Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Fortinet NSE6_FNC-7.2 Dumps

Fortinet NSE 6 - FortiNAC 7.2 Questions and Answers

Question 1

Refer to the exhibit.

as

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

Options:

A.

The host is moved to VLAN 111.

B.

The host is moved to a default isolation VLAN.

C.

No VLAN change is performed.

D.

The host is disabled.

Question 2

Which devices would be evaluated by device profiling rules?

Options:

A.

Rogue devices, each time they connect

B.

All hosts, each time they connect

C.

Known trusted devices, each time they change location

D.

Rogue devices, only when they are initially added to the database

Question 3

Two FortiNAC devices have been configured in an HA configuration. After five failed heartbeats between the primary device and secondary device, the primary device fail to ping the designated gateway. What happens next?

Options:

A.

The primary device continues to operate as the in-control device and changes the status or secondary device to contact lost.

B.

The primary device changes its designation to secondary, and the secondary device changes to primary.

C.

The primary device shuts down NAC processes and changes to a management down status.

D.

The primary device waits 3 minutes and attempts to re-establish the HA heartbeat before attempting a second ping of the gateway.

Question 4

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

Options:

A.

NTP

B.

DHCP

C.

Web

D.

DNS

E.

ISMTP

Question 5

When FortiNAC is managing VPN clients connecting through FortiGate. why must the clients run a FortiNAC agent?

Options:

A.

To collect user authentication details

B.

To meet the client security profile rule for scanning connecting clients

C.

To collect the client IP address and MAC address

D.

To transparently update the client IP address upon successful authentication

Question 6

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

Options:

A.

To confirm installed security software

B.

To validate the VPN user credentials

C.

To designate the required agent type

D.

To validate the VPN client being used

Question 7

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

Options:

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Question 8

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

Options:

A.

Physical Address Filtering

B.

Forced Quarantine

C.

Forced Isolation

D.

Forced Remediation

Question 9

In which view would you find who made modifications to a Group?

Options:

A.

The Event Management view

B.

The Security Events view

C.

The Alarms view

D.

The Admin Auditing view

Question 10

Where should you configure MAC notification traps on a supported switch?

Options:

A.

Configure them only after you configure linkup and linkdown traps.

B.

Configure them on all ports on the switch.

C.

Configure them only on ports set as 802 1g trunks.

D.

Configure them on all ports except uplink ports.

Question 11

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

Options:

A.

To deny access to only the production DNS server

B.

To allow access to only the FortiNAC VPN interface

C.

To allow access to only the production DNS server

D.

To deny access to only the FortiNAC VPN interface

Question 12

Refer to the exhibit, and then answer the question below.

as

Which host is rogue?

Options:

A.

1

B.

3

C.

2

D.

4

Question 13

What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?

Options:

A.

Only rogue hosts would be impacted.

B.

Both enforcement groups cannot contain the same port.

C.

Only al-risk hosts would be impacted.

D.

Both types of enforcement would be applied.

Question 14

Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)

Options:

A.

Dissolvable

B.

Mobile

C.

Passive

D.

Persistent

Question 15

View the command and output shown in the exhibit.

as

What is the current state of this host?

Options:

A.

Rogue

B.

Registered

C.

Not authenticated

D.

At-Risk

Question 16

Refer to the exhibit.

as

If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?

Options:

A.

The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

B.

The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM.

C.

The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM.

D.

The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

Question 17

When configuring isolation networks in the configuration wizard, why does a Layer 3 network type allow for more than one DHCP scope for each isolation network type?

Options:

A.

There can be more than one isolation network of each type.

B.

Any scopes beyond the first scope are used if the Initial scope runs out of IP addresses.

C.

Configuring more than one DHCP scope allows for DHCP server redundancy.

D.

The Layer 3 network type allows for one scope for each possible host status.

Page: 1 / 6
Total 57 questions