Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which three are components of a security rule? (Choose three.)

A.

Methods

B.

Security String

C.

Trigger

D.

User or host profile

E.

Action

Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)

A.

Dissolvable agent

B.

DotlxAuto Registration

C.

Device importing

D.

MDM integration

E.

Captive portal

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

A.

To deny access to only the production DNS server

B.

To allow access to only the FortiNAC VPN interface

C.

To allow access to only the production DNS server

D.

To deny access to only the FortiNAC VPN interface

When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?

A.

Security rule

B.

Device profiling rule

C.

RADIUS group attribute

D.

Logical network

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Which three of the following are components of a security rule? (Choose three.)

A.

Security String

B.

Methods

C.

Action

D.

User or host profile

E.

Trigger

Which agent is used only as part of a login script?

A.

Mobile

B.

Passive

C.

Persistent

D.

Dissolvable