Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Fortinet NSE6_FNC-7.2 Fortinet NSE 6 - FortiNAC 7.2 Exam Practice Test

Demo: 17 questions
Total 57 questions

Fortinet NSE 6 - FortiNAC 7.2 Questions and Answers

Question 1

Where should you configure MAC notification traps on a supported switch?

Options:

A.

Configure them only after you configure linkup and linkdown traps.

B.

Configure them on all ports on the switch.

C.

Configure them only on ports set as 802 1g trunks.

D.

Configure them on all ports except uplink ports.

Question 2

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

Options:

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Question 3

Refer to the exhibit.

If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?

Options:

A.

The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

B.

The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM.

C.

The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM.

D.

The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

Question 4

Which three are components of a security rule? (Choose three.)

Options:

A.

Methods

B.

Security String

C.

Trigger

D.

User or host profile

E.

Action

Question 5

Refer to the exhibit.

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

Options:

A.

The host is moved to VLAN 111.

B.

The host is moved to a default isolation VLAN.

C.

No VLAN change is performed.

D.

The host is disabled.

Question 6

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

Options:

A.

Physical Address Filtering

B.

Forced Quarantine

C.

Forced Isolation

D.

Forced Remediation

Question 7

Refer to the exhibit.

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

Options:

A.

Multiple enforcement groups could not contain the same port.

B.

Only the higher ranked enforcement group would be applied.

C.

Both types of enforcement would be applied.

D.

Enforcement would be applied only to rogue hosts.

Question 8

How does FortiGate update FortiNAC about VPN session information?

Options:

A.

API calls to FortiNAC

B.

Syslog messages

C.

SNMP traps

D.

Security Fabric Integration

Question 9

While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.

Where would the administrator look to determine when and why FortiNAC made the network access change?

Options:

A.

The Event view

B.

The Admin Auditing view

C.

The Port Changes view

D.

The Connections view

Question 10

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?

Options:

A.

The host is provisioned based on the default access defined by the point of connection.

B.

The host is provisioned based on the network access policy.

C.

The host is isolated.

D.

The host is administratively disabled.

Question 11

Refer to the exhibit, and then answer the question below.

Which host is rogue?

Options:

A.

1

B.

3

C.

2

D.

4

Question 12

What agent is required in order to detect an added USB drive?

Options:

A.

Persistent

B.

Dissolvable

C.

Mobile

D.

Passive

Question 13

During an evaluation of state-based enforcement, an administrator discovers that ports that should not be under enforcement have been added to enforcement groups. In which view would the administrator be able to determine who added the ports to the groups?

Options:

A.

The Alarms view

B.

The Admin Auditing view

C.

The Event Management view

D.

The Security Events view

Question 14

Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)

Options:

A.

Dissolvable agent

B.

DotlxAuto Registration

C.

Device importing

D.

MDM integration

E.

Captive portal

Question 15

Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)

Options:

A.

CLI

B.

SMTP

C.

SNMP

D.

FTP

E.

RADIUS

Question 16

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

Options:

A.

NTP

B.

DHCP

C.

Web

D.

DNS

E.

ISMTP

Question 17

In which view would you find who made modifications to a Group?

Options:

A.

The Event Management view

B.

The Security Events view

C.

The Alarms view

D.

The Admin Auditing view

Demo: 17 questions
Total 57 questions