New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Refer to the exhibit, and then answer the question below.

Which host is rogue?

A.

1

B.

3

C.

2

D.

4

Full Access
Question # 5

How are logical networks assigned to endpoints?

A.

Through device profiling rules

B.

Through network access policies

C.

Through Layer 3 polling configurations

D.

Through FortiGate IPv4 policies

Full Access
Question # 6

Refer to the exhibit.

Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?

A.

The port will be provisioned for the normal state host, and both hosts will have access to that VLAN.

B.

The port will not be managed, and an event will be generated.

C.

The port will be provisioned to the registration network, and both hosts will be isolated.

D.

The port will be administratively shut down.

Full Access
Question # 7

Which three of the following are components of a security rule? (Choose three.)

A.

Security String

B.

Methods

C.

Action

D.

User or host profile

E.

Trigger

Full Access
Question # 8

View the command and output shown in the exhibit.

What is the current state of this host?

A.

Rogue

B.

Registered

C.

Not authenticated

D.

At-Risk

Full Access
Question # 9

What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?

A.

The port would be provisioned for the normal state host, and both hosts would have access to that VLAN.

B.

The port would not be managed, and an event would be generated.

C.

The port would be provisioned to the registration network, and both hosts would be isolated.

D.

The port would be administratively shut down.

Full Access
Question # 10

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?

A.

The host is provisioned based on the default access defined by the point of connection.

B.

The host is provisioned based on the network access policy.

C.

The host is isolated.

D.

The host is administratively disabled.

Full Access
Question # 11

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

A.

NTP

B.

DHCP

C.

Web

D.

DNS

E.

ISMTP

Full Access
Question # 12

Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

A.

Authentication

B.

Network Access

C.

Endpoint Compliance

D.

Supplicant EasvConnect

Full Access
Question # 13

By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?

A.

The port is switched into the Dead-End VLAN.

B.

The port becomes a threshold uplink.

C.

The port is disabled.

D.

The port is added to the Forced Registration group.

Full Access
Question # 14

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

A.

Agent technology

B.

Portal page on-boarding options

C.

MDM integration

D.

Application layer traffic inspection

Full Access
Question # 15

How does FortiGate update FortiNAC about VPN session information?

A.

API calls to FortiNAC

B.

Syslog messages

C.

SNMP traps

D.

Security Fabric Integration

Full Access
Question # 16

Where do you look to determine when and why the FortiNAC made an automated network access change?

A.

The Event view

B.

The Port Changes view

C.

The Connections view

D.

The Admin Auditing view

Full Access
Question # 17

Refer to the exhibit.

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

A.

Multiple enforcement groups could not contain the same port.

B.

Only the higher ranked enforcement group would be applied.

C.

Both types of enforcement would be applied.

D.

Enforcement would be applied only to rogue hosts.

Full Access