Forescout FSCP - Forescout Certified Professional Exam
Which of the following is true regarding how CounterACT restores a quarantined endpoint to its original production VLAN after the "Assign to VLAN Action" is removed?
This happens automatically because CounterACT compares the running and startup configs
This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not changed in the switch running config
This happens automatically as long as no configuration changes to the switch are made to the running config
This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config
A policy is required to ensure this happens correctly.
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Switch Plugin Configuration Guide Version 8.12 and 8.14.2, CounterACT restores a quarantined endpoint to its original production VLAN automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config.​
VLAN Restoration Mechanism:
According to the Switch Plugin documentation:​
When the "Assign to VLAN" action is removed or expires, CounterACT can restore the original VLAN configuration by comparing the running configuration with the startup configuration on the switch.
The Key Requirement:
According to the documentation:​
The restoration process works as follows:
Assign to VLAN Action Applied - Endpoint is moved to quarantine VLAN (switch running config is updated)
Assign to VLAN Action Removed - CounterACT wants to restore the original VLAN
Running vs. Startup Config Comparison - CounterACT compares running config to startup config
Restoration - The port is returned to its original VLAN as defined in the startup configuration
Critical Condition:
According to the documentation:​
"This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config"
This is critical because:
If manual changes are saved to the startup config, CounterACT cannot determine what the "original" VLAN should be
The startup config must remain unchanged for CounterACT to restore the correct VLAN
The running config changes are temporary and revert to startup config values
Why Other Options Are Incorrect:
A. CounterACT compares the running and startup configs - While true that comparison occurs, the condition is about whether changes are saved to startup, not just comparing
B. Configuration changes...are not changed in the switch running config - Too broad; there can be other running config changes; the specific requirement is about VLAN configuration being saved to startup
C. No configuration changes to the switch are made to the running config - Too strict; other changes can be made; only VLAN switchport access configuration matters
E. A policy is required - Incorrect; this is automatic behavior, not policy-dependent
Default VLAN Feature:
According to the Switch Plugin Configuration Guide:​
The Default VLAN feature ensures that ports are automatically assigned to a default VLAN unless specifically configured otherwise. When the "Assign to VLAN" action is removed, the port returns to the default VLAN (as defined in the startup configuration).
Referenced Documentation:
Forescout CounterACT Switch Plugin Configuration Guide Version 8.12​
Switch Plugin Configuration Guide v8.14.2​
Global Configuration Options for the Switch Plugin​
Which of the following switch actions cannot both be used concurrently on the same switch?
Access Port ACL & Switch Block
Switch Block & Assign to VLAN
Endpoint Address ACL & Assign to VLAN
Access Port ACL & Endpoint Address ACL
Access Port ACL & Assign to VLAN
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Switch Plugin Configuration Guide, Access Port ACL and Endpoint Address ACL cannot both be used concurrently on the same endpoint. These two actions are mutually exclusive because they both apply ACL rules to control traffic, but through different mechanisms, and attempting to apply both simultaneously creates a conflict.​
Switch Restrict Actions Overview:
The Forescout Switch Plugin provides several restrict actions that can be applied to endpoints:​
Access Port ACLÂ - Applies an operator-defined ACL to the access port of an endpoint
Endpoint Address ACLÂ - Applies an operator-defined ACL based on the endpoint's address (MAC or IP)
Assign to VLANÂ - Assigns the endpoint to a specific VLAN
Switch Block - Completely isolates endpoints by turning off their switch port
Action Compatibility Rules:
According to the Switch Plugin Configuration Guide:​
Endpoint Address ACL vs Access Port ACL - These CANNOT be used together on the same endpoint because:
Both actions modify switch filtering rules
Both actions can conflict when applied simultaneously
The Switch Plugin cannot determine priority between conflicting ACL configurations
Applying both would create ambiguous filtering logic on the switch
Actions That CAN Be Used Together:
Access Port ACL + Assign to VLAN -✓Can be used concurrently
Endpoint Address ACL + Assign to VLAN -✓Can be used concurrently
Switch Block + Assign to VLANÂ - This is semantically redundant (blocking takes precedence) but is allowed
Access Port ACL + Switch Block -✓Can be used concurrently (though Block takes precedence)
Why Other Options Are Incorrect:
A. Access Port ACL & Switch Block - These CAN be used concurrently; Switch Block would take precedence
B. Switch Block & Assign to VLANÂ - These CAN be used concurrently (though redundant)
C. Endpoint Address ACL & Assign to VLANÂ - These CAN be used concurrently
E. Access Port ACL & Assign to VLANÂ - These CAN be used concurrently; they work on different aspects of port management
ACL Action Definition:
According to the documentation:​
Access Port ACLÂ - "Use the Access Port ACL action to define an ACL that addresses one or more than one access control scenario, which is then applied to an endpoint's switch port"
Endpoint Address ACLÂ - "Use the Endpoint Address ACL action to apply an operator-defined ACL, addressing one or more than one access control scenario, which is applied to an endpoint's address"
Referenced Documentation:
Forescout CounterACT Switch Plugin Configuration Guide Version 8.12​
Switch Plugin Configuration Guide v8.14.2​
Switch Restrict Actions documentation​
When using Remote Inspection for Windows, which of the following properties require fsprocsvc.exe interactive scripting?
User Directory Common Name
Update Microsoft Vulnerabilities
Windows Expected Script Result
Antivirus Running
Windows Service Running
The Answer Is:
CExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
The Windows Expected Script Result property is the correct answer. According to the official Forescout CounterACT Endpoint Module: HPS Inspection Engine Configuration Guide Version 10.8, the fsprocsvc.exe service is required to run interactive scripts for several CounterACT tasks during Remote Inspection operations on Windows endpoints.​
The documentation explicitly lists the following Properties requiring the fsprocsvc service (with Remote Inspection, i.e., not via SecureConnector):
Windows Expected Script Result ✓
Device Interfaces
Number of IP Addresses
External Devices
Windows File MD5 Signature
Windows Is Behind NAT
Microsoft Vulnerabilities
About fsprocsvc.exe Service:
The fsprocsvc.exe service is a proprietary ForeScout service utility that is downloaded by the HPS Inspection Engine to endpoints. It is used to run interactive scripts for several CounterACT tasks. Key characteristics include:​
Size on disk:Â Approximately 250KB
Memory acquired during runtime:Â 2 MB
Runs under:Â System context
Start type:Â Automatic
Inactivity timeout:Â After 2 hours of inactivity, the service stops automatically
Communication: Does not open any new network connection. Communication is carried out over Microsoft's SMB/RPC (445/TCP and 139/TCP) with domain credentials authentication​
Why Other Options Are Incorrect:
A. User Directory Common Name - This property is derived from User Directory plugin queries and does not require fsprocsvc interactive scripting
B. Update Microsoft Vulnerabilities - This is an action, not a property. While Microsoft Vulnerabilities property does require fsprocsvc, "Update" is not the property name listed
D. Antivirus Running - This is a basic WMI-based property that does not require interactive scripting via fsprocsvc
E. Windows Service Running - This is a basic property that can be determined through WMI queries without requiring fsprocsvc interactive scripting
Interactive Scripts Requirement:
According to the HPS Inspection Engine Configuration Guide, WMI does not support interactive scripts on all Windows endpoints. When WMI is used for Remote Inspection, CounterACT uses the fsprocsvc service to run interactive scripts on endpoints that require them. The Windows Expected Script Result property specifically requires running a custom script on the endpoint, which necessitates the fsprocsvc service for proper execution.​
Referenced Documentation:
Forescout CounterACT Endpoint Module: HPS Inspection Engine Configuration Guide Version 10.8​
Section: "About fsprocsvc.exe" and "Properties requiring the service (With remote inspection, i.e. not via SecureConnector)"
What are the important network traffic types that should be monitored by CounterACT?
Encrypted/Tunneled networks, DHCP, Web traffic
LWAP traffic, DHCP, Backup Networks
Backup Networks, Encrypted/Tunneled networks, DHCP
Web traffic, Authentication traffic, DHCP
LWAP traffic, Authentication traffic, Backup Networks
The Answer Is:
DExplanation:
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to the Forescout Administration Guide and CounterACT Installation Guide, the important network traffic types that should be monitored by CounterACT include Web traffic, Authentication traffic, and DHCP.​
Important Network Traffic Types:
According to the official documentation, CounterACT gains visibility into key network traffic types:​
DHCP Traffic - Used for endpoint discovery and device classification via the DHCP Classifier Plugin
Authentication Traffic - Includes 802.1X requests to RADIUS servers; critical for understanding network access patterns and user-to-endpoint mapping
Web Traffic (HTTP/HTTPS)Â - Used for HTTP banner scanning and HTTP-based device classification
DHCP Traffic Importance:
According to the DHCP Classifier Plugin Configuration Guide:​
"The DHCP Classifier Plugin extracts host information from DHCP messages. Hosts communicate with DHCP servers to acquire and maintain their network addresses. CounterACT extracts host information from DHCP message packets, and uses DHCP fingerprinting to determine the operating system and other host configuration information."
The documentation states:​
"The plugin lets CounterACT retrieve host information when methods such as the CounterACT packet engine or HPS Nmap scanner are unavailable, or in situations where CounterACT cannot monitor all traffic."
Authentication Traffic Importance:
According to the solution brief:​
"Monitor 802.1X requests to the built-in or external RADIUS server"
This allows CounterACT to map users to endpoints and understand authentication patterns on the network.
Web Traffic Importance:
According to the documentation:​
"Optionally monitor a network SPAN port to see network traffic such as HTTP traffic and banners"
HTTP traffic analysis enables:
Service banner identification
HTTP header analysis for device classification
Web-based application discovery
CounterACT Discovery Methods:
According to the Visibility solution brief, CounterACT uses multiple methods to see devices, including:​
Poll switches, VPN concentrators, access points and controllers
Receive SNMP traps from switches and controllers
Monitor 802.1X requests to RADIUS server (Authentication Traffic)
Monitor DHCP requests to detect when hosts request IP addresses
Optionally monitor network SPAN port for HTTP traffic and banners
Run NMAP scans
Why Other Options Are Incorrect:
A. Encrypted/Tunneled networks, DHCP, Web traffic - While important, encrypted/tunneled networks are not "monitored" by CounterACT in the way DHCP is; Authentication traffic is more important
B. LWAP traffic, DHCP, Backup Networks - LWAP (Lightweight AP Protocol) is proprietary Cisco protocol; not a standard CounterACT monitoring priority; Backup Networks are not a traffic type
C. Backup Networks, Encrypted/Tunneled networks, DHCPÂ - "Backup Networks" is not a network traffic type; Authentication traffic is more important than encrypted/tunneled traffic monitoring
E. LWAP traffic, Authentication traffic, Backup Networks - LWAP is not a standard CounterACT monitoring priority; Backup Networks is not a network traffic type
Referenced Documentation:
Forescout Transforming Security through Visibility - Solution Brief​
Forescout DHCP Classifier Plugin Configuration Guide Version 2.1​
CounterACT Installation Guide - Network Access Requirements​
