Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

FSCP Forescout Certified Professional Exam Questions and Answers

Questions 4

Which of the following is a characteristic of a centralized deployment?

Options:

A.

Checking Microsoft vulnerabilities at remote site may have significant bandwidth impact

B.

Provides enhanced IPS and HTTP actions

C.

Is optimal for threat protection

D.

Deployed as a Layer-2 channel

E.

Every site has an appliance

Buy Now
Questions 5

What is required for CounterAct to parse DHCP traffic?

Options:

A.

Must see symmetrical traffic

B.

The enterprise manager must see DHCP traffic

C.

DNS client must be running

D.

DHCP classifier must be running

E.

Plugin located in Network module

Buy Now
Questions 6

Proper policy flow should consist of...

Options:

A.

Modify as little as possible in discovery, each classify sub-rule should flow to an assess policy, IoT classify policies typically test ownership, IT classify usually indicates ownership.

B.

Modify as little as possible in discovery, each classify sub-rule should flow to an assess policy, IoT classify policies typically test manageability, IT classify usually indicates ownership.

C.

Modify as little as possible in discovery, each sub-rule should flow to assess. IT classify policies typically test manageability, IoT classify usually indicates ownership.

D.

Discovery should include customized sub-rules, each discovery sub-rule should flow to a classify policy, IT classify policies typically test manageability, IoT classify usually indicates ownership.

E.

Modify as little as possible in discovery, each discovery sub-rule should flow to a classify policy. IT classify policies typically test manageability, IoT classify usually indicates ownership.

Buy Now
Questions 7

Which of the following is true regarding the Windows Installed Programs property which employs the "for any/for all" logic mechanism?

Options:

A.

Although the condition has multiple sub-properties, when "ANY" is selected it evaluates the programs for any of the configured sub-properties.

B.

The condition does not have any sub-properties. The "any/all" refers to the multiple programs.

C.

Although the condition has sub-properties which could refer to a single program on multiple endpoints, the "any/all" refers to the program's properties.

D.

Although the condition has multiple sub-properties, the "any/all" refers to the sub-properties and not the programs.

E.

Although the condition has multiple sub-properties, the "any/all" refers to the programs and not the sub-properties.

Buy Now
Questions 8

Which CLI command gathers historical statistics from the appliance and outputs the information to a single *.csv file for processing and analysis?

Options:

A.

fstool tech-support

B.

fstool appstats

C.

fstool va stats

D.

fstool stats

E.

fstool sysinfo stats

Buy Now
Questions 9

Policies will recheck when certain conditions are met. These may include...

Options:

A.

Admission event, group name change, Scope recheck timer expires

B.

Policy recheck timer expires, admission event, SC event change

C.

Admission event, policy categorization, SC event change

D.

Policy categorization, admission event, action schedule activation

E.

Policy recheck timer expires, group name change, SC event change

Buy Now
Questions 10

When an admission event is seen, how are main rules and sub-rules processed?

Options:

A.

Main rules process concurrently, sub-rules process sequentially.

B.

Main rules process in parallel, sub-rules process concurrently.

C.

Main rules process concurrently, sub-rules process in parallel.

D.

Main rules process sequentially, sub-rules process concurrently.

E.

Main rules process sequentially, sub-rules process in parallel.

Buy Now
Questions 11

Which of the following actions can be performed with Remote Inspection?

Options:

A.

Set Registry Key, Disable dual homing

B.

Send Balloon Notification, Send email to user

C.

Disable External Device, Start Windows Updates

D.

Start Secure Connector, Attempt to open a browser at the endpoint

E.

Endpoint Address ACL, Assign to VLAN

Buy Now
Questions 12

What information must be known prior to generating a Certificate Signing Request (CSR)?

Options:

A.

Certificate extension, format requirements, Encryption Type

B.

Hostname, IP Address, and FQDN

C.

IP address, CA, Host Name

D.

Revocation Authority, Certificate Extension, CA

E.

CA, Domain Name, Administrators Name

Buy Now
Questions 13

Which of the following logs are available from the GUI?

Options:

A.

Host Details, Policy, Blocking, Event Viewer, Audit Trail

B.

Switch, Policy, Blocking, Event Viewer, Audit Trail

C.

Switch, Discovery, Threat Protection, Event Viewer, Audit Trail

D.

HPS, Policy, Threat Protection, Event Viewer, Audit Trail

E.

Host Details, Policy, Today Log, Threat Event Viewer, Audit Trail

Buy Now
Questions 14

When creating a new "Send Mail" notification action, which email is used by default?

Options:

A.

The email configured under Options > General > Mail

B.

The email address of the last logged in user

C.

The Tech Support email

D.

The email that was used when registering the license

E.

The email entered in the send mail action on the rule

Buy Now
Questions 15

What should you do first when preparing for an upgrade to a new CounterACT version?

Options:

A.

Upgrade the members first before upgrading the EM.

B.

Upgrading an appliance is done through Options/Modules.

C.

From the appliance CLI, fstool upgrade /tmp/counteract-v8.0.1.fsp

D.

Consult the CounterACT® Release Notes for the appropriate version

E.

Upgrade only the modules compatible with the version you are installing.

Buy Now
Questions 16

Why is SMB required for Windows Manageability?

Options:

A.

Scripts run on CounterACT are copied to a temp directory and run locally on the endpoint

B.

Scripts run on endpoints are copied to a Linux script repository and run locally on the endpoint

C.

Scripts run on endpoints are copied to a temp directory and run remotely from CounterACT

D.

Scripts run on CounterACT are copied to a script repository and run remotely from CounterACT

E.

Scripts run on endpoints are copied to a temp directory and run locally on the endpoint

Buy Now
Questions 17

Which two of the following are main uses of the User Directory plugin? (Choose Two)

Options:

A.

Verify authentication credentials

B.

Define authentication traffic

C.

Perform Radius authorization

D.

Query user details

E.

Populate the Dashboard

Buy Now
Questions 18

Which of the following is true regarding Failover Clustering module configuration?

Options:

A.

Once appliances are configured, then press the Apply button.

B.

Segments should be assigned to appliance folders and NOT to the individual appliances.

C.

You can see the status of failover by selecting IP Assignments and failover tab.

D.

Configure the second HA on the Secondary node.

E.

Place only the EM to participate in failover in the folder.

Buy Now
Questions 19

When configuring policies, which of the following statements is true regarding this image?

FSCP Question 19

Options:

A.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to True

B.

The external NOT does not change the meaning of "evaluate irresolvable as"

C.

Has no effect on irresolvable hosts

D.

Negates the criteria inside the property

E.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to False

Buy Now
Questions 20

Which of the following switch actions cannot both be used concurrently on the same switch?

Options:

A.

Access Port ACL & Switch Block

B.

Switch Block & Assign to VLAN

C.

Endpoint Address ACL & Assign to VLAN

D.

Access Port ACL & Endpoint Address ACL

E.

Access Port ACL & Assign to VLAN

Buy Now
Questions 21

What best defines a 'Post-Connect Methodology'?

Options:

A.

802.1X is a flavor of Post-Connect

B.

Guilty until proven innocent

C.

Innocent until proven guilty

D.

Used subsequent to pre-connect

E.

Assessed for critical compliance before IP address is assigned

Buy Now
Questions 22

How can scripts be run when the Endpoint Remote Inspection method is set to "Using MS-WMI"?

Options:

A.

Using Task Scheduler but this has limitations

B.

Using WMI, which will allow interactive scripts to run

C.

Using RRP, which will allow interactive scripts to run

D.

Using WMI, but they may not be run interactively using this method

E.

Using fsprocserv.exe, but scripts may not be run interactively using this method

Buy Now
Questions 23

The host property 'HTTP User Agent banner' is resolved by what function?

Options:

A.

Device classification engine

B.

NetFlow

C.

NMAP scanning

D.

Packet engine

E.

Device profile library

Buy Now
Questions 24

What is the default recheck timer for a NAC policy?

Options:

A.

24 hours

B.

8 hours

C.

4 hours

D.

12 hours

E.

2 hours

Buy Now
Exam Code: FSCP
Exam Name: Forescout Certified Professional Exam
Last Update: May 21, 2026
Questions: 80

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now FSCP testing engine

PDF (Q&A)

$54.99  $157.11
buy now FSCP pdf