Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Where are logical network values defined?

A.

In the model configuration view of each infrastructure device

B.

In the port properties view of each port

C.

On the profiled devices view

D.

In the security and access field of each host record

Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)

A.

A security event parser must be created for the device.

B.

The device sending the messages must be modeled in the Network Inventory view.

C.

The device must be added as a patch management server.

D.

The device must be added as a log receiver.

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

A.

Manual polling

B.

Scheduled poll timings

C.

A failed Layer 3 poll

D.

A matched security policy

E.

Linkup and Linkdown traps

Where do you look to determine which network access policy, if any is being applied to a particular host?

A.

The Policy Details view for the host

B.

The Connections view

C.

The Port Properties view of the hosts port

D.

The Policy Logs view

Which devices would be evaluated by device profiling rules?

A.

Rogue devices, each time they connect

B.

All hosts, each time they connect

C.

Known trusted devices, each time they change location

D.

Rogue devices, only when they are initially added to the database

An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?

A.

A security trigger activity

B.

A security filter

C.

An event to alarm mapping

D.

An event to action mapping

Refer to the exhibit.

Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?

A.

The port will be provisioned for the normal state host, and both hosts will have access to that VLAN.

B.

The port will not be managed, and an event will be generated.

C.

The port will be provisioned to the registration network, and both hosts will be isolated.

D.

The port will be administratively shut down.

While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.

Where would the administrator look to determine when and why FortiNAC made the network access change?

A.

The Event view

B.

The Admin Auditing view

C.

The Port Changes view

D.

The Connections view

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

A.

Agent technology

B.

Portal page on-boarding options

C.

MDM integration

D.

Application layer traffic inspection

Which agent can receive and display messages from FortiNAC to the end user?

A.

Dissolvable

B.

Persistent

C.

Passive

D.

MDM