Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
When you create a user or host profile; which three criteria can you use? (Choose three.)
Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
Refer to the exhibit.
Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?
When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?