Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which statement about FortiClient enterprise management server is true?

A.

It provides centralized management of FortiGate devices.

B.

lt provides centralized management of multiple endpoints running FortiClient software.

C.

It provides centralized management of FortiClient Android endpoints only.

D.

It provides centralized management of Chromebooks running real-time protection

An administrator installs FortiClient on Windows Server.

What is the default behavior of real-time protection control?

A.

Real-time protection must update AV signature database

B.

Real-time protection sends malicious files to FortiSandbox when the file is not detected locally

C.

Real-time protection is disabled

D.

Real-time protection must update the signature database from FortiSandbox

Which two third-party tools can an administrator use to deploy FortiClient? (Choose two.)

A.

Microsoft Windows Installer

B.

B. Microsoft SCCM

C.

C. Microsoft Active Directory GPO

D.

QR code generator

Refer to the exhibit, which shows the Zero Trust Tagging Rule Set configuration.

Which two statements about the rule set are true? (Choose two.)

A.

The endpoint must satisfy that only Windows 10 is running.

B.

The endpoint must satisfy that only AV software is installed and running.

C.

The endpoint must satisfy that antivirus is installed and running and Windows 10 is running.

D.

The endpoint must satisfy that only Windows Server 2012 R2 is running.

Why does FortiGate need the root CA certificate of FortiClient EMS?

A.

To sign FortiClient CSR requests

B.

To revoke FortiClient client certificates

C.

C. To trust certificates issued by FortiClient EMS

D.

To update FortiClient client certificates

Which three features does FortiClient endpoint security include? (Choose three.)

A.

L2TP

B.

B. IPsec

C.

DLP

D.

D. Vulnerability management

E.

E. Real-time protection

Refer to the exhibit.

Based on the settings shown in the exhibit what action will FortiClient take when it detects that a user is trying to download an infected file?

A.

Blocks the infected files as it is downloading

B.

Quarantines the infected files and logs all access attempts

C.

Sends the infected file to FortiGuard for analysis

D.

Allows the infected file to download without scan

An administrator is required to maintain a software inventory on the endpoints. without showing the feature on the FortiClient dashboard What must the administrator do to achieve this requirement?

A.

The administrator must use default endpoint profile

B.

The administrator must not select the vulnerability scan feature in the deployment package.

C.

The administrator must select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile

D.

The administrator must click the hide icon on the vulnerability scan tab

An administrator has a requirement to add user authentication to the ZTNA access for remote or off-fabric users Which FortiGate feature is required m addition to ZTNA?

A.

FortiGate FSSO

B.

FortiGate certificates

C.

C. FortiGate explicit proxy

D.

FortiGate endpoint control

In a FortiSandbox integration, what does the remediation option do?

A.

Wait for FortiSandbox results before allowing files

B.

Exclude specified files

C.

Alert and notify only

D.

Deny access to a file when it sees no results