ExamGecko
Home Home / Fortinet / FCP_FCT_AD-7.2

Fortinet FCP_FCT_AD-7.2 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Refer to the exhibit.

Based on the settings shown in the exhibit which statement about FortiClient behavior is true?

A.
FortiClient quarantines infected files and reviews later, after scanning them.
A.
FortiClient quarantines infected files and reviews later, after scanning them.
Answers
B.
FortiClient blocks and deletes infected files after scanning them.
B.
FortiClient blocks and deletes infected files after scanning them.
Answers
C.
FortiClient scans infected files when the user copies files to the Resources folder
C.
FortiClient scans infected files when the user copies files to the Resources folder
Answers
D.
FortiClient copies infected files to the Resources folder without scanning them.
D.
FortiClient copies infected files to the Resources folder without scanning them.
Answers
Suggested answer: A

Explanation:

Action On Virus Discovery Warn the User If a Process Attempts to Access Infected Files Quarantine Infected Files. You can use FortiClient to view, restore, or delete the quarantined file, as well as view the virus name, submit the file to FortiGuard, and view logs. Deny Access to Infected Files Ignore Infected Files

Which two third-party tools can an administrator use to deploy FortiClient? (Choose two.)

A.
Microsoft Windows Installer
A.
Microsoft Windows Installer
Answers
B.
Microsoft SCCM
B.
Microsoft SCCM
Answers
C.
Microsoft Active Directory GPO
C.
Microsoft Active Directory GPO
Answers
D.
QR code generator
D.
QR code generator
Answers
Suggested answer: B, C

Explanation:

Administrators can use several third-party tools to deploy FortiClient:

Microsoft SCCM (System Center Configuration Manager): SCCM is a robust tool used for deploying software across large numbers of Windows-based systems. It supports deployment of FortiClient through its software distribution capabilities.

Microsoft Active Directory GPO (Group Policy Object): GPOs are used to manage user and computer settings in an Active Directory environment. Administrators can deploy FortiClient to multiple machines using GPO software installation settings.

These tools provide centralized and scalable methods for deploying FortiClient across numerous endpoints in an enterprise environment.

Reference

FortiClient EMS 7.2 Study Guide, FortiClient Deployment Section

Fortinet Documentation on FortiClient Deployment using SCCM and GPO

Refer to the exhibit.

Based on the settings shown in the exhibit what action will FortiClient take when it detects that a user is trying to download an infected file?

A.
Blocks the infected files as it is downloading
A.
Blocks the infected files as it is downloading
Answers
B.
Quarantines the infected files and logs all access attempts
B.
Quarantines the infected files and logs all access attempts
Answers
C.
Sends the infected file to FortiGuard for analysis
C.
Sends the infected file to FortiGuard for analysis
Answers
D.
Allows the infected file to download without scan
D.
Allows the infected file to download without scan
Answers
Suggested answer: D

Explanation:

Block Malicious Website has nothing to do with infected files. Since Realtime Protection is OFF, it will be allowed without being scanned.

Based on the settings shown in the exhibit:

Realtime Protection: OFF

Dynamic Threat Detection: OFF

Block malicious websites: ON

Threats Detected: 75

The 'Realtime Protection' setting is crucial for preventing infected files from being downloaded and executed. Since 'Realtime Protection' is OFF, FortiClient will not actively scan files being downloaded. The setting 'Block malicious websites' is intended to prevent access to known malicious websites but does not scan files for infections.

Therefore, when a user tries to download an infected file, FortiClient will allow the file to download without scanning it due to the Realtime Protection being OFF.

Reference

FortiClient EMS 7.2 Study Guide, Antivirus Protection Section

Fortinet Documentation on FortiClient Real-time Protection Settings

Which two statements about ZTNA destinations are true? (Choose two.)

A.

FottiClient ZTNA destinations use an existing VPN tunnel to create a secure connection.

A.

FottiClient ZTNA destinations use an existing VPN tunnel to create a secure connection.

Answers
B.

FortiClient ZTNA destinations provides access through TCP forwarding.

B.

FortiClient ZTNA destinations provides access through TCP forwarding.

Answers
C.

FortiClient ZTNA destinations do not support a wildcard FQDN.

C.

FortiClient ZTNA destinations do not support a wildcard FQDN.

Answers
D.

FortiClient ZTNA destination encryption is disabled by default.

D.

FortiClient ZTNA destination encryption is disabled by default.

Answers
E.

FortiCIient ZTNA destination authentication is enabled by default.

E.

FortiCIient ZTNA destination authentication is enabled by default.

Answers
Suggested answer: C, D

Which statement about the FortiClient enterprise management server is true?

A.

It receives the configuration information of endpoints from ForuGate.

A.

It receives the configuration information of endpoints from ForuGate.

Answers
B.

It provides centralized management of multiple endpoints running FortiClient software.

B.

It provides centralized management of multiple endpoints running FortiClient software.

Answers
C.

It enforces compliance on the endpoints using tags

C.

It enforces compliance on the endpoints using tags

Answers
D.

It receives the CA certificate from FortiGate to validate client certrficates.

D.

It receives the CA certificate from FortiGate to validate client certrficates.

Answers
Suggested answer: C
Total 55 questions
Go to page: of 6