Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

A.

Agent technology

B.

Portal page on-boarding options

C.

MDM integration

D.

Application layer traffic inspection

Where do you look to determine when and why the FortiNAC made an automated network access change?

A.

The Event view

B.

The Port Changes view

C.

The Connections view

D.

The Admin Auditing view

Refer to the exhibit.

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

A.

The host is moved to VLAN 111.

B.

The host is moved to a default isolation VLAN.

C.

No VLAN change is performed.

D.

The host is disabled.

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

A.

Manual polling

B.

Scheduled poll timings

C.

A failed Layer 3 poll

D.

A matched security policy

E.

Linkup and Linkdown traps

Refer to the exhibit, and then answer the question below.

Which host is rogue?

A.

1

B.

3

C.

2

D.

4

Where do you look to determine which network access policy, if any is being applied to a particular host?

A.

The Policy Details view for the host

B.

The Connections view

C.

The Port Properties view of the hosts port

D.

The Policy Logs view

When FortiNAC is managing VPN clients connecting through FortiGate. why must the clients run a FortiNAC agent?

A.

To collect user authentication details

B.

To meet the client security profile rule for scanning connecting clients

C.

To collect the client IP address and MAC address

D.

To transparently update the client IP address upon successful authentication

What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?

A.

Only rogue hosts would be impacted.

B.

Both enforcement groups cannot contain the same port.

C.

Only al-risk hosts would be impacted.

D.

Both types of enforcement would be applied.

Refer to the exhibit.

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

A.

Multiple enforcement groups could not contain the same port.

B.

Only the higher ranked enforcement group would be applied.

C.

Both types of enforcement would be applied.

D.

Enforcement would be applied only to rogue hosts.

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

A.

Physical Address Filtering

B.

Forced Quarantine

C.

Forced Isolation

D.

Forced Remediation