Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Refer to the exhibits.

Based on the FortiGate Security Fabric settings shown in the exhibits, what must an administrator do on the EMS server to successfully quarantine an endpoint. when it is detected as a compromised host (loC)?

A.

The administrator must enable remote HTTPS access to EMS.

B.

The administrator must enable FQDN on EMS.

C.

The administrator must authorize FortiGate on FortiAnalyzer.

D.

The administrator must enable SSH access to EMS.

Full Access
Question # 5

What is the function of the quick scan option on FortiClient?

A.

It scans programs and drivers that are currently running, for threats

B.

It performs a full system scan including all files, executable files. DLLs, and drivers for throats.

C.

It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.

D.

It scans executable files. DLLs, and drivers that are currently running, for threats.

Full Access
Question # 6

FortiClient EMS endpoint policies

Refer to the exhibit, which shows multiple endpoint policies on FortiClient EMS. Which policy is applied to the endpoint in the AD group trainingAD

A.

The Training policy

B.

Both the Sales and Training policies because their priority is higher than the Default policy

C.

The Default policy because it has the highest priority

D.

The sales policy

Full Access
Question # 7

Which three features does FortiClient endpoint security include? (Choose three.)

A.

DLP

B.

Vulnerability management

C.

L2TP

D.

lPsec

E.

Real-lime protection

Full Access
Question # 8

An administrator is required to maintain a software vulnerability on the endpoints, without showing the feature on the FortiClient. What must the administrator do to achieve this requirement?

A.

Select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile

B.

Disable select the vulnerability scan feature in the deployment package

C.

Click the hide icon on the vulnerability scan profile assigned to endpoint

D.

Use the default endpoint profile

Full Access
Question # 9

Refer to the exhibit.

Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant? (Choose two.)

A.

Enable the web filter profile.

B.

Run Calculator application on the endpoint.

C.

Integrate FortiSandbox tor infected file analysis

D.

Patch applications that have vulnerability rated as high or above.

Full Access
Question # 10

Which two statements are true about the ZTNA rule? (Choose two.)

A.

It applies security profiles to protect traffic

B.

It applies SNAT to protect traffic.

C.

It defines the access proxy.

D.

It enforces access control.

Full Access
Question # 11

An administrator installs FortiClient on Windows Server.

What is the default behavior of real-time protection control?

A.

Real-time protection must update AV signature database

B.

Real-time protection sends malicious files to FortiSandbox when the file is not detected locally

C.

Real-time protection is disabled

D.

Real-time protection must update the signature database from FortiSandbox

Full Access
Question # 12

Refer to the exhibit.

Based on the CLI output from FortiGate. which statement is true?

A.

FortiGate is configured to pull user groups from FortiClient EMS

B.

FortiGate is configured with local user group

C.

FortiGate is configured to pull user groups from FortiAuthenticator

D.

FortiGate is configured to pull user groups from AD Server.

Full Access
Question # 13

ZTNA Network Topology

Refer to the exhibits, which show a network topology diagram of ZTNA proxy access and the ZTNA rule configuration.

An administrator runs the diagnose endpoint record list CLI command on FortiGate to check Remote-Client endpoint information, however Remote-Client is not showing up in the endpoint record list.

What is the cause of this issue?

A.

Remote-Client has not initiated a connection to the ZTNA access proxy.

B.

Remote-Client provided an empty client certificate to connect to the ZTNA access proxy.

C.

Remote-Client provided an invalid certificate to connect to the ZTNA access proxy.

D.

Remote-Client failed the client certificate authentication.

Full Access
Question # 14

An administrator configures ZTNA configuration on the FortiGate. Which statement is true about the firewall policy?

A.

It redirects the client request to the access proxy.

B.

It uses the access proxy.

C.

It defines ZTNA server.

D.

It only uses ZTNA tags to control access for endpoints.

Full Access
Question # 15

A new chrome book is connected in a school's network.

Which component can the EMS administrator use to manage the FortiClient web filter extension installed on the Google Chromebook endpoint?

A.

FortiClient EMS

B.

FortiClient site categories

C.

FortiClient customer URL list

D.

FortiClient web filter extension

Full Access
Question # 16

Refer to the exhibit, which shows the Zero Trust Tagging Rule Set configuration.

Which two statements about the rule set are true? (Choose two.)

A.

The endpoint must satisfy that only Windows 10 is running.

B.

The endpoint must satisfy that only AV software is installed and running.

C.

The endpoint must satisfy that antivirus is installed and running and Windows 10 is running.

D.

The endpoint must satisfy that only Windows Server 2012 R2 is running.

Full Access