ExamGecko
Home / Fortinet / NSE6_FNC-7.2 / List of questions
Ask Question

Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

How are logical networks assigned to endpoints?

Through device profiling rules

Through device profiling rules

Through network access policies

Through network access policies

Through Layer 3 polling configurations

Through Layer 3 polling configurations

Through FortiGate IPv4 policies

Through FortiGate IPv4 policies

Suggested answer: A
Explanation:

Logical networks are assigned to endpoints through device profiling rules in FortiNAC. These networks appear in device Model Configuration views and are used for endpoint isolation based on the endpoint's state or status

asked 16/03/2025
antonio de simone
45 questions

Question 12

Report Export Collapse

By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?

The port becomes a threshold uplink

The port becomes a threshold uplink

The port is disabled

The port is disabled

The port is added to the Forced Registration group

The port is added to the Forced Registration group

The port is switched into the Dead-End VLAN

The port is switched into the Dead-End VLAN

Suggested answer: A
Explanation:

If more than 20 endpoints are seen connected on a single switch port simultaneously after a successful Layer 2 poll, the port is designated as an uplink. FortiNAC will ignore all physical addresses learned on an uplink port and will not perform any control operations on it

asked 16/03/2025
Fednol Presume
39 questions

Question 13

Report Export Collapse

An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?

A security trigger activity

A security trigger activity

A security filter

A security filter

An event to alarm mapping

An event to alarm mapping

An event to action mapping

An event to action mapping

Suggested answer: C
Explanation:

To generate an alarm from a Host At Risk event, an administrative user must create an Event to Alarm Mapping for the Vulnerability Scan Failed event. Within this alarm mapping, a host security action must be designated to mark the host at risk

asked 16/03/2025
Jessica Martinada
40 questions

Question 14

Report Export Collapse

Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)

CLI

CLI

SMTP

SMTP

SNMP

SNMP

FTP

FTP

RADIUS

RADIUS

Suggested answer: A, C, E
Explanation:

FortiNAC Study Guide 7.2 | Page 11

FortiNAC uses various methods to communicate with infrastructure devices such as SNMP for discovery and ongoing management, SSH or Telnet through the CLI for tasks related to the infrastructure, and RADIUS for handling specific types of requests

asked 16/03/2025
Gary Cox
47 questions

Question 15

Report Export Collapse

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

To deny access to only the production DNS server

To deny access to only the production DNS server

To allow access to only the FortiNAC VPN interface

To allow access to only the FortiNAC VPN interface

To allow access to only the production DNS server

To allow access to only the production DNS server

To deny access to only the FortiNAC VPN interface

To deny access to only the FortiNAC VPN interface

Suggested answer: B
asked 16/03/2025
Juy Juy
49 questions

Question 16

Report Export Collapse

Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

Authentication

Authentication

Network Access

Network Access

Endpoint Compliance

Endpoint Compliance

Supplicant EasvConnect

Supplicant EasvConnect

Suggested answer: A, B
Explanation:

Network Access policies as a common type of policy in FortiNAC, used to dynamically provision access to connecting endpoints. While Authentication is typically a policy type in network access control systems like FortiNAC

asked 16/03/2025
abdirashid ahmed
38 questions

Question 17

Report Export Collapse

During the on-boarding process through the captive portal, what are two reasons why a host that successfully registered would remain stuck in the Registration VLAN? (Choose two.)

The wrong agent is installed.

The wrong agent is installed.

The port default VLAN is the same as the Registration VLAN.

The port default VLAN is the same as the Registration VLAN.

Bridging is enabled on the host.

Bridging is enabled on the host.

There is another unregistered host on the same port.

There is another unregistered host on the same port.

Suggested answer: B, D
asked 16/03/2025
Abdulraheem alsaka
38 questions

Question 18

Report Export Collapse

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

To confirm installed security software

To confirm installed security software

To validate the VPN user credentials

To validate the VPN user credentials

To designate the required agent type

To designate the required agent type

To validate the VPN client being used

To validate the VPN client being used

Suggested answer: A
asked 16/03/2025
Jari Tetteroo
47 questions

Question 19

Report Export Collapse

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

SNMP traps

SNMP traps

RADIUS

RADIUS

Endstation traffic monitoring

Endstation traffic monitoring

Link traps

Link traps

Suggested answer: B
Explanation:

In a wireless integration, FortiNAC uses RADIUS to obtain connecting MAC address information. This includes RADIUS requests to FortiNAC and subsequent RADIUS responses from FortiNAC to the requesting device

asked 16/03/2025
Rajiv Ranjan
57 questions

Question 20

Report Export Collapse

Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)

Dissolvable

Dissolvable

Mobile

Mobile

Passive

Passive

Persistent

Persistent

Suggested answer: A, D
Explanation:

Both dissolvable and persistent agents can be used to validate endpoint compliance transparently to the end user. The persistent agent stays resident on the endpoint and performs scheduled scans in the background. The dissolvable agent is a run-once agent that dissolves after reporting its results, leaving no footprint on the endpoint

asked 16/03/2025
Michael Whitehouse
56 questions
Total 57 questions
Go to page: of 6