Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Fortinet NSE6_FNC-9.1 Fortinet NSE 6 - FortiNAC 9.1 Exam Practice Test

Demo: 14 questions
Total 47 questions

Fortinet NSE 6 - FortiNAC 9.1 Questions and Answers

Question 1

Refer to the exhibit.

If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?

Options:

A.

The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

B.

The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM.

C.

The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM.

D.

The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

Question 2

What causes a host's state to change to "at risk"?

Options:

A.

The host has failed an endpoint compliance policy or admin scan.

B.

The logged on user is not found in the Active Directory.

C.

The host has been administratively disabled.

D.

The host is not in the Registered Hosts group.

Question 3

Which agent can receive and display messages from FortiNAC to the end user?

Options:

A.

Dissolvable

B.

Persistent

C.

Passive

D.

MDM

Question 4

What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?

Options:

A.

The port would be provisioned for the normal state host, and both hosts would have access to that VLAN.

B.

The port would not be managed, and an event would be generated.

C.

The port would be provisioned to the registration network, and both hosts would be isolated.

D.

The port would be administratively shut down.

Question 5

Refer to the exhibit, and then answer the question below.

Which host is rogue?

Options:

A.

1

B.

3

C.

2

D.

4

Question 6

In which view would you find who made modifications to a Group?

Options:

A.

The Event Management view

B.

The Security Events view

C.

The Alarms view

D.

The Admin Auditing view

Question 7

By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?

Options:

A.

The port becomes a threshold uplink

B.

The port is disabled

C.

The port is added to the Forced Registration group

D.

The port is switched into the Dead-End VLAN

Question 8

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

Options:

A.

NTP

B.

DHCP

C.

Web

D.

DNS

E.

ISMTP

Question 9

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

Options:

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Question 10

Where do you look to determine which network access policy, if any is being applied to a particular host?

Options:

A.

The Policy Details view for the host

B.

The Connections view

C.

The Port Properties view of the hosts port

D.

The Policy Logs view

Question 11

What capability do logical networks provide?

Options:

A.

Point of access-baseautopopulationof device groups'

B.

Interactive topology view diagrams

C.

Application of different access values from a single access policy

D.

IVLAN -based inventory reporting

Question 12

Which agent is used only as part of a login script?

Options:

A.

Mobile

B.

Passive

C.

Persistent

D.

Dissolvable

Question 13

Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)

Options:

A.

CLI

B.

SMTP

C.

SNMP

D.

FTP

E.

RADIUS

Question 14

When you create a user or host profile; which three criteria can you use? (Choose three.)

Options:

A.

An applied access policy

B.

Administrative group membership

C.

Location

D.

Host or user group memberships

E.

Host or user attributes

Demo: 14 questions
Total 47 questions