ExamGecko
Home Home / Fortinet / NSE6_FNC-7.2

Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers

Question list
Search
Search

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of 'at risk'?

A.
The host is provisioned based on the default access defined by the point of connection.
A.
The host is provisioned based on the default access defined by the point of connection.
Answers
B.
The host is provisioned based on the network access policy.
B.
The host is provisioned based on the network access policy.
Answers
C.
The host is isolated.
C.
The host is isolated.
Answers
D.
The host is administratively disabled.
D.
The host is administratively disabled.
Answers
Suggested answer: C

Explanation:

https://training.fortinet.com/pluginfile.php/1912463/mod_resource/content/26/FortiNAC_7.2_Study_Guide-Online.pdf C. Page 327 - moved to the quarantine isolation network

View the command and output.

What is the state of database replication?

A.
Secondary to primary synchronization failed.
A.
Secondary to primary synchronization failed.
Answers
B.
Primary to secondary synchronization failed.
B.
Primary to secondary synchronization failed.
Answers
C.
Secondary to primary synchronization was successful.
C.
Secondary to primary synchronization was successful.
Answers
D.
Primary to secondary database synchronization was successful.
D.
Primary to secondary database synchronization was successful.
Answers
Suggested answer: D

Refer to the exhibit.

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

A.
Multiple enforcement groups could not contain the same port.
A.
Multiple enforcement groups could not contain the same port.
Answers
B.
Only the higher ranked enforcement group would be applied.
B.
Only the higher ranked enforcement group would be applied.
Answers
C.
Both types of enforcement would be applied.
C.
Both types of enforcement would be applied.
Answers
D.
Enforcement would be applied only to rogue hosts.
D.
Enforcement would be applied only to rogue hosts.
Answers
Suggested answer: C

Which connecting endpoints are evaluated against all enabled device profiling rules?

A.
All hosts, each time they connect
A.
All hosts, each time they connect
Answers
B.
Rogues devices, only when they connect for the first time
B.
Rogues devices, only when they connect for the first time
Answers
C.
Known trusted devices each time they change location
C.
Known trusted devices each time they change location
Answers
D.
Rogues devices, each time they connect
D.
Rogues devices, each time they connect
Answers
Suggested answer: D

Explanation:

FortiNAC process to classify rogue devices and create an organized inventory of known trusted registered devices.

Which agent is used only as part of a login script?

A.
Mobile
A.
Mobile
Answers
B.
Passive
B.
Passive
Answers
C.
Persistent
C.
Persistent
Answers
D.
Dissolvable
D.
Dissolvable
Answers
Suggested answer: B

Explanation:

If the logon script runs the logon application in persistent mode, configure your Active Directory server not to run scripts synchronously.

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

A.
To deny access to only the production DNS server
A.
To deny access to only the production DNS server
Answers
B.
To allow access to only the FortiNAC VPN interface
B.
To allow access to only the FortiNAC VPN interface
Answers
C.
To allow access to only the production DNS server
C.
To allow access to only the production DNS server
Answers
D.
To deny access to only the FortiNAC VPN interface
D.
To deny access to only the FortiNAC VPN interface
Answers
Suggested answer: B

Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

A.
Authentication
A.
Authentication
Answers
B.
Network Access
B.
Network Access
Answers
C.
Endpoint Compliance
C.
Endpoint Compliance
Answers
D.
Supplicant EasvConnect
D.
Supplicant EasvConnect
Answers
Suggested answer: B, C

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

A.
Physical Address Filtering
A.
Physical Address Filtering
Answers
B.
Forced Quarantine
B.
Forced Quarantine
Answers
C.
Forced Isolation
C.
Forced Isolation
Answers
D.
Forced Remediation
D.
Forced Remediation
Answers
Suggested answer: B

Explanation:

Forced Quarantine, study guide 7.2 pag 245 and 248

How are logical networks assigned to endpoints?

A.
Through device profiling rules
A.
Through device profiling rules
Answers
B.
Through network access policies
B.
Through network access policies
Answers
C.
Through Layer 3 polling configurations
C.
Through Layer 3 polling configurations
Answers
D.
Through FortiGate IPv4 policies
D.
Through FortiGate IPv4 policies
Answers
Suggested answer: B

By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?

A.
The port becomes a threshold uplink
A.
The port becomes a threshold uplink
Answers
B.
The port is disabled
B.
The port is disabled
Answers
C.
The port is added to the Forced Registration group
C.
The port is added to the Forced Registration group
Answers
D.
The port is switched into the Dead-End VLAN
D.
The port is switched into the Dead-End VLAN
Answers
Suggested answer: A
Total 47 questions
Go to page: of 5