ExamGecko
Home Home / Fortinet / NSE5_FCT-7.0

Fortinet NSE5_FCT-7.0 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Refer to the exhibit.

Based on the FortiClient logs shown in the exhibit which endpoint profile policy is currently applied to the FortiClient endpoint from the EMS server?

A.
Default
A.
Default
Answers
B.
Compliance rules default
B.
Compliance rules default
Answers
C.
Fortinet- Training
C.
Fortinet- Training
Answers
D.
Default configuration policy
D.
Default configuration policy
Answers
Suggested answer: C

Refer to the exhibit.

<a target='_blank' href='http://www.facebook.com/'>Based on the settings shown in the exhibit, which action will FortiClient take when users try to access www.facebook.com?</a>

A.
FortiClient will allow access to Facebook
A.
FortiClient will allow access to Facebook
Answers
B.
FortiClient will monitor only the user's web access to the Facebook website
B.
FortiClient will monitor only the user's web access to the Facebook website
Answers
C.
FortiClient will block access to Facebook and its subdomains.
C.
FortiClient will block access to Facebook and its subdomains.
Answers
D.
FortiClient will prompt a warning message to warn the user before they can access the Facebook website
D.
FortiClient will prompt a warning message to warn the user before they can access the Facebook website
Answers
Suggested answer: A

Refer to the exhibit.

Which shows the output of the ZTNA traffic log on FortiGate.

What can you conclude from the log message?

A.
The remote user connection does not match the explicit proxy policy.
A.
The remote user connection does not match the explicit proxy policy.
Answers
B.
The remote user connection does not match the ZTNA server configuration.
B.
The remote user connection does not match the ZTNA server configuration.
Answers
C.
The remote user connection does not match the ZTNA rule configuration.
C.
The remote user connection does not match the ZTNA rule configuration.
Answers
D.
The remote user connection does not match the ZTNA firewall policy
D.
The remote user connection does not match the ZTNA firewall policy
Answers
Suggested answer: C

Refer to the exhibits.

Which show the Zero Trust Tag Monitor and the FortiClient GUI status.

Remote-Client is tagged as Remote-Users on the FortiClient EMS Zero Trust Tag Monitor.

What must an administrator do to show the tag on the FortiClient GUI?

A.
Update tagging rule logic to enable tag visibility
A.
Update tagging rule logic to enable tag visibility
Answers
B.
Change the FortiClient system settings to enable tag visibility
B.
Change the FortiClient system settings to enable tag visibility
Answers
C.
Change the endpoint control setting to enable tag visibility
C.
Change the endpoint control setting to enable tag visibility
Answers
D.
Change the user identity settings to enable tag visibility
D.
Change the user identity settings to enable tag visibility
Answers
Suggested answer: B

Which two third-party tools can an administrator use to deploy FortiClient? (Choose two.)

A.
Microsoft Windows Installer
A.
Microsoft Windows Installer
Answers
B.
Microsoft SCCM
B.
Microsoft SCCM
Answers
C.
Microsoft Active Directory GPO
C.
Microsoft Active Directory GPO
Answers
D.
QR code generator
D.
QR code generator
Answers
Suggested answer: B, C

Which security fabric component sends a notification to quarantine an endpoint after IOC detection in the automation process?

A.
FortiAnalyzer
A.
FortiAnalyzer
Answers
B.
FortiClient
B.
FortiClient
Answers
C.
ForbClient EMS
C.
ForbClient EMS
Answers
D.
Forti Gate
D.
Forti Gate
Answers
Suggested answer: A

What is the function of the quick scan option on FortiClient?

A.
It scans executable files, DLLs, and drivers that are currently running, for threats.
A.
It scans executable files, DLLs, and drivers that are currently running, for threats.
Answers
B.
It scans programs and drivers that are currently running, for threats.
B.
It scans programs and drivers that are currently running, for threats.
Answers
C.
It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.
C.
It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.
Answers
D.
It performs a full system scan including all files, executable files, DLLs, and drivers for threats.
D.
It performs a full system scan including all files, executable files, DLLs, and drivers for threats.
Answers
Suggested answer: A

When site categories are disabled in FortiClient webfilter and antivirus (malicious websites), which feature can be used to protect the endpoint from malicious web access?

A.
Web exclusion list
A.
Web exclusion list
Answers
B.
Real-time protection list
B.
Real-time protection list
Answers
C.
Block malicious websites on antivirus
C.
Block malicious websites on antivirus
Answers
D.
FortiSandbox URL list
D.
FortiSandbox URL list
Answers
Suggested answer: A

Explanation:

Site Categories enables site categories from FortiGuard. When site categories are disabled, FortiClient is protected by the exclusion list. For all categories below, you can configure an action for the entire site category by selecting either Block, Warn, Allow, or Monitor. Each site category is shown on this slide.

Which two benefits are benefits of using multi-tenancy mode on FortiClient EMS? (Choose two.)

A.
The fabric connector must use an IP address to connect to FortiClient EMS
A.
The fabric connector must use an IP address to connect to FortiClient EMS
Answers
B.
It provides granular access and segmentation.
B.
It provides granular access and segmentation.
Answers
C.
Licenses are shared among sites.
C.
Licenses are shared among sites.
Answers
D.
Separate host servers manage each site.
D.
Separate host servers manage each site.
Answers
Suggested answer: B, C

Explanation:

Licenses are shared among sites: In multi-tenancy mode, licenses can be shared among the different tenant accounts or sites within FortiClient EMS. This means that a pool of licenses can be allocated and utilized across multiple sites or deployments as needed. It helps optimize license utilization and reduces the need for individual licenses for each site or customer.

It provides granular access and segmentation: Multi-tenancy mode allows for the creation of separate tenant accounts or groups within FortiClient EMS. Each tenant can have their own set of policies, configurations, and access rights, providing granular control and segmentation. This enables organizations to manage multiple sites or customer deployments separately within a single FortiClient EMS instance.

Which two statements are true about the ZTNA rule? (Choose two. )

A.
It enforces access control
A.
It enforces access control
Answers
B.
It redirects the client request to the access proxy
B.
It redirects the client request to the access proxy
Answers
C.
It defines the access proxy
C.
It defines the access proxy
Answers
D.
It applies security profiles to protect traffic
D.
It applies security profiles to protect traffic
Answers
Suggested answer: A, D

Explanation:

'A ZTNA rule is a proxy policy used to enforce access control. ZTNA tags or tag groups can be defined to enforce zero trust role based access. Security profiles can be configured to protect this traffic.'

'ZTNA rules help control access by defining users and ZTNA tags to perform user authentication and security posture checks. And just like firewall policies, you can control the source and destination addresses, and apply appropriate security profiles to scan the traffic.' https://docs.fortinet.com/document/fortigate/7.0.0/ztna-deployment/899992/configuring-ztna-rules-to-control-access

Total 49 questions
Go to page: of 5