Online NSE6_FAC-6.4 Practice TestMore Fortinet Products >

Free Fortinet NSE6_FAC-6.4 Exam Dumps Questions

Fortinet NSE6_FAC-6.4: Fortinet NSE 6 - FortiAuthenticator 6.4

- Get instant access to NSE6_FAC-6.4 practice exam questions

- Get ready to pass the Fortinet NSE 6 - FortiAuthenticator 6.4 exam right now using our Fortinet NSE6_FAC-6.4 exam package, which includes Fortinet NSE6_FAC-6.4 practice test plus an Fortinet NSE6_FAC-6.4 Exam Simulator.

- The best online NSE6_FAC-6.4 exam study material and preparation tool is here.

4.5 
(4770 ratings)

Question 1

Which EAP method is known as the outer authentication method?

Correct Answer:A
PEAP is known as the outer authentication method because it establishes a secure tunnel between the client and the server using TLS. The inner authentication method, such as EAP-GTC, EAP-TLS, or MSCHAPV2, is then used to authenticate the client within the tunnel.
References:
https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administration-guide/906179/wireless-802-1x-authen

Question 2

Which two are supported captive or guest portal authentication methods? (Choose two)

Correct Answer:AD
FortiAuthenticator supports various captive or guest portal authentication methods, including social media login with Linkedln, Facebook, Twitter, Google+, or WeChat; email verification; SMS verification; voucher code; username and password; and MAC address bypass. Apple ID and Instagram are not supported as authentication methods. References:
https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372404/guest-management/37240

Question 3

Which three of the following can be used as SSO sources? (Choose three)

Correct Answer:ADE
FortiAuthenticator supports various SSO sources that can provide user identity information to other devices in the network, such as FortiGate firewalls or FortiAnalyzer log servers. Some of the supported SSO sources are:
NSE6_FAC-6.4 dumps exhibit FortiClient SSO Mobility Agent: A software agent that runs on Windows devices and sends user login information to FortiAuthenticator.
NSE6_FAC-6.4 dumps exhibit FortiGate: A firewall device that can send user login information from various sources, such as FSSO agents, captive portals, VPNs, or LDAP servers, to FortiAuthenticator.
NSE6_FAC-6.4 dumps exhibit RADIUS accounting: A protocol that can send user login information from RADIUS servers or clients, such as wireless access points or VPN concentrators, to FortiAuthenticator.
SSH sessions and FortiAuthenticator in SAML SP role are not valid SSO sources because they do not provide user identity information to other devices in the network. References: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372410/single-sign-on

Question 4

What happens when a certificate is revoked? (Choose two)

Correct Answer:BC
When a certificate is revoked, it means that it is no longer valid and should not be trusted by any entity. Revoked certificates are automatically added to the certificate revocation list (CRL) which is published by the issuing CA and can be checked by other parties. If a CA certificate is revoked, all certificates signed by that CA are also revoked and added to the CRL. Revoked certificates can be reinstated if the reason for revocation is resolved, such as a compromised private key being recovered or a misissued certificate being corrected. External CAs do not query FortiAuthenticator for revoked certificates, but they can use protocols such as SCEP or OCSP to exchange certificate information with FortiAuthenticator. References: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372408/certificate-management

Question 5

A device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentialis.
In this case, which user idendity discovery method can Fortiauthenticator use?

Correct Answer:D
Portal authentication is a user identity discovery method that can be used when a device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentials. Portal authentication requires users to enter their credentials on a web page before accessing network resources. The other methods are used for transparent identification of domain devices or users. References:
https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372406/user-identity-discovery
Examine the screenshot shown in the exhibit.
NSE6_FAC-6.4 dumps exhibit

Question 6

Which two SAML roles can Fortiauthenticator be configured as? (Choose two)

Correct Answer:AD
FortiAuthenticator can be configured as a SAML identity provider (IdP) or a SAML service provider (SP). As an IdP, FortiAuthenticator authenticates users and issues SAML assertions to SPs. As an SP, FortiAuthenticator receives SAML assertions from IdPs and grants access to users based on the attributes in the assertions. Principal and assertion server are not valid SAML roles. References: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372407/saml

START NSE6_FAC-6.4 EXAM