Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet NSE5_FCT-7.0 NSE5_FCT-7.0 NSE 5 - FortiClient EMS 7.0 Exam Practice Test

NSE5_FCT-7.0 NSE 5 - FortiClient EMS 7.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

When site categories are disabled in FortiClient webfilter and antivirus (malicious websites), which feature can be used to protect the endpoint from malicious web access?

Options:

A.

Real-time protection list

B.

Block malicious websites on antivirus

C.

FortiSandbox URL list

Question 2

Refer to the exhibit.

Based on the FortiClient logs shown in the exhibit which application is blocked by the application firewall?

Options:

A.

Twitter

B.

Facebook

C.

Internet Explorer

D.

Firefox

Question 3

An administrator deploys a FortiClient installation through the Microsoft AD group policy After installation is complete all the custom configuration is missing.

What could have caused this problem?

Options:

A.

The FortiClient exe file is included in the distribution package

B.

The FortiClient MST file is missing from the distribution package

C.

FortiClient does not have permission to access the distribution package.

D.

The FortiClient package is not assigned to the group

Question 4

An administrator installs FortiClient on Windows Server.

What is the default behavior of real-time protection control?

Options:

A.

Real-time protection must update AV signature database

B.

Real-time protection sends malicious files to FortiSandbox when the file is not detected locally

C.

Real-time protection is disabled

D.

Real-time protection must update the signature database from FortiSandbox

Question 5

Which component or device shares device status information through ZTNA telemetry?

Options:

A.

FortiClient

B.

FortiGate

C.

FortiGate Access Proxy

D.

FortiClient EMS

Question 6

Refer to the exhibit.

Which shows the output of the ZTNA traffic log on FortiGate.

What can you conclude from the log message?

Options:

A.

The remote user connection does not match the explicit proxy policy.

B.

The remote user connection does not match the ZTNA server configuration.

C.

C. The remote user connection does not match the ZTNA rule configuration.

D.

The remote user connection does not match the ZTNA firewall policy

Question 7

Which three types of antivirus scans are available on FortiClient? (Choose three )

Options:

A.

Proxy scan

B.

Full scan

C.

Custom scan

D.

Flow scan

E.

Quick scan

Question 8

An administrator has a requirement to add user authentication to the ZTNA access for remote or off-fabric users Which FortiGate feature is required m addition to ZTNA?

Options:

A.

FortiGate FSSO

B.

FortiGate certificates

C.

C. FortiGate explicit proxy

D.

FortiGate endpoint control

Question 9

Refer to the exhibits.

Which shows the configuration of endpoint policies.

Based on the configuration, what will happen when someone logs in with the user account student on an endpoint in the trainingAD domain?

Options:

A.

FortiClient EMS will assign the Sales policy

B.

B. FortiClient EMS will assign the Training policy

C.

FortiClient EMS will assign the Default policy

D.

FortiClient EMS will assign the Training policy for on-fabric endpoints and the Sales policy for the off-fabric endpoint

Question 10

Refer to the exhibit.

An administrator has restored the modified XML configuration file to FortiClient and sees the error shown in the exhibit.

Based on the XML settings shown in the exhibit, what must the administrator do to resolve the issue with the XML configuration file?

Options:

A.

The administrator must resolve the XML syntax error.

B.

The administrator must use a password to decrypt the file

C.

The administrator must change the file size

D.

The administrator must save the file as FortiClient-config conf.

Question 11

An administrator is required to maintain a software vulnerability on the endpoints, without showing the feature on the FortiClient dashboard. What must the administrator do to achieve this requirement?

Options:

A.

Disable select the vulnerability scan feature in the deployment package

B.

Use the default endpoint profile

C.

Select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile

D.

D. Click the hide icon on the vulnerability scan tab

Question 12

Refer to the exhibit.

Based on the settings shown in the exhibit what action will FortiClient take when it detects that a user is trying to download an infected file?

Options:

A.

Blocks the infected files as it is downloading

B.

Quarantines the infected files and logs all access attempts

C.

Sends the infected file to FortiGuard for analysis

D.

Allows the infected file to download without scan

Question 13

Refer to the exhibit, which shows the Zero Trust Tagging Rule Set configuration.

Which two statements about the rule set are true? (Choose two.)

Options:

A.

The endpoint must satisfy that only Windows 10 is running.

B.

The endpoint must satisfy that only AV software is installed and running.

C.

The endpoint must satisfy that antivirus is installed and running and Windows 10 is running.

D.

The endpoint must satisfy that only Windows Server 2012 R2 is running.

Question 14

A FortiClient EMS administrator has enabled the compliance rule for the sales department. Which Fortinet device will enforce compliance with dynamic access control?

Options:

A.

FortiClient

B.

FortiClient EMS

C.

C. FortiGate

D.

FortiAnalyzer