Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

NSE6_FNC-7.2 Fortinet NSE 6 - FortiNAC 7.2 Questions and Answers

Questions 4

Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)

Options:

A.

CLI

B.

SMTP

C.

SNMP

D.

FTP

E.

RADIUS

Buy Now
Questions 5

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

Options:

A.

Manual polling

B.

Scheduled poll timings

C.

A failed Layer 3 poll

D.

A matched security policy

E.

Linkup and Linkdown traps

Buy Now
Questions 6

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?

Options:

A.

The host is provisioned based on the default access defined by the point of connection.

B.

The host is provisioned based on the network access policy.

C.

The host is isolated.

D.

The host is administratively disabled.

Buy Now
Questions 7

How are logical networks assigned to endpoints?

Options:

A.

Through device profiling rules

B.

Through network access policies

C.

Through Layer 3 polling configurations

D.

Through FortiGate IPv4 policies

Buy Now
Questions 8

Which command line shell and scripting language does FortiNAC use for WinRM?

Options:

A.

Linux

B.

Bash

C.

DOS

D.

Powershell

Buy Now
Questions 9

When you create a user or host profile; which three criteria can you use? (Choose three.)

Options:

A.

An applied access policy

B.

Administrative group membership

C.

Location

D.

Host or user group memberships

E.

Host or user attributes

Buy Now
Questions 10

Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)

Options:

A.

A security event parser must be created for the device.

B.

The device sending the messages must be modeled in the Network Inventory view.

C.

The device must be added as a patch management server.

D.

The device must be added as a log receiver.

Buy Now
Questions 11

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

Options:

A.

Agent technology

B.

Portal page on-boarding options

C.

MDM integration

D.

Application layer traffic inspection

Buy Now
Questions 12

Refer to the exhibit.

NSE6_FNC-7.2 Question 12

Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?

Options:

A.

The port will be provisioned for the normal state host, and both hosts will have access to that VLAN.

B.

The port will not be managed, and an event will be generated.

C.

The port will be provisioned to the registration network, and both hosts will be isolated.

D.

The port will be administratively shut down.

Buy Now
Questions 13

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

Options:

A.

To confirm installed security software

B.

To validate the VPN user credentials

C.

To designate the required agent type

D.

To validate the VPN client being used

Buy Now
Questions 14

What capability do logical networks provide?

Options:

A.

Point of access-base autopopulation of device groups'

B.

Interactive topology view diagrams

C.

Application of different access values from a single access policy

D.

IVLAN -based inventory reporting

Buy Now
Exam Code: NSE6_FNC-7.2
Exam Name: Fortinet NSE 6 - FortiNAC 7.2
Last Update: May 10, 2024
Questions: 47

PDF + Testing Engine

$66.4  $165.99

Testing Engine

$46  $114.99
buy now NSE6_FNC-7.2 testing engine

PDF (Q&A)

$42  $104.99
buy now NSE6_FNC-7.2 pdf