Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Exhibit.

Which two statements are true about the hr endpoint? (Choose two.)

A.

The endpoint application inventory could not be retrieved

B.

The endpoint is marked as a rogue device

C.

The endpoint has failed the compliance scan

D.

The endpoint will be moved to the remediation VLAN

exhibit.

User student is not able to log in to SSL VPN

Given the output showing a real-time debug: which statement describes the login failure?

A.

Unable to verify chain of trust for the peer certificate

B.

CN does not match the user peer configuration

C.

student is not part of the usergroup SSL_VPN_Users.

D.

Client certificate has expired

What are the three core principles of ZTA? (Choose three.)

A.

Verity

B.

Be compliant

C.

Certify

D.

Minimal access

E.

Assume breach

Which configuration is required for FortiNAC to perform an automated incident response based on the FortiGate traffic?

A.

FortiNAC should be added as a participant in the Security Fabric

B.

FortiNAC requires read-write SNMP access to FortiGate.

C.

FortiNAC should be configured as a syslog server on FortiGate

D.

FortiNAC requires HTTPS access to FortiGate for API calls

Which two types of configuration can you associate with a user/host profile on FortiNAC? (Choose two.)

A.

Service Connectors

B.

Network Access

C.

Inventory

D.

Endpoint compliance

Which three methods can you use to trigger layer 2 polling on FortiNAC? (Choose three)

A.

Polling scripts

B.

Link traps

C.

Manual polling

D.

Scheduled tasks

E.

Polling using API

An administrator is trying to create a separate web tittering profile for off-fabric and on-fabric clients and push it to managed FortiClient devices

Where can you enable this feature on FortiClient EMS?

A.

Endpoint policy

B.

ZTNA connection rules

C.

System settings

D.

On-fabric rule sets

Which statement is true about FortiClient EMS in a ZTNA deployment?

A.

Uses endpoint information to grant or deny access to the network

B.

Provides network and user identity authentication services

C.

Generates and installs client certificates on managed endpoints

D.

Acts as ZTNA access proxy for managed endpoints

Exhibit.

Which statement is true about the hr endpoint?

A.

The endpoint is a rogue device

B.

The endpoint is disabled

C.

The endpoint is unauthenticated

D.

The endpoint has been marked at risk