11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NSE6_FNC-7.2 Exam Dumps - Fortinet NSE 6 - FortiNAC 7.2

Question # 4

In which view would you find who made modifications to a Group?

A.

The Event Management view

B.

The Security Events view

C.

The Alarms view

D.

The Admin Auditing view

Full Access
Question # 5

Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)

A.

A security event parser must be created for the device.

B.

The device sending the messages must be modeled in the Network Inventory view.

C.

The device must be added as a patch management server.

D.

The device must be added as a log receiver.

Full Access
Question # 6

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Full Access
Question # 7

View the command and output shown in the exhibit.

What is the current state of this host?

A.

Rogue

B.

Registered

C.

Not authenticated

D.

At-Risk

Full Access
Question # 8

Which two of the following are required for endpoint compliance monitors? (Choose two.)

A.

Persistent agent

B.

Logged on user

C.

Security rule

D.

Custom scan

Full Access
Question # 9

Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)

A.

Dissolvable

B.

Mobile

C.

Passive

D.

Persistent

Full Access
Question # 10

How does FortiGate update FortiNAC about VPN session information?

A.

API calls to FortiNAC

B.

Syslog messages

C.

SNMP traps

D.

Security Fabric Integration

Full Access
Question # 11

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

A.

To confirm installed security software

B.

To validate the VPN user credentials

C.

To designate the required agent type

D.

To validate the VPN client being used

Full Access
Question # 12

Which three capabilities does FortiNAC Control Manager provide? (Choose three.)

A.

Global visibility

B.

Global authentication security policies

C.

Global infrastructure device inventory

D.

Global version control

E.

Pooled licenses

Full Access
Question # 13

Where do you look to determine which network access policy, if any is being applied to a particular host?

A.

The Policy Details view for the host

B.

The Connections view

C.

The Port Properties view of the hosts port

D.

The Policy Logs view

Full Access
Question # 14

What capability do logical networks provide?

A.

Point of access-base autopopulation of device groups'

B.

Interactive topology view diagrams

C.

Application of different access values from a single access policy

D.

IVLAN -based inventory reporting

Full Access
Question # 15

Which command line shell and scripting language does FortiNAC use for WinRM?

A.

Linux

B.

Bash

C.

DOS

D.

Powershell

Full Access
Question # 16

While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.

Where would the administrator look to determine when and why FortiNAC made the network access change?

A.

The Event view

B.

The Admin Auditing view

C.

The Port Changes view

D.

The Connections view

Full Access
Question # 17

How are logical networks assigned to endpoints?

A.

Through device profiling rules

B.

Through network access policies

C.

Through Layer 3 polling configurations

D.

Through FortiGate IPv4 policies

Full Access