Weekend Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Certification > FCP_FCT_AD-7.2

FCP_FCT_AD-7.2 FCP-FortiClient EMS 7.2 Administrator Question and Answers

Question # 4

Refer to the exhibit, which shows the endpoint summary information on FortiClient EMS.

What two conclusions can you make based on the Remote-Client status shown above? (Choose two.)

A.

The endpoint is classified as at risk.

B.

The endpoint has been assigned the Default endpoint policy.

C.

The endpoint is configured to support FortiSandbox.

D.

The endpoint is currently off-net.

Full Access
Question # 5

When site categories are disabled in FortiClient web filter, which feature can be used to protect the endpoint from malicious web access?

A.

Real-time protection list

B.

Block malicious websites on antivirus

C.

FortiSandbox URL list

D.

Web exclusion list

Full Access
Question # 6

Which statement about the FortiClient enterprise management server is true?

A.

It receives the configuration information of endpoints from ForuGate.

B.

It provides centralized management of multiple endpoints running FortiClient software.

C.

It enforces compliance on the endpoints using tags

D.

It receives the CA certificate from FortiGate to validate client certrficates.

Full Access
Question # 7

An administrator wants to simplify remote access without asking users to provide user credentials Which access control method provides this solution?

A.

ZTNA full mode

B.

SSL VPN

C.

L2TP

D.

ZTNA IP/MAC littering mode

Full Access
Question # 8

What is the function of the quick scan option on FortiClient?

A.

It scans programs and drivers that are currently running, for threats

B.

It performs a full system scan including all files, executable files. DLLs, and drivers for throats.

C.

It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.

D.

It scans executable files. DLLs, and drivers that are currently running, for threats.

Full Access
Question # 9

Why does FortiGate need the root CA certificate of FortiCient EMS?

A.

To revoke FortiClient client certificates

B.

To sign FortiClient CSR requests

C.

To update FortiClient client certificates

D.

To trust certificates issued by FortiClient EMS

Full Access
Question # 10

Exhibit.

Based on the logs shown in the exhibit, why did FortiClient EMS tail to install FortiClient on the endpoint?

A.

The FortiClient antivirus service is not running.

B.

The Windows installer service is not running.

C.

The remote registry service is not running.

D.

The task scheduler service is not running.

Full Access
Question # 11

An administrator installs FortiClient on Windows Server.

What is the default behavior of real-time protection control?

A.

Real-time protection must update AV signature database

B.

Real-time protection sends malicious files to FortiSandbox when the file is not detected locally

C.

Real-time protection is disabled

D.

Real-time protection must update the signature database from FortiSandbox

Full Access
Question # 12

Refer to the exhibit.

An administrator has restored the modified XML configuration file to FortiClient and sees the error shown in the exhibit.

Based on the XML settings shown in the exhibit, what must the administrator do to resolve the issue with the XML configuration file?

A.

The administrator must resolve the XML syntax error.

B.

The administrator must use a password to decrypt the file

C.

The administrator must change the file size

D.

The administrator must save the file as FortiClient-config conf.

Full Access
Question # 13

An administrator must add an authentication server on FortiClient EMS in a different security zone that cannot allow a direct connection.

Which solution can provide secure access between FortiClient EMS and the Active Directory server?

A.

Configure and deploy a FortiGate device between FortiClient EMS and the Active Directory server.

B.

Configure Active Directory and install FortiClient EMS on the same VM.

C.

Configure a slave FortiClient EMS on a virtual machine.

D.

Configure an Active Directory connector between FortiClient EMS and the Active Directory server.

Full Access
Question # 14

Refer to the exhibit.

Based on the settings shown in the exhibit which statement about FortiClient behavior is true?

A.

FortiClient quarantines infected files and reviews later, after scanning them.

B.

FortiClient blocks and deletes infected files after scanning them.

C.

FortiClient scans infected files when the user copies files to the Resources folder

D.

FortiClient copies infected files to the Resources folder without scanning them.

Full Access
Question # 15

Which statement about FortiClient comprehensive endpoint protection is true?

A.

It helps to safeguard systems from email spam

B.

It helps to safeguard systems from data loss.

C.

It helps to safeguard systems from DDoS.

D.

lt helps to safeguard systems from advanced security threats, such as malware.

Full Access
Question # 16

A new chrome book is connected in a school's network.

Which component can the EMS administrator use to manage the FortiClient web filter extension installed on the Google Chromebook endpoint?

A.

FortiClient EMS

B.

FortiClient site categories

C.

FortiClient customer URL list

D.

FortiClient web filter extension

Full Access