Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers, Page 2
List of questions
Related questions
An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?
Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)
Which three are components of a security rule? (Choose three.)
Refer to the exhibit.
If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?
Refer to the exhibit.
Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?
During the on-boarding process through the captive portal, what are two reasons why a host that successfully registered would remain stuck in the Registration VLAN? (Choose two.)
When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?
In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
Question