ExamGecko
Home Home / Fortinet / NSE5_FCT-7.0

Fortinet NSE5_FCT-7.0 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Refer to the exhibit.

Based on the CLI output from FortiGate. which statement is true?

A.
FortiGate is configured to pull user groups from FortiClient EMS
A.
FortiGate is configured to pull user groups from FortiClient EMS
Answers
B.
FortiGate is configured with local user group
B.
FortiGate is configured with local user group
Answers
C.
FortiGate is configured to pull user groups from FortiAuthenticator
C.
FortiGate is configured to pull user groups from FortiAuthenticator
Answers
D.
FortiGate is configured to pull user groups from AD Server.
D.
FortiGate is configured to pull user groups from AD Server.
Answers
Suggested answer: A

Refer to the exhibit.

Based on the settings shown in the exhibit what action will FortiClient take when it detects that a user is trying to download an infected file?

A.
Blocks the infected files as it is downloading
A.
Blocks the infected files as it is downloading
Answers
B.
Quarantines the infected files and logs all access attempts
B.
Quarantines the infected files and logs all access attempts
Answers
C.
Sends the infected file to FortiGuard for analysis
C.
Sends the infected file to FortiGuard for analysis
Answers
D.
Allows the infected file to download without scan
D.
Allows the infected file to download without scan
Answers
Suggested answer: D

Explanation:

Block Malicious Website has nothing to do with infected files. Since Realtime Protection is OFF, it will be allowed without being scanned.

An administrator deploys a FortiClient installation through the Microsoft AD group policy After installation is complete all the custom configuration is missing.

What could have caused this problem?

A.
The FortiClient exe file is included in the distribution package
A.
The FortiClient exe file is included in the distribution package
Answers
B.
The FortiClient MST file is missing from the distribution package
B.
The FortiClient MST file is missing from the distribution package
Answers
C.
FortiClient does not have permission to access the distribution package.
C.
FortiClient does not have permission to access the distribution package.
Answers
D.
The FortiClient package is not assigned to the group
D.
The FortiClient package is not assigned to the group
Answers
Suggested answer: D

Refer to the exhibits.

Based on the FortiGate Security Fabric settings shown in the exhibits, what must an administrator do on the EMS server to successfully quarantine an endpoint. when it is detected as a compromised host (loC)?

A.
The administrator must enable remote HTTPS access to EMS.
A.
The administrator must enable remote HTTPS access to EMS.
Answers
B.
The administrator must enable FQDN on EMS.
B.
The administrator must enable FQDN on EMS.
Answers
C.
The administrator must authorize FortiGate on FortiAnalyzer.
C.
The administrator must authorize FortiGate on FortiAnalyzer.
Answers
D.
The administrator must enable SSH access to EMS.
D.
The administrator must enable SSH access to EMS.
Answers
Suggested answer: A

Which statement about FortiClient comprehensive endpoint protection is true?

A.
It helps to safeguard systems from email spam
A.
It helps to safeguard systems from email spam
Answers
B.
It helps to safeguard systems from data loss.
B.
It helps to safeguard systems from data loss.
Answers
C.
It helps to safeguard systems from DDoS.
C.
It helps to safeguard systems from DDoS.
Answers
D.
lt helps to safeguard systems from advanced security threats, such as malware.
D.
lt helps to safeguard systems from advanced security threats, such as malware.
Answers
Suggested answer: D

Explanation:

FortiClient provides comprehensive endpoint protection for your Windows-based, Mac-based, and Linuxbased desktops, laptops, file servers, and mobile devices such as iOS and Android. It helps you to safeguard your systems with advanced security technologies, all of which you can manage from a single management console.

Refer to the exhibit.

Based on the Security Fabric automation settings, what action will be taken on compromised endpoints?

A.
Endpoints will be quarantined through EMS
A.
Endpoints will be quarantined through EMS
Answers
B.
Endpoints will be banned on FortiGate
B.
Endpoints will be banned on FortiGate
Answers
C.
An email notification will be sent for compromised endpoints
C.
An email notification will be sent for compromised endpoints
Answers
D.
Endpoints will be quarantined through FortiSwitch
D.
Endpoints will be quarantined through FortiSwitch
Answers
Suggested answer: A

In a FortiSandbox integration, what does the remediation option do?

A.
Wait for FortiSandbox results before allowing files
A.
Wait for FortiSandbox results before allowing files
Answers
B.
Exclude specified files
B.
Exclude specified files
Answers
C.
Alert and notify only
C.
Alert and notify only
Answers
D.
Deny access to a file when it sees no results
D.
Deny access to a file when it sees no results
Answers
Suggested answer: C

Explanation:

Under 'Remediation Options' section, there are only two options (Quarantine infected files, Alert & Notify only). https://docs.fortinet.com/document/forticlient/6.0.0/administration-guide/657996/configuring-submission-access-and-remediation#:~:text=disable%20this%20feature.-,Remediation%20Options,-Quarantine%20infected%20files

Which two VPN types can a FortiClient endpoint user inmate from the Windows command prompt? (Choose two)

A.
L2TP
A.
L2TP
Answers
B.
PPTP
B.
PPTP
Answers
C.
IPSec
C.
IPSec
Answers
D.
SSL VPN
D.
SSL VPN
Answers
Suggested answer: C, D

Refer to the exhibit.

An administrator has restored the modified XML configuration file to FortiClient and sees the error shown in the exhibit.

Based on the XML settings shown in the exhibit, what must the administrator do to resolve the issue with the XML configuration file?

A.
The administrator must resolve the XML syntax error.
A.
The administrator must resolve the XML syntax error.
Answers
B.
The administrator must use a password to decrypt the file
B.
The administrator must use a password to decrypt the file
Answers
C.
The administrator must change the file size
C.
The administrator must change the file size
Answers
D.
The administrator must save the file as FortiClient-config conf.
D.
The administrator must save the file as FortiClient-config conf.
Answers
Suggested answer: A

Explanation:

missing </connections> at the bottom

An administrator is required to maintain a software inventory on the endpoints. without showing the feature on the FortiClient dashboard What must the administrator do to achieve this requirement?

A.
The administrator must use default endpoint profile
A.
The administrator must use default endpoint profile
Answers
B.
The administrator must not select the vulnerability scan feature in the deployment package.
B.
The administrator must not select the vulnerability scan feature in the deployment package.
Answers
C.
The administrator must select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile
C.
The administrator must select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile
Answers
D.
The administrator must click the hide icon on the vulnerability scan tab
D.
The administrator must click the hide icon on the vulnerability scan tab
Answers
Suggested answer: D
Total 49 questions
Go to page: of 5