Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet NSE6_FNC-7.2 Fortinet NSE 6 - FortiNAC 7.2 Exam Practice Test

Fortinet NSE 6 - FortiNAC 7.2 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Where do you look to determine which network access policy, if any is being applied to a particular host?

Options:

A.

The Policy Details view for the host

B.

The Connections view

C.

The Port Properties view of the hosts port

D.

The Policy Logs view

Question 2

What method of communication does FortiNAC use to control VPN host access on FortiGate?

Options:

A.

RSSO

B.

Security Fabric

C.

RADIUS accounting

D.

SAMLSSO

Question 3

Which agent can receive and display messages from FortiNAC to the end user?

Options:

A.

Dissolvable

B.

Persistent

C.

Passive

D.

MDM

Question 4

Which three are components of a security rule? (Choose three.)

Options:

A.

Methods

B.

Security String

C.

Trigger

D.

User or host profile

E.

Action

Question 5

Where are logical network values defined?

Options:

A.

In the model configuration view of each infrastructure device

B.

In the port properties view of each port

C.

On the profiled devices view

D.

In the security and access field of each host record

Question 6

What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?

Options:

A.

The port would be provisioned for the normal state host, and both hosts would have access to that VLAN.

B.

The port would not be managed, and an event would be generated.

C.

The port would be provisioned to the registration network, and both hosts would be isolated.

D.

The port would be administratively shut down.

Question 7

Which two of the following are required for endpoint compliance monitors? (Choose two.)

Options:

A.

Persistent agent

B.

Logged on user

C.

Security rule

D.

Custom scan

Question 8

Which devices would be evaluated by device profiling rules?

Options:

A.

Rogue devices, each time they connect

B.

All hosts, each time they connect

C.

Known trusted devices, each time they change location

D.

Rogue devices, only when they are initially added to the database

Question 9

When FortiNAC is managing VPN clients connecting through FortiGate. why must the clients run a FortiNAC agent?

Options:

A.

To collect user authentication details

B.

To meet the client security profile rule for scanning connecting clients

C.

To collect the client IP address and MAC address

D.

To transparently update the client IP address upon successful authentication

Question 10

During the on-boarding process through the captive portal, what are two reasons why a host that successfully registered would remain stuck in the Registration VLAN? (Choose two.)

Options:

A.

The wrong agent is installed.

B.

The port default VLAN is the same as the Registration VLAN.

C.

Bridging is enabled on the host.

D.

There is another unregistered host on the same port.

Question 11

How are logical networks assigned to endpoints?

Options:

A.

Through device profiling rules

B.

Through network access policies

C.

Through Layer 3 polling configurations

D.

Through FortiGate IPv4 policies

Question 12

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

Options:

A.

To deny access to only the production DNS server

B.

To allow access to only the FortiNAC VPN interface

C.

To allow access to only the production DNS server

D.

To deny access to only the FortiNAC VPN interface

Question 13

How does FortiGate update FortiNAC about VPN session information?

Options:

A.

API calls to FortiNAC

B.

Syslog messages

C.

SNMP traps

D.

Security Fabric Integration

Question 14

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

Options:

A.

Agent technology

B.

Portal page on-boarding options

C.

MDM integration

D.

Application layer traffic inspection

Question 15

Refer to the exhibit, and then answer the question below.

Which host is rogue?

Options:

A.

1

B.

3

C.

2

D.

4

Question 16

In which view would you find who made modifications to a Group?

Options:

A.

The Event Management view

B.

The Security Events view

C.

The Alarms view

D.

The Admin Auditing view

Question 17

Refer to the exhibit.

When a contractor account is created using this template, what value will be set in the accounts Rote field?

Options:

A.

Accounting Contractor

B.

Eng-Contractor

C.

Engineer-Contractor

D.

Conti actor