Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet NSE6_FNC-7.2 - Fortinet NSE 6 - FortiNAC 7.2

Page: 2 / 2
Total 57 questions

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

A.

To confirm installed security software

B.

To validate the VPN user credentials

C.

To designate the required agent type

D.

To validate the VPN client being used

What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?

A.

Only rogue hosts would be impacted.

B.

Both enforcement groups cannot contain the same port.

C.

Only al-risk hosts would be impacted.

D.

Both types of enforcement would be applied.

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?

A.

The host is provisioned based on the default access defined by the point of connection.

B.

The host is provisioned based on the network access policy.

C.

The host is isolated.

D.

The host is administratively disabled.

Refer to the exhibit.

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

A.

The host is moved to VLAN 111.

B.

The host is moved to a default isolation VLAN.

C.

No VLAN change is performed.

D.

The host is disabled.

While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.

Where would the administrator look to determine when and why FortiNAC made the network access change?

A.

The Event view

B.

The Admin Auditing view

C.

The Port Changes view

D.

The Connections view

Where are logical network values defined?

A.

In the model configuration view of each infrastructure device

B.

In the port properties view of each port

C.

On the profiled devices view

D.

In the security and access field of each host record

Which connecting endpoints are evaluated against all enabled device profiling rules?

A.

All hosts, each time they connect

B.

Rogues devices, only when they connect for the first time

C.

Known trusted devices each time they change location

D.

Rogues devices, each time they connect