Halloween Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Certification > NSE6_FNC-7.2

NSE6_FNC-7.2 Fortinet NSE 6 - FortiNAC 7.2 Question and Answers

Question # 4

Refer to the exhibit.

When a contractor account is created using this template, what value will be set in the accounts Rote field?

A.

Accounting Contractor

B.

Eng-Contractor

C.

Engineer-Contractor

D.

Conti actor

Full Access
Question # 5

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Full Access
Question # 6

Which two are required for endpoint compliance monitors? (Choose two.}

A.

Custom scan

B.

ZTNA agent

C.

Persistent agent

D.

MDM integration

Full Access
Question # 7

Which devices would be evaluated by device profiling rules?

A.

Rogue devices, each time they connect

B.

All hosts, each time they connect

C.

Known trusted devices, each time they change location

D.

Rogue devices, only when they are initially added to the database

Full Access
Question # 8

Refer to the exhibit.

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

A.

Multiple enforcement groups could not contain the same port.

B.

Only the higher ranked enforcement group would be applied.

C.

Both types of enforcement would be applied.

D.

Enforcement would be applied only to rogue hosts.

Full Access
Question # 9

Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)

A.

CLI

B.

SMTP

C.

SNMP

D.

FTP

E.

RADIUS

Full Access
Question # 10

What agent is required in order to detect an added USB drive?

A.

Persistent

B.

Dissolvable

C.

Mobile

D.

Passive

Full Access
Question # 11

Refer to the exhibit.

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

A.

The host is moved to VLAN 111.

B.

The host is moved to a default isolation VLAN.

C.

No VLAN change is performed.

D.

The host is disabled.

Full Access
Question # 12

Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)

A.

Dissolvable agent

B.

DotlxAuto Registration

C.

Device importing

D.

MDM integration

E.

Captive portal

Full Access
Question # 13

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

A.

To confirm installed security software

B.

To validate the VPN user credentials

C.

To designate the required agent type

D.

To validate the VPN client being used

Full Access
Question # 14

Where are logical network values defined?

A.

In the model configuration view of each infrastructure device

B.

In the port properties view of each port

C.

On the profiled devices view

D.

In the security and access field of each host record

Full Access
Question # 15

Which agent is used only as part of a login script?

A.

Mobile

B.

Passive

C.

Persistent

D.

Dissolvable

Full Access
Question # 16

What capability do logical networks provide?

A.

Point of access-base autopopulation of device groups'

B.

Interactive topology view diagrams

C.

Application of different access values from a single access policy

D.

IVLAN -based inventory reporting

Full Access
Question # 17

When configuring isolation networks in the configuration wizard, why does a Layer 3 network type allow for more than one DHCP scope for each isolation network type?

A.

There can be more than one isolation network of each type.

B.

Any scopes beyond the first scope are used if the Initial scope runs out of IP addresses.

C.

Configuring more than one DHCP scope allows for DHCP server redundancy.

D.

The Layer 3 network type allows for one scope for each possible host status.

Full Access