Valid NSE4-5.4 Dumps shared by ExamDiscuss.com for Helping Passing NSE4-5.4 Exam! ExamDiscuss.com now offer the newest NSE4-5.4 exam dumps, the ExamDiscuss.com NSE4-5.4 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com NSE4-5.4 dumps with Test Engine here:

Access NSE4-5.4 Dumps Premium Version
(575 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 4/60

Under what circumstance would you enable LEARN as the Action on a firewall policy?

Recent Comments (The most recent comments are at the top.)

osman tasar - Aug 02, 2018

answer is B too :)

The learning mode feature is a quick and easy method for setting a policy to allow everything but to log it all so that it can later be used to determine what restrictions and protections should be applied. The objective is to monitor the traffic not act upon it while in Learning mode.

hassan - Jun 25, 2018

answer is B

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (60q)
1 commentQuestion 1: View the example routing table. (Exhibit) Which route will b...
Question 2: How can a browser trust a web-server certificate signed by a...
1 commentQuestion 3: How to configure Collector agent settings?...
2 commentQuestion 4: Under what circumstance would you enable LEARN as the Action...
Question 5: How do you configure inline SSL inspection on a firewall pol...
Question 6: What FortiGate feature can be used to allow IPv6 clients to ...
Question 7: How does FortiGate verify the login credentials of a remote ...
Question 8: An administrator is using the FortiGate built-in sniffer to ...
1 commentQuestion 9: (Exhibit) A client workstation is connected to FortiGate por...
1 commentQuestion 10: Which of the following Fortinet hardware accelerators can be...
1 commentQuestion 11: A company needs to provide SSL VPN access to two user groups...
Question 12: Which traffic sessions can be offloaded to a NP6 processor? ...
Question 13: Which file names will match the *.tiff file name pattern con...
1 commentQuestion 14: Which of the following statements about advanced AD access m...
1 commentQuestion 15: (Exhibit) Which of the following statements are true? (Choos...
1 commentQuestion 16: Which of the following statements describe WMI polling mode ...
Question 17: An administrator has created a custom IPS signature. Where d...
Question 18: An administrator has created a custom IPS signature. Where d...
Question 19: View the exhibit. (Exhibit) What is the effect of the Discon...
Question 20: Which statements about DNS filter profiles are true? (Choose...
Question 21: How does FortiGate look for a matching firewall policy to pr...
2 commentQuestion 22: Examine the routing database. (Exhibit) Which of the followi...
Question 23: Which statement about the firewall policy authentication tim...
Question 24: An administrator has configured two VLAN interfaces: (Exhibi...
2 commentQuestion 25: An administrator needs to offload logging to FortiAnalyzer f...
1 commentQuestion 26: What statement describes what DNS64 does?...
1 commentQuestion 27: Which of the following statements about policy-based IPsec t...
1 commentQuestion 28: When browsing to an internal web server using a web-mode SSL...
Question 29: What step is required to configure an SSL VPN to access to a...
Question 30: An administrator has enabled proxy-based antivirus scanning ...
Question 31: An administrator has configured a dialup IPsec VPN with XAut...
Question 32: Which statements about IP-based explicit proxy authenticatio...
1 commentQuestion 33: What traffic and attacks can be blocked by a web application...
Question 34: You are tasked to architect a new IPsec deployment with the ...
Question 35: What methods can be used to deliver the token code to a user...
Question 36: What information is flushed when the chunk-size value is cha...
Question 37: An administrator has configured a route-based IPsec VPN betw...
2 commentQuestion 38: View the exhibit. (Exhibit) The client cannot connect to the...
Question 39: Examine the exhibit, which contains a virtual IP and a firew...
Question 40: View the exhibit. (Exhibit) When Role is set to Undefined, w...
Question 41: When using WPAD DNS method, what is the FQDN format that bro...
Question 42: (Exhibit) What does the configuration do? (Choose two.)...
1 commentQuestion 43: View the exhibit. (Exhibit) Based on this output, which stat...
Question 44: Which statement about the FortiGuard services for the FortiG...
2 commentQuestion 45: What does the command diagnose debuf fsso-polling refresh-us...
1 commentQuestion 46: Which traffic inspection features can be executed by a secur...
Question 47: Which statements correctly describe transparent mode operati...
1 commentQuestion 48: Which configuration objects can be selected for the Source f...
1 commentQuestion 49: An administrator observes that the port1 interface cannot be...
Question 50: If traffic matches a DLP filter with the action set to Quara...
Question 51: How does FortiGate select the central SNAT policy that is ap...
Question 52: Which of the following settings and protocols can be used to...
1 commentQuestion 53: View the exhibit. (Exhibit) A user behind the FortiGate is t...
Question 54: How can you format the FortiGate flash disk?...
Question 55: Which statements about antivirus scanning using flow-based f...
Question 56: (Exhibit) Which statement is correct based on this configura...
1 commentQuestion 57: Which of the following statements about NTLM authentication ...
1 commentQuestion 58: Which of the following statements about central NAT are true...
Question 59: Which statement about data leak prevention (DLP) on a FortiG...
Question 60: View the exhibit. (Exhibit) This is a sniffer output of a te...