Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Fortinet NSE6_FNC-7.2 Dumps Questions Answers

Fortinet NSE 6 - FortiNAC 7.2 Questions and Answers

Question 1

Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)

Options:

A.

Dissolvable

B.

Mobile

C.

Passive

D.

Persistent

Buy Now
Question 2

Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)

Options:

A.

Dissolvable agent

B.

DotlxAuto Registration

C.

Device importing

D.

MDM integration

E.

Captive portal

Question 3

View the output.

Examine the communication between a primary FortiNAC (192.168.10.10) and a secondary FortiNAC (192.166.10.110) configured as an HA pair What is the current state of the FortiNAC HA pair?

Options:

A.

The primary server Is running and in control.

B.

The database replication failed.

C.

The secondary server is running and in control.

D.

Fallover from the primary server to the secondary server is in progress.

Question 4

In which view would you find who made modifications to a Group?

Options:

A.

The Event Management view

B.

The Security Events view

C.

The Alarms view

D.

The Admin Auditing view

Question 5

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?

Options:

A.

The host is provisioned based on the default access defined by the point of connection.

B.

The host is provisioned based on the network access policy.

C.

The host is isolated.

D.

The host is administratively disabled.

Question 6

Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

Options:

A.

Authentication

B.

Network Access

C.

Endpoint Compliance

D.

Supplicant EasvConnect

Question 7

Refer to the exhibit.

When a contractor account is created using this template, what value will be set in the accounts Rote field?

Options:

A.

Accounting Contractor

B.

Eng-Contractor

C.

Engineer-Contractor

D.

Conti actor

Question 8

Refer to the exhibit.

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

Options:

A.

The host is moved to VLAN 111.

B.

The host is moved to a default isolation VLAN.

C.

No VLAN change is performed.

D.

The host is disabled.

Question 9

Which connecting endpoints are evaluated against all enabled device profiling rules?

Options:

A.

All hosts, each time they connect

B.

Rogues devices, only when they connect for the first time

C.

Known trusted devices each time they change location

D.

Rogues devices, each time they connect

Question 10

When FortiNAC is managing VPN clients connecting through FortiGate. why must the clients run a FortiNAC agent?

Options:

A.

To collect user authentication details

B.

To meet the client security profile rule for scanning connecting clients

C.

To collect the client IP address and MAC address

D.

To transparently update the client IP address upon successful authentication

Question 11

Which three of the following are components of a security rule? (Choose three.)

Options:

A.

Security String

B.

Methods

C.

Action

D.

User or host profile

E.

Trigger

Question 12

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

Options:

A.

Physical Address Filtering

B.

Forced Quarantine

C.

Forced Isolation

D.

Forced Remediation

Question 13

Where are logical network values defined?

Options:

A.

In the model configuration view of each infrastructure device

B.

In the port properties view of each port

C.

On the profiled devices view

D.

In the security and access field of each host record

Question 14

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

Options:

A.

Manual polling

B.

Scheduled poll timings

C.

A failed Layer 3 poll

D.

A matched security policy

E.

Linkup and Linkdown traps

Question 15

Where do you look to determine when and why the FortiNAC made an automated network access change?

Options:

A.

The Event view

B.

The Port Changes view

C.

The Connections view

D.

The Admin Auditing view

Question 16

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

Options:

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Question 17

What capability do logical networks provide?

Options:

A.

Point of access-base autopopulation of device groups'

B.

Interactive topology view diagrams

C.

Application of different access values from a single access policy

D.

IVLAN -based inventory reporting