Firewall Authentication Flashcards

1
Q

What are three methods of firewall authentication?

A
  • Local password
  • Server-based password
  • Two-factor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where are local accounts stored?

A

Locally on FortiGate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a way to configure server-based password authentication?

A
  • Create a user account locally, specify authentication server
  • Add the authentication server to a user group
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where can you configure POP3?

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the benefit of creating user accounts on FortiGate for server-based authentication?

A

Can configure MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is LDAP?

A

An application protocol for accessing and maintaining distributed directory information services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RADIUS?

A

A standard protocol that provides AAA services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must be done on the RADIUS server to allow functionality with FortiGate?

A

FortiGate must be listed as a client on the RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some methods of OTP delivery?

A
  • FortiToken
  • Email/SMS
  • FortiToken mobile push
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What needs to sync for FortiToken to work?

A
  • Time
  • Seed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many soft token activates do you get for each FortiGate before you have to purchase more?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some ways to alter active authentication behavior?

A
  • Enable authentication on every policy that could match the traffic
  • Enable a captive portal on the ingress interface for traffic
  • Enforce authentication on demand (CLI)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens with authentication if there is a fall-through policy in place?

A

Unauthenticated users are not prompted for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the types of authentication timeout?

A
  • Idle
  • Hard
  • New
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the default authentication timeout behavior?

A
  • Idle
  • 5 minutes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is hard authentication timeout?

A

Authentication expires after that amount of time, regardless of activity

16
Q

Where do you monitor users authenticating through the firewall?

A

Dashboard > Assets & Identities > Firewall Users

17
Q

A remote LDAP user is trying to authenticate with a username and password. How does FortiGate verify the login credentials?

A

FortiGate sends the user-entered credentials to the remote server for verification

18
Q

How are RADIUS group memberships configured?

A

With vendor-specific attributes (VSAs)