NSE6_FNC-8.5: Fortinet NSE 6 – FortiNAC 8.5 Practice Questions
Which agent is used only as part of a login script?
In which view would you find who made modifications to a Group?
A. The Admin Auditing view
B. The Alarms view
C. The Event Management view
D. The Security Events view
During the on-boarding process through the captive portal, why would a host that successfully registered remain stuck in the Registration VLAN? (Choose two.)
A. The wrong agent is installed.
B. Bridging is enabled on the host.
C. There is another unregistered host on the same port.
D. The ports default VLAN is the same as the Registration VLAN.
Which system group will force at-risk hosts into the quarantine network, based on point of connection?
A. Forced Quarantine
B. Forced Remediation
C. Forced Isolation
D. Physical Address Filtering
In a wireless integration, how does FortiNAC obtain connecting MAC address information?
A. Link traps
B. End station traffic monitoring
C. MAC notification traps
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?
A. The port is added to the Forced Registration group.
B. The port is disabled.
C. The port is switched into the Dead-End VLAN.
D. The port becomes a threshold uplink.
Which two of the following are required for endpoint compliance monitors? (Choose two.)
A. Logged on user
B. Security rule
C. Persistent agent
D. Custom scan
What agent is required in order to detect an added USB drive?
Which connecting endpoints are evaluated against all enabled device profiling rules?
A. Known trusted devices each time they change location
B. Rogues devices, each time they connect
C. Rogues devices, only when they connect for the first time
D. All hosts, each time they connect
How should you configure MAC notification traps on a supported switch?
A. Configure them only on ports set as 802.1q trunks
B. Configure them on all ports except uplink ports
C. Configure them on all ports on the switch
D. Configure them only after you configure linkup and linkdown traps
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
A. A matched security policy
B. Scheduled poll timings
C. Linkup and Linkdown traps
D. Manual polling
E. A failed Layer 3 poll
Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)