nerdexam
FortinetFortinet

NSE4 · Question #286

NSE4 Question #286: Real Exam Question with Answer & Explanation

The correct answer is A: Encrypted protocols can be scanned through the use of the SSL proxy.. Administrators can control encrypted data transfer by enabling SSL/TLS inspection (SSL proxy) to decrypt and scan protocols, using DLP rules to block encrypted files, and employing Application Control to monitor and alert on encrypted protocol usage.

Submitted by rachelw· Apr 18, 2026Security Profiles and Content Inspection

Question

The transfer of encrypted files or the use of encrypted protocols between users and servers on the internet can frustrate the efforts of administrators attempting to monitor traffic passing through the FortiGate unit and ensuring user compliance to corporate rules. Which of the following items will allow the administrator to control the transfer of encrypted data through the FortiGate unit? (Select all that apply.)

Options

  • AEncrypted protocols can be scanned through the use of the SSL proxy.
  • BDLP rules can be used to block the transmission of encrypted files.
  • CFirewall authentication can be enabled in the firewall policy, preventing the use of encrypted
  • DApplication control can be used to monitor the use of encrypted protocols; alerts can be sent to

Explanation

Administrators can control encrypted data transfer by enabling SSL/TLS inspection (SSL proxy) to decrypt and scan protocols, using DLP rules to block encrypted files, and employing Application Control to monitor and alert on encrypted protocol usage.

Common mistakes.

  • C. Firewall authentication ensures that only authorized users can pass traffic through the firewall, but it does not inherently prevent or control the type of encrypted protocols those authenticated users choose to employ once access is granted.

Concept tested. FortiGate Encrypted Traffic Control

Reference. https://docs.fortinet.com/document/fortigate/7.4.0/administration-guide/526779/ssl-ssh-inspection

Topics

#SSL Inspection#DLP#Application Control#Encrypted Traffic

Community Discussion

No community discussion yet for this question.

Full NSE4 PracticeBrowse All NSE4 Questions