Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Place the DNS Enforce control actions into the correct workflow order for endpoints which have a pending control action.

Where are the plugin logs located in the CounterACT CLI?

A.

/usr/local/forescout/plugin//log

B.

/usr/local/forescout/plugin/log/

C.

/usr/local/forescout/log

D.

/usr/local/log/plugin/

E.

/usr/local/forescout/log/plugin/

When using Remote Inspection for Windows, which of the following properties require fsprocsvc.exe interactive scripting?

A.

User Directory Common Name

B.

Update Microsoft Vulnerabilities

C.

Windows Expected Script Result

D.

Antivirus Running

E.

Windows Service Running

Which of the following is true regarding how CounterACT restores a quarantined endpoint to its original production VLAN after the "Assign to VLAN Action" is removed?

A.

This happens automatically because CounterACT compares the running and startup configs

B.

This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not changed in the switch running config

C.

This happens automatically as long as no configuration changes to the switch are made to the running config

D.

This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config

E.

A policy is required to ensure this happens correctly.

Which of the following best describes the 4th step of the basic troubleshooting approach?

A.

Gather Information from the command line

B.

Network Dependencies

C.

Consider CounterACT Dependencies

D.

Form Hypothesis, Document and Diagnose

E.

Gather Information from CounterACT

What should be done after the Managed Windows devices are sent to a policy to determine the Windows 10 patch delivery optimization setting?

A.

Push out the proper DWORD setting via GPO

B.

Non Windows 10 devices must be called out in sub-rules since they will not have the relevant DWORD

C.

Manageable Windows devices are not required by this policy

D.

Non Windows 10 devices must be called out in sub-rules so that the relevant DWORD value may be changed

E.

Write sub-rules to check for each of the DWORD values used in patch delivery optimization

When using the discover properties OS, Function, Network Function and NIC Vendor and Module, certain hosts may not be correctly profiled. What else may be used to provide additional possible details to assist in correctly profiling the host?

A.

Monitoring traffic

B.

Packet engine

C.

Advanced Classification

D.

NMAP Scanning

E.

Function

Which type of endpoint can be queried for registry key properties?

A.

Managed unknown endpoint

B.

Unmanaged Windows endpoint

C.

Managed Windows endpoint

D.

Windows endpoint

E.

Managed Linux endpoint

When creating a new "Send Mail" notification action, which email is used by default?

A.

The email configured under Options > General > Mail

B.

The email address of the last logged in user

C.

The Tech Support email

D.

The email that was used when registering the license

E.

The email entered in the send mail action on the rule

When configuring policies, which of the following statements is true regarding this image?

A.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to True

B.

The external NOT does not change the meaning of "evaluate irresolvable as"

C.

Has no effect on irresolvable hosts

D.

Negates the criteria inside the property

E.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to False