ExamGecko
Home Home / Fortinet / FCP_FCT_AD-7.2

Fortinet FCP_FCT_AD-7.2 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











What is the function of the quick scan option on FortiClient?

A.
It scans programs and drivers that are currently running, for threats
A.
It scans programs and drivers that are currently running, for threats
Answers
B.
It performs a full system scan including all files, executable files. DLLs, and drivers for throats.
B.
It performs a full system scan including all files, executable files. DLLs, and drivers for throats.
Answers
C.
It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.
C.
It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.
Answers
D.
It scans executable files. DLLs, and drivers that are currently running, for threats.
D.
It scans executable files. DLLs, and drivers that are currently running, for threats.
Answers
Suggested answer: B

Explanation:

 

Refer to the exhibit.

Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant? (Choose two.)

A.
Enable the web filter profile.
A.
Enable the web filter profile.
Answers
B.
Run Calculator application on the endpoint.
B.
Run Calculator application on the endpoint.
Answers
C.
Integrate FortiSandbox tor infected file analysis
C.
Integrate FortiSandbox tor infected file analysis
Answers
D.
Patch applications that have vulnerability rated as high or above.
D.
Patch applications that have vulnerability rated as high or above.
Answers
Suggested answer: B, D

Explanation:

Observation of Compliance Profile:

The compliance profile shown in the exhibit includes rules for vulnerability severity level and running process (Calculator.exe).

Evaluating Actions for Compliance:

To make the endpoint compliant, the administrator needs to ensure that the vulnerability severity level is medium or higher is patched (D).

Additionally, the Calculator.exe application must be running on the endpoint (B).

Eliminating Incorrect Options:

Enabling the web filter profile (A) is not related to the compliance rules shown.

Integrating FortiSandbox (C) is not a requirement in the given compliance profile.

Conclusion:

The correct actions are to run the Calculator application on the endpoint (B) and patch applications with vulnerabilities rated as high or above (D).

FortiClient EMS compliance profile configuration documentation from the study guides.

FortiClient EMS endpoint policies

Refer to the exhibit, which shows multiple endpoint policies on FortiClient EMS. Which policy is applied to the endpoint in the AD group trainingAD

A.
The Training policy
A.
The Training policy
Answers
B.
Both the Sales and Training policies because their priority is higher than the Default policy
B.
Both the Sales and Training policies because their priority is higher than the Default policy
Answers
C.
The Default policy because it has the highest priority
C.
The Default policy because it has the highest priority
Answers
D.
The sales policy
D.
The sales policy
Answers
Suggested answer: A

Explanation:

Observation of Endpoint Policies:

The exhibit shows multiple endpoint policies with their assigned groups, priority levels, and enabled status.

Evaluating Policy Assignment:

The Training policy is specifically assigned to the 'trainingAD.training.lab' group, with a higher priority than the Default policy.

Conclusion:

The correct policy applied to the endpoint in the AD group 'trainingAD' is the Training policy (A).

FortiClient EMS policy configuration and priority management documentation from the study guides.

Which two statements are true about the ZTNA rule? (Choose two.)

A.
It applies security profiles to protect traffic
A.
It applies security profiles to protect traffic
Answers
B.
It applies SNAT to protect traffic.
B.
It applies SNAT to protect traffic.
Answers
C.
It defines the access proxy.
C.
It defines the access proxy.
Answers
D.
It enforces access control.
D.
It enforces access control.
Answers
Suggested answer: A, D

Explanation:

Understanding ZTNA Rule Configuration:

The ZTNA rule configuration shown in the exhibit defines how traffic is managed and controlled based on specific tags and conditions.

Evaluating Rule Components:

The rule includes security profiles to protect traffic by applying various security checks (A).

The rule also enforces access control by determining which endpoints can access the specified resources based on the ZTNA tag (D).

Eliminating Incorrect Options:

SNAT (Source Network Address Translation) is not mentioned as part of this ZTNA rule.

The rule does not define the access proxy but uses it to enforce access control.

Conclusion:

The correct statements about the ZTNA rule are that it applies security profiles to protect traffic (A) and enforces access control (D).

ZTNA rule configuration documentation from the study guides.

An administrator is required to maintain a software vulnerability on the endpoints, without showing the feature on the FortiClient. What must the administrator do to achieve this requirement?

A.
Select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile
A.
Select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile
Answers
B.
Disable select the vulnerability scan feature in the deployment package
B.
Disable select the vulnerability scan feature in the deployment package
Answers
C.
Click the hide icon on the vulnerability scan profile assigned to endpoint
C.
Click the hide icon on the vulnerability scan profile assigned to endpoint
Answers
D.
Use the default endpoint profile
D.
Use the default endpoint profile
Answers
Suggested answer: C

Explanation:

Requirement Analysis:

The administrator needs to maintain a software vulnerability scan on endpoints without showing the feature on FortiClient.

Evaluating Options:

Disabling the feature in the deployment package or endpoint profile would remove the functionality entirely, which is not desired.

Using the default endpoint profile may not meet the specific requirement of hiding the feature.

Clicking the hide icon on the vulnerability scan profile assigned to the endpoint will keep the feature active but hidden from the user's view.

Conclusion:

The correct action is to click the hide icon on the vulnerability scan profile assigned to the endpoint (C).

FortiClient EMS feature configuration and management documentation from the study guides.

Which security fabric component sends a notification to quarantine an endpoint after IOC detection in the automation process?

A.
FortiAnalyzer
A.
FortiAnalyzer
Answers
B.
FortiClient
B.
FortiClient
Answers
C.
ForbClient EMS
C.
ForbClient EMS
Answers
D.
Forti Gate
D.
Forti Gate
Answers
Suggested answer: D

Refer to the exhibit.

Based on the CLI output from FortiGate. which statement is true?

A.
FortiGate is configured to pull user groups from FortiClient EMS
A.
FortiGate is configured to pull user groups from FortiClient EMS
Answers
B.
FortiGate is configured with local user group
B.
FortiGate is configured with local user group
Answers
C.
FortiGate is configured to pull user groups from FortiAuthenticator
C.
FortiGate is configured to pull user groups from FortiAuthenticator
Answers
D.
FortiGate is configured to pull user groups from AD Server.
D.
FortiGate is configured to pull user groups from AD Server.
Answers
Suggested answer: A

Explanation:

Based on the CLI output from FortiGate:

The configuration shows the use of 'type fortiems,' indicating that FortiGate is set up to interact with FortiClient EMS.

The 'server' field points to an IP address (10.0.1.200), which is typically the address of the FortiClient EMS server.

The configuration includes an SSL-enabled connection, which is a common setup for secure communication between FortiGate and FortiClient EMS.

Thus, the configuration indicates that FortiGate is set up to pull user groups from FortiClient EMS.

Reference

FortiGate Security 7.2 Study Guide, FSSO Configuration Section

Fortinet Documentation on FortiGate and FortiClient EMS Integration

An administrator has a requirement to add user authentication to the ZTNA access for remote or off-fabric users Which FortiGate feature is required m addition to ZTNA?

A.
FortiGate FSSO
A.
FortiGate FSSO
Answers
B.
FortiGate certificates
B.
FortiGate certificates
Answers
C.
FortiGate explicit proxy
C.
FortiGate explicit proxy
Answers
D.
FortiGate endpoint control
D.
FortiGate endpoint control
Answers
Suggested answer: C

Explanation:

For adding user authentication to the ZTNA access for remote or off-fabric users, the following FortiGate feature is required in addition to ZTNA:

FortiGate explicit proxy allows FortiGate to intercept web traffic for authentication purposes.

ZTNA integrates with various FortiGate features to provide secure access and ensure that users are authenticated before accessing resources.

By using an explicit proxy, FortiGate can handle web traffic and enforce authentication policies for remote users who are not directly on the corporate network (off-fabric).

Thus, the correct feature to use for this requirement is the FortiGate explicit proxy.

Reference

FortiGate Security 7.2 Study Guide, ZTNA and Proxy Configuration Sections

Fortinet Documentation on FortiGate Explicit Proxy and ZTNA Integration

Refer to the exhibit.

An administrator has restored the modified XML configuration file to FortiClient and sees the error shown in the exhibit.

Based on the XML settings shown in the exhibit, what must the administrator do to resolve the issue with the XML configuration file?

A.
The administrator must resolve the XML syntax error.
A.
The administrator must resolve the XML syntax error.
Answers
B.
The administrator must use a password to decrypt the file
B.
The administrator must use a password to decrypt the file
Answers
C.
The administrator must change the file size
C.
The administrator must change the file size
Answers
D.
The administrator must save the file as FortiClient-config conf.
D.
The administrator must save the file as FortiClient-config conf.
Answers
Suggested answer: A

Explanation:

Based on the error message and the XML configuration file shown in the exhibit:

The error 'Failed to process the file' typically indicates an issue with the XML syntax.

Upon reviewing the XML content, it is crucial to ensure that all tags are correctly formatted, properly opened and closed, and that there are no syntax errors.

Resolving any XML syntax errors will allow FortiClient to successfully process and restore the configuration file.

Therefore, the administrator must resolve the XML syntax error to fix the issue.

Reference

FortiClient EMS 7.2 Study Guide, Configuration File Management Section

General XML Syntax Guidelines and Best Practices

Which statement about FortiClient enterprise management server is true?

A.
It provides centralized management of FortiGate devices.
A.
It provides centralized management of FortiGate devices.
Answers
B.
lt provides centralized management of multiple endpoints running FortiClient software.
B.
lt provides centralized management of multiple endpoints running FortiClient software.
Answers
C.
It provides centralized management of FortiClient Android endpoints only.
C.
It provides centralized management of FortiClient Android endpoints only.
Answers
D.
It provides centralized management of Chromebooks running real-time protection
D.
It provides centralized management of Chromebooks running real-time protection
Answers
Suggested answer: B

Explanation:

FortiClient EMS is designed to provide centralized management and control of multiple endpoints running FortiClient software. It serves as a central management server that allows administrators to efficiently manage and configure a large number of FortiClient installations across the network.

Total 55 questions
Go to page: of 6