ExamGecko
Home / Fortinet / NSE6_FNC-7.2 / List of questions
Ask Question

Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of 'at risk'?

The host is provisioned based on the default access defined by the point of connection.
The host is provisioned based on the default access defined by the point of connection.
The host is provisioned based on the network access policy.
The host is provisioned based on the network access policy.
The host is isolated.
The host is isolated.
The host is administratively disabled.
The host is administratively disabled.
Suggested answer: C
Explanation:

https://training.fortinet.com/pluginfile.php/1912463/mod_resource/content/26/FortiNAC_7.2_Study_Guide-Online.pdf C. Page 327 - moved to the quarantine isolation network

asked 18/09/2024
Robert Fox
50 questions

Question 2

Report Export Collapse

View the command and output.

Fortinet NSE6_FNC-7.2 image Question 2 26731 09182024190547000000

What is the state of database replication?

Secondary to primary synchronization failed.
Secondary to primary synchronization failed.
Primary to secondary synchronization failed.
Primary to secondary synchronization failed.
Secondary to primary synchronization was successful.
Secondary to primary synchronization was successful.
Primary to secondary database synchronization was successful.
Primary to secondary database synchronization was successful.
Suggested answer: D
asked 18/09/2024
J.J. van Ingen
41 questions

Question 3

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FNC-7.2 image Question 3 26732 09182024190547000000

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

Multiple enforcement groups could not contain the same port.
Multiple enforcement groups could not contain the same port.
Only the higher ranked enforcement group would be applied.
Only the higher ranked enforcement group would be applied.
Both types of enforcement would be applied.
Both types of enforcement would be applied.
Enforcement would be applied only to rogue hosts.
Enforcement would be applied only to rogue hosts.
Suggested answer: C
asked 18/09/2024
MARTIN WEAVER
35 questions

Question 4

Report Export Collapse

Which connecting endpoints are evaluated against all enabled device profiling rules?

All hosts, each time they connect
All hosts, each time they connect
Rogues devices, only when they connect for the first time
Rogues devices, only when they connect for the first time
Known trusted devices each time they change location
Known trusted devices each time they change location
Rogues devices, each time they connect
Rogues devices, each time they connect
Suggested answer: D
Explanation:

FortiNAC process to classify rogue devices and create an organized inventory of known trusted registered devices.

asked 18/09/2024
Aung Zin
41 questions

Question 5

Report Export Collapse

Which agent is used only as part of a login script?

Mobile
Mobile
Passive
Passive
Persistent
Persistent
Dissolvable
Dissolvable
Suggested answer: B
Explanation:

If the logon script runs the logon application in persistent mode, configure your Active Directory server not to run scripts synchronously.

asked 18/09/2024
test testsers
39 questions

Question 6

Report Export Collapse

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

To deny access to only the production DNS server
To deny access to only the production DNS server
To allow access to only the FortiNAC VPN interface
To allow access to only the FortiNAC VPN interface
To allow access to only the production DNS server
To allow access to only the production DNS server
To deny access to only the FortiNAC VPN interface
To deny access to only the FortiNAC VPN interface
Suggested answer: B
asked 18/09/2024
ENET SOLUTIONS LOGICOM
35 questions

Question 7

Report Export Collapse

Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

Authentication
Authentication
Network Access
Network Access
Endpoint Compliance
Endpoint Compliance
Supplicant EasvConnect
Supplicant EasvConnect
Suggested answer: B, C
asked 18/09/2024
Juliana Correa Zapat
26 questions

Question 8

Report Export Collapse

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

Physical Address Filtering
Physical Address Filtering
Forced Quarantine
Forced Quarantine
Forced Isolation
Forced Isolation
Forced Remediation
Forced Remediation
Suggested answer: B
Explanation:

Forced Quarantine, study guide 7.2 pag 245 and 248

asked 18/09/2024
Ackim Sanuka
28 questions

Question 9

Report Export Collapse

How are logical networks assigned to endpoints?

Through device profiling rules
Through device profiling rules
Through network access policies
Through network access policies
Through Layer 3 polling configurations
Through Layer 3 polling configurations
Through FortiGate IPv4 policies
Through FortiGate IPv4 policies
Suggested answer: B
asked 18/09/2024
Kristian Gutierrez
47 questions

Question 10

Report Export Collapse

By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?

The port becomes a threshold uplink
The port becomes a threshold uplink
The port is disabled
The port is disabled
The port is added to the Forced Registration group
The port is added to the Forced Registration group
The port is switched into the Dead-End VLAN
The port is switched into the Dead-End VLAN
Suggested answer: A
asked 18/09/2024
CCF AG Alexander Seidler
35 questions
Total 47 questions
Go to page: of 5