ExamGecko
Home Home / Fortinet / NSE5_FCT-7.0

Fortinet NSE5_FCT-7.0 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Refer to the exhibits.

Which shows the configuration of endpoint policies.

Based on the configuration, what will happen when someone logs in with the user account student on an endpoint in the trainingAD domain?

A.
FortiClient EMS will assign the Sales policy
A.
FortiClient EMS will assign the Sales policy
Answers
B.
FortiClient EMS will assign the Training policy
B.
FortiClient EMS will assign the Training policy
Answers
C.
FortiClient EMS will assign the Default policy
C.
FortiClient EMS will assign the Default policy
Answers
D.
FortiClient EMS will assign the Training policy for on-fabric endpoints and the Sales policy for the off-fabric endpoint
D.
FortiClient EMS will assign the Training policy for on-fabric endpoints and the Sales policy for the off-fabric endpoint
Answers
Suggested answer: B

Refer to the exhibit.

Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant? (Choose two.)

A.
Enable the webfilter profile
A.
Enable the webfilter profile
Answers
B.
Integrate FortiSandbox for infected file analysis
B.
Integrate FortiSandbox for infected file analysis
Answers
C.
Patch applications that have vulnerability rated as high or above
C.
Patch applications that have vulnerability rated as high or above
Answers
D.
Run Calculator application on the endpoint
D.
Run Calculator application on the endpoint
Answers
Suggested answer: C, D

An administrator has a requirement to add user authentication to the ZTNA access for remote or off-fabric users Which FortiGate feature is required m addition to ZTNA?

A.
FortiGate FSSO
A.
FortiGate FSSO
Answers
B.
FortiGate certificates
B.
FortiGate certificates
Answers
C.
FortiGate explicit proxy
C.
FortiGate explicit proxy
Answers
D.
FortiGate endpoint control
D.
FortiGate endpoint control
Answers
Suggested answer: C

What action does FortiClient anti-exploit detection take when it detects exploits?

A.
Terminates the compromised application process
A.
Terminates the compromised application process
Answers
B.
Blocks memory allocation to the compromised application process
B.
Blocks memory allocation to the compromised application process
Answers
C.
Patches the compromised application process
C.
Patches the compromised application process
Answers
D.
Deletes the compromised application process
D.
Deletes the compromised application process
Answers
Suggested answer: A

Explanation:

The anti-exploit detection protects vulnerable endpoints from unknown exploit attacks. FortiClient monitors the behavior of popular applications, such as web browsers (Internet Explorer, Chrome, Firefox, Opera), Java/Flash plug-ins, Microsoft Office applications, and PDF readers, to detect exploits that use zero-day or unpatched vulnerabilities to infect the endpoint. Once detected, FortiClient terminates the compromised application process.

Refer to the exhibit.

Which shows multiple endpoint policies on FortiClient EMS.

Which policy is applied to the endpoint in the AD group trainingAD?

A.
The Sales policy
A.
The Sales policy
Answers
B.
The Training policy
B.
The Training policy
Answers
C.
Both the Sales and Training policies because their priority is higher than the Default policy
C.
Both the Sales and Training policies because their priority is higher than the Default policy
Answers
D.
The Default policy because it has the highest priority
D.
The Default policy because it has the highest priority
Answers
Suggested answer: B

Explanation:

Training policy because:

- Policy is enabled

- Priority is better than Default Policy

Refer to the exhibit.

Based on the FortiClient log details shown in the exhibit, which two statements are true? (Choose two.)

A.
The filename is Unconfirmed 899290 .crdownload.
A.
The filename is Unconfirmed 899290 .crdownload.
Answers
B.
The file status is Quarantined
B.
The file status is Quarantined
Answers
C.
The filename is sent to ForuSandbox for further inspection.
C.
The filename is sent to ForuSandbox for further inspection.
Answers
D.
The file location IS \??\D:\Users\.
D.
The file location IS \??\D:\Users\.
Answers
Suggested answer: A, B

Refer to the exhibit.

Based on the logs shown in the exhibit, why did FortiClient EMS fail to install FortiClient on the endpoint?

A.
The remote registry service is not running
A.
The remote registry service is not running
Answers
B.
The Windows installer service is not running
B.
The Windows installer service is not running
Answers
C.
The task scheduler service is not running.
C.
The task scheduler service is not running.
Answers
D.
The FortiClient antivirus service is not running
D.
The FortiClient antivirus service is not running
Answers
Suggested answer: C

Explanation:

https://community.fortinet.com/t5/FortiClient/Technical-Note-FortiClient-fails-to-install-from-FortiClient-EMS/ta-p/193680 The deployment service error message may be caused by any of the following. Try eliminating them all, one at a time. 1. Wrong username or password in the EMS profile 2. Endpoint is unreachable over the network 3. Task Scheduler service is not running 4. Remote Registry service is not running 5. Windows firewall is blocking connection

An administrator installs FortiClient EMS in the enterprise.

Which component is responsible for enforcing protection and checking security posture?

A.
FortiClient vulnerability scan
A.
FortiClient vulnerability scan
Answers
B.
FortiClient EMS tags
B.
FortiClient EMS tags
Answers
C.
FortiClient EMS
C.
FortiClient EMS
Answers
D.
FortiClient
D.
FortiClient
Answers
Suggested answer: D

Explanation:

FortiClient is the component that is responsible for enforcing protection and checking security posture on the endpoints. FortiClient provides features such as antivirus, web filtering, firewall, vulnerability scan, and VPN. FortiClient EMS is the management server that centrally configures and monitors FortiClient endpoints. FortiClient EMS tags are used to group endpoints based on criteria such as OS, IP address, or domain. FortiClient vulnerability scan is a feature that detects and fixes security issues on the endpoints.Reference:=

FortiClient EMS

Compliance with EMS and FortiOS

Which three features does FortiClient endpoint security include? (Choose three.)

A.
L2TP
A.
L2TP
Answers
B.
IPsec
B.
IPsec
Answers
C.
DLP
C.
DLP
Answers
D.
Vulnerability management
D.
Vulnerability management
Answers
E.
Real-time protection
E.
Real-time protection
Answers
Suggested answer: B, D, E

A new chrome book is connected in a school's network.

Which component can the EMS administrator use to manage the FortiClient web filter extension installed on the Google Chromebook endpoint?

A.
FortiClient EMS
A.
FortiClient EMS
Answers
B.
FortiClient site categories
B.
FortiClient site categories
Answers
C.
FortiClient customer URL list
C.
FortiClient customer URL list
Answers
D.
FortiClient web filter extension
D.
FortiClient web filter extension
Answers
Suggested answer: A
Total 49 questions
Go to page: of 5