Fortinet NSE6_FNC-7.2 - Fortinet NSE 6 - FortiNAC 7.2
Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
What capability do logical networks provide?
What agent is required in order to detect an added USB drive?
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)
Which three of the following are components of a security rule? (Choose three.)
Two FortiNAC devices have been configured in an HA configuration. After five failed heartbeats between the primary device and secondary device, the primary device fail to ping the designated gateway. What happens next?
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
Which two are required for endpoint compliance monitors? (Choose two.}