In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)A . NTPB . DHCPC . WebD . DNSE . ISMTPView AnswerAnswer: B, C, D

February 12, 2024 No Comments READ MORE +

Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)

Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)A . CLIB . SMTPC . SNMPD . FTPE . RADIUSView AnswerAnswer: ACE Explanation: FortiNAC Study Guide 7.2 | Page 11

February 8, 2024 No Comments READ MORE +

When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?

When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?A . Security ruleB . Device profiling ruleC . RADIUS group attributeD . Logical networkView AnswerAnswer: D

February 4, 2024 No Comments READ MORE +

Which agent can receive and display messages from FortiNAC to the end user?

Which agent can receive and display messages from FortiNAC to the end user?A . DissolvableB . PersistentC . PassiveD . MDMView AnswerAnswer: B

February 4, 2024 No Comments READ MORE +

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies. What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?A . To deny access to only the production DNS serverB ....

February 4, 2024 No Comments READ MORE +

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

Which system group will force at-risk hosts into the quarantine network, based on point of connection?A . Physical Address FilteringB . Forced QuarantineC . Forced IsolationD . Forced RemediationView AnswerAnswer: B Explanation: Forced Quarantine, study guide 7.2 pag 245 and 248

February 4, 2024 No Comments READ MORE +

What is used to achieve this result?

An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?A . A security trigger activityB . A security filterC . An event to alarm mappingD . An event to action mappingView AnswerAnswer: C

February 3, 2024 No Comments READ MORE +

Where do you look to determine which network access policy, if any is being applied to a particular host?

Where do you look to determine which network access policy, if any is being applied to a particular host?A . The Policy Details view for the hostB . The Connections viewC . The Port Properties view of the hosts portD . The Policy Logs viewView AnswerAnswer: A Explanation: FortiNAC p...

February 3, 2024 No Comments READ MORE +

Where would the administrator look to determine when and why FortiNAC made the network access change?

While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN. Where would the administrator look to determine when and why FortiNAC made the network access change?A . The Event viewB . The Admin Auditing viewC . The Port Changes viewD...

February 3, 2024 No Comments READ MORE +

What capability do logical networks provide?

What capability do logical networks provide?A . Point of access-base autopopulation of device groups'B . Interactive topology view diagramsC . Application of different access values from a single access policyD . IVLAN -based inventory reportingView AnswerAnswer: C Explanation: Logical Networks allow you to create fewer Network Access Policies than before....

February 3, 2024 No Comments READ MORE +