ExamGecko
Home / Fortinet / NSE6_FNC-7.2 / List of questions
Ask Question

Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Where should you configure MAC notification traps on a supported switch?

Configure them only after you configure linkup and linkdown traps.

Configure them only after you configure linkup and linkdown traps.

Configure them on all ports on the switch.

Configure them on all ports on the switch.

Configure them only on ports set as 802 1g trunks.

Configure them only on ports set as 802 1g trunks.

Configure them on all ports except uplink ports.

Configure them on all ports except uplink ports.

Suggested answer: C
Explanation:

In general, for network switches supporting MAC notification traps, it's advisable to configure these traps on all ports except uplink ports. Uplink ports are used for connecting to other switches or network infrastructure devices and typically don't need MAC notification traps, which are more relevant for end-device connectivity monitoring.

The study guide specifies that MAC notification traps should not be configured on interfaces that are uplinks. They are the preferred method for learning and updating Layer 2 information and should be used whenever available, but not on uplink interfaces.

asked 16/03/2025
Haithem Hadef
37 questions

Question 2

Report Export Collapse

Where do you look to determine which network access policy, if any is being applied to a particular host?

The Policy Details view for the host

The Policy Details view for the host

The Connections view

The Connections view

The Port Properties view of the hosts port

The Port Properties view of the hosts port

The Policy Logs view

The Policy Logs view

Suggested answer: A
Explanation:

To determine which network access policy is applied to a particular host, you should look at the Policy Details window. This window provides information about the types of policies applied (such as Network Access, Authentication, Supplicant, etc.), including the profile name, policy name, configuration name, and any settings that make up the configuration.

FortiNAC p 382: 'Under Network Access Settings - Policy Name - Name of the Network Access Policy that currently applies to the host.'

asked 16/03/2025
Kostiantyn Lazurenko
52 questions

Question 3

Report Export Collapse

While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.

Where would the administrator look to determine when and why FortiNAC made the network access change?

The Event view

The Event view

The Admin Auditing view

The Admin Auditing view

The Port Changes view

The Port Changes view

The Connections view

The Connections view

Suggested answer: C
asked 16/03/2025
Michael Costello
42 questions

Question 4

Report Export Collapse

Which agent can receive and display messages from FortiNAC to the end user?

Dissolvable

Dissolvable

Persistent

Persistent

Passive

Passive

MDM

MDM

Suggested answer: B
Explanation:

The persistent agent has the ability to display messages on the desktop of an endpoint. These messages can target an individual host, a group of hosts, or all hosts with the persistent agent installed. The messaging options include sending a message content with an optional web address link

asked 16/03/2025
Minoel Prendi
36 questions

Question 5

Report Export Collapse

When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?

Security rule

Security rule

Device profiling rule

Device profiling rule

RADIUS group attribute

RADIUS group attribute

Logical network

Logical network

Suggested answer: B
asked 16/03/2025
Roberto Garavaglia
50 questions

Question 6

Report Export Collapse

What capability do logical networks provide?

Point of access-base autopopulation of device groups'

Point of access-base autopopulation of device groups'

Interactive topology view diagrams

Interactive topology view diagrams

Application of different access values from a single access policy

Application of different access values from a single access policy

IVLAN -based inventory reporting

IVLAN -based inventory reporting

Suggested answer: C
Explanation:

Logical Networks allow you to create fewer Network Access Policies than before. (FortiNAC - What's new in FortiNAC 7.2)

Logical networks in FortiNAC decouple a policy from a specific access value, allowing for the application of different access values from a single access policy. This is done based on the point of connection, significantly reducing the number of network access policies needed and simplifying network access policy management

asked 16/03/2025
Charles Marlin
46 questions

Question 7

Report Export Collapse

Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)

Dissolvable agent

Dissolvable agent

DotlxAuto Registration

DotlxAuto Registration

Device importing

Device importing

MDM integration

MDM integration

Captive portal

Captive portal

Suggested answer: B, D
Explanation:

The FortiNAC 7.2 Study Guide does not explicitly mention Dot1x Auto Registration and MDM integration as the specific device classification options for automatic and transparent registration to the end user. However, based on the general functioning of FortiNAC, Dot1x Auto Registration and MDM integration are typically used for such purposes. The guide discusses automatic device registration in the context of profiling rules

asked 16/03/2025
Kurt Onal
36 questions

Question 8

Report Export Collapse

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

NTP

NTP

DHCP

DHCP

Web

Web

DNS

DNS

ISMTP

ISMTP

Suggested answer: B, C, D
Explanation:

In an isolation VLAN, FortiNAC supplies DHCP and DNS services. The guide specifies that FortiNAC has a DHCP scope defined for a particular VLAN and should be the only DHCP server available to hosts on that VLAN. Additionally, hosts on the VLAN would get a DNS server configuration of the FortiNAC IP for that VLAN

asked 16/03/2025
Julius Nammeh
35 questions

Question 9

Report Export Collapse

Which group type can have members added directly from the FortiNAC Control Manager?

Administrator

Administrator

Device

Device

Port

Port

Host

Host

Suggested answer: B
Explanation:

The study guide explains that there are six different types of groups in FortiNAC, including device, host, IP phone, port, user, and administrator groups. Groups created by administrative users or imported as a result of an LDAP integration can be used to organize elements but do not enforce any type of control or functionality directly

asked 16/03/2025
Miguel Triebel
43 questions

Question 10

Report Export Collapse

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

Physical Address Filtering

Physical Address Filtering

Forced Quarantine

Forced Quarantine

Forced Isolation

Forced Isolation

Forced Remediation

Forced Remediation

Suggested answer: D
Explanation:

Forced Quarantine, study guide 7.2 pag 245 and 248

asked 16/03/2025
mark anthony sampayan
39 questions
Total 57 questions
Go to page: of 6