Where should you configure MAC notification traps on a supported switch?
In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?
Refer to the exhibit.
If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?
Which three are components of a security rule? (Choose three.)
Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?
Which system group will force at-risk hosts into the quarantine network, based on point of connection?
Refer to the exhibit.
What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?
How does FortiGate update FortiNAC about VPN session information?
While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.
Where would the administrator look to determine when and why FortiNAC made the network access change?
With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
Refer to the exhibit, and then answer the question below.
Which host is rogue?
What agent is required in order to detect an added USB drive?
During an evaluation of state-based enforcement, an administrator discovers that ports that should not be under enforcement have been added to enforcement groups. In which view would the administrator be able to determine who added the ports to the groups?
Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)
Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)
In an isolation VLAN which three services does FortiNAC supply? (Choose three.)
In which view would you find who made modifications to a Group?