Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Forescout FSCP - Forescout Certified Professional Exam

Page: 2 / 3
Total 80 questions

What is the default recheck timer for a NAC policy?

A.

24 hours

B.

8 hours

C.

4 hours

D.

12 hours

E.

2 hours

How can scripts be run when the Endpoint Remote Inspection method is set to "Using MS-WMI"?

A.

Using Task Scheduler but this has limitations

B.

Using WMI, which will allow interactive scripts to run

C.

Using RRP, which will allow interactive scripts to run

D.

Using WMI, but they may not be run interactively using this method

E.

Using fsprocserv.exe, but scripts may not be run interactively using this method

Which of the following is true regarding Failover Clustering module configuration?

A.

Once appliances are configured, then press the Apply button.

B.

Segments should be assigned to appliance folders and NOT to the individual appliances.

C.

You can see the status of failover by selecting IP Assignments and failover tab.

D.

Configure the second HA on the Secondary node.

E.

Place only the EM to participate in failover in the folder.

When troubleshooting a SecureConnector management issue for a Windows host, how would you determine if SecureConnector management packets are reaching CounterACT successfully?

A.

Use the tcpdump command and filter for tcp port 10005 traffic from the host IP address reaching the monitor port

B.

Use the tcpdump command and filter for tcp port 2200 traffic from the host IP address reaching the management port

C.

Use the tcpdump command and filter for tcp port 10003 traffic from the host IP address reaching the monitor port

D.

Use the tcpdump command and filter for tcp port 2200 traffic from the host IP address reaching the management port

E.

Use the tcpdump command and filter for tcp port 10003 traffic from the host IP address reaching the management port

Why would the patch delivery optimization mechanism used for Windows 10 updates be a potential security concern?

A.

It can be configured to use a peer-to-peer file sharing protocol

B.

CounterACT cannot initiate Windows updates for Windows 10 devices

C.

It uses a peer-to-peer file sharing protocol by default

D.

The registry DWORD controlling this behavior cannot be changed

E.

It always uses a peer-to-peer file sharing protocol

Which of the following are true about the comments field of the CounterACT database? (Choose two)

A.

Endpoints may have multiple comments assigned to them

B.

It cannot be edited manually by a right click administrator action, it can only be edited in policy by using the action "Run Script on CounterACT"

C.

It can be edited manually by a right click administrator action, or it can be edited in policy by using the action "Run Script on CounterACT"

D.

Endpoints may have exactly one comment assigned to them

E.

It can be edited manually by a right click administrator action, or it can be edited in policy by using the action "Run Script on Windows"

Which two of the following are main uses of the User Directory plugin? (Choose Two)

A.

Verify authentication credentials

B.

Define authentication traffic

C.

Perform Radius authorization

D.

Query user details

E.

Populate the Dashboard

What best defines a 'Post-Connect Methodology'?

A.

802.1X is a flavor of Post-Connect

B.

Guilty until proven innocent

C.

Innocent until proven guilty

D.

Used subsequent to pre-connect

E.

Assessed for critical compliance before IP address is assigned

When configuring policy conditions, which of the statements is true regarding this image?

Select one:

A.

Negates the criteria as part of the property

B.

Modifies the irresolvable condition to TRUE

C.

Generates a NOT condition in the sub-rule condition

D.

Irresolvable hosts would match the condition

E.

Modifies the evaluate irresolvable condition to FALSE

Which policies require modification to allow network-based PC imaging of devices while blocking non-corporate devices? (Choose two)

A.

Linux Manageability policy

B.

Enterprise Discover policy

C.

MAC Manageability policy

D.

IoT Discover policy

E.

Windows Enterprise Manageability policy