring FortiAuthenticator for deployment?

  • A . Disabling all authentication methods except one
  • B . Using the default factory settings for quicker deployment
  • C . Enabling all available authentication methods for flexibility
  • D . Disabling all user roles to simplify access control

Reveal Solution Hide Solution

Correct Answer: A

Question #11

What is the benefit of integrating FortiAuthenticator with Active Directory for single sign-on?

  • A . It prevents any user logon events from being recorded
  • B . It allows users to authenticate using only their email addresses
  • C . It centralizes user management and reduces password fatigue
  • D . It requires users to use different credentials for different resources

Reveal Solution Hide Solution

Correct Answer: C
Question #12

In the context of FortiAuthenticator, what is the purpose of active authentication?

  • A . Enforcing access controls based on user identity
  • B . Encrypting network traffic
  • C . Managing firewall rules
  • D . Detecting hardware failures

Reveal Solution Hide Solution

Correct Answer: A
Question #13

Which of the following statements is true regarding RADIUS authentication?

  • A . It only supports local user accounts
  • B . It’s a protocol used exclusively for email authentication
  • C . It’s commonly used for wireless network authentication
  • D . It’s a type of biometric authentication

Reveal Solution Hide Solution

Correct Answer: C
Question #14

A system administrator wants to integrate FortiAuthenticator with an existing identity management system with the goal of authenticating and deauthenticating users into FSSO.

  • A . The ability to import and export users from CSV files
  • B . RADIUS learning mode for migrating users
  • C . REST API
  • D . SNMP monitoring and traps

Reveal Solution Hide Solution

Correct Answer: C
Question #15

FortiAuthenticator has several roles that involve digital certificates.

Which role allows FortiAuthenticator to receive the signed certificate signing requests (CSRs) and send certificate revocation lists (CRLs)?

  • A . Remote LDAP server
  • B . EAP server
  • C . SCEP server
  • D . OCSP server

Reveal Solution Hide Solution

Correct Answer: C
Question #16

Which statement about captive portal policies is true, assuming a single policy has been defined?

  • A . Portal policies apply only to authentication requests coming from unknown RADIUS clients
  • B . All conditions in the policy must match before a user is presented with the captive portal.
  • C . Conditions in the policy apply only to wireless users.
  • D . Portal policies can be used only for BYODs.

Reveal Solution Hide Solution

Correct Answer: B
Question #17

How can tags be used to generate Fortinet Single Sign-On (FSSO) events?

  • A . By attaching physical tags to users’ devices
  • B . By automatically categorizing logon events using predefined labels
  • C . By sending notifications to users about authentication events
  • D . By creating custom login screens

Reveal Solution Hide Solution

Correct Answer: B
Question #18

Which two types of digital certificates can you create in FortiAuthenticator? (Choose two.)

  • A . Third-party root certificate
  • B . User certificate
  • C . Organization validation certificate
  • D . Local services certificate

Reveal Solution Hide Solution

Correct Answer: BD
Question #19

Which of the following is a benefit of using role-based access control (RBAC) in FortiAuthenticator?

  • A . It eliminates the need for authentication
  • B . It assigns the same permissions to all users
  • C . It provides granular control over user access based on their roles
  • D . It automatically generates strong passwords for users

Reveal Solution Hide Solution

Correct Answer: C
Question #20

What are tokens commonly used for in authentication systems?

  • A . Sending text messages
  • B . Displaying the current time
  • C . Generating random security codes
  • D . Storing biometric data

Reveal Solution Hide Solution

Correct Answer: C

Question #21

What is the purpose of configuring and managing user accounts in FortiAuthenticator?

  • A . To create a separate network for users
  • B . To generate secure passwords for users
  • C . To control user access to resources based on their identity
  • D . To monitor user’s internet usage patterns

Reveal Solution Hide Solution

Correct Answer: C
Question #22

You are an administrator for a large enterprise and you want to delegate the creation and management of guest users to a group of sponsors.

How would you associate the guest accounts with individual sponsors?

  • A . As an administrator, you can assign guest groups to individual sponsors.
  • B . Guest accounts are associated with the sponsor that creates the guest account.
  • C . You can automatically add guest accounts to groups associated with specific sponsors.
  • D . Select the sponsor on the guest portal, during registration.

Reveal Solution Hide Solution

Correct Answer: B
Question #23

What is the primary purpose of FortiAuthenticator portal services?

  • A . To create custom web portals for online shopping
  • B . To manage network firewalls
  • C . To authenticate and provide access to local and remote users
  • D . To host gaming servers for multiplayer online games

Reveal Solution Hide Solution

Correct Answer: C
Question #24

You have implemented two-factor authentication to enhance security to sensitive enterprise systems.

How could you bypass the need for two-factor authentication for users accessing form specific secured networks?

  • A . Create an admin realm in the authentication policy.
  • B . Specify the appropriate RADIUS clients in the authentication policy.
  • C . Enable Adaptive Authentication in the portal policy.
  • D . Enable the Resolve user geolocation from their IP address option in the authentication policy.

Reveal Solution Hide Solution

Correct Answer: C
Question #25

Which three of the following can be used as SSO sources? (Choose three)

  • A . FortiClient SSO Mobility Agent
  • B . SSH Sessions
  • C . FortiAuthenticator in SAML SP role
  • D . Fortigate
  • E . RADIUS accounting

Reveal Solution Hide Solution

Correct Answer: ADE
Exit mobile version