Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers, Page 3
List of questions
Question 21

Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
A security event parser must be created for the device.
The device sending the messages must be modeled in the Network Inventory view.
The device must be added as a patch management server.
The device must be added as a log receiver.
To allow FortiNAC to process incoming syslog messages from an unknown vendor, two steps must be taken:
Creation of a customized event parser: This enables FortiNAC to parse and integrate syslog messages from any vendor or device, as long as the messages are in CSV, CEF, or Tag/Value format.
Modeling the device in the Topology view: Any device that sends syslog messages to FortiNAC must be modeled in this view. FortiNAC will not process syslog or trap messages unless the source address belongs to a device modeled in the topology.
Reference
FortiNAC 7.2 Study Guide, pages 428 and 399
Question 22

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
Agent technology
Portal page on-boarding options
MDM integration
Application layer traffic inspection
To gather a list of installed applications and application details from a host, two methods can be used:
Agent technology: FortiNAC uses agent technology to collect all installed applications on an endpoint.
Integration with MDMs (Mobile Device Management systems): MDMs that support application gathering can be integrated with FortiNAC to collect application information.
Reference
FortiNAC 7.2 Study Guide, page 302
Question 23

Which devices would be evaluated by device profiling rules?
Rogue devices, each time they connect
All hosts, each time they connect
Known trusted devices, each time they change location
Rogue devices, only when they are initially added to the database
Device profiling rules in FortiNAC are used to evaluate and classify rogue devices. These rules can be configured to automatically, manually, or through sponsorship evaluate and classify unknown untrusted devices as they are identified and created.
Reference
FortiNAC 7.2 Study Guide, page 98
Question 24

Which three are components of a security rule? (Choose three.)
Methods
Security String
Trigger
User or host profile
Action
Components of a security rule in FortiNAC include:
Trigger: The condition or event that initiates the evaluation of the rule.
User or Host Profile: A requirement that can be added to a rule to specify the user or host profile that must be matched.
Action: The activities or responses that FortiNAC performs when the rule is matched.
Reference
FortiNAC 7.2 Study Guide, page 419
Question 25

Refer to the exhibit.
If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?
The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.
The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM.
The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM.
The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.
Looking at the provided exhibit which shows the Modify User/Host Profile window, the following must be true for a host to match the user/host profile:
The host must be connected to a port within the 'Building 1 First Floor Ports' group.
The host must fulfill at least one of the following attributes:
Have a role value of 'Contractor'
Have an installed persistent agent with the security and access value of 'Contractor'
The host must be connected between the specified times of 6 AM and 5 PM on any day of the week.
The profile specifies that the host can match the profile by having any one of the listed attributes (Role as Contractor, Persistent Agent installed with specific security & access value), and the time condition must also be met. Therefore, the correct answer is D, which includes 'or' conditions for the role value and persistent agent and specifies the correct time frame.
Question 26

Refer to the exhibit.
Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?
The port will be provisioned for the normal state host, and both hosts will have access to that VLAN.
The port will not be managed, and an event will be generated.
The port will be provisioned to the registration network, and both hosts will be isolated.
The port will be administratively shut down.
The exhibit shows the status of two hosts connected to a wired infrastructure and indicates their respective MAC addresses and the rule name associated with them. When a port is a member of the Forced Registration port group, and multiple hosts with different statuses are connected to that port, FortiNAC will provision the port to the registration network, which is designed to isolate hosts until they are verified or registered. This ensures that unregistered or unauthorized hosts do not gain access to the network. Therefore, both hosts will be isolated in the registration network according to FortiNAC policy for such scenarios.
Question 27

Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?
The host is moved to VLAN 111.
The host is moved to a default isolation VLAN.
No VLAN change is performed.
The host is disabled.
The exhibit shows a configuration panel where VLAN IDs are specified for different states, such as Default, Registration, and Authentication. When forcing the registration of unknown (rogue) hosts, if an unknown host connects to a port on the switch, the FortiNAC system will move the host to the VLAN designated for Registration. In the exhibit, the VLAN ID for Registration is set to 111, hence the host would be moved to VLAN 111 to undergo the registration process.
Question 28

View the command and output shown in the exhibit.
What is the current state of this host?
Rogue
Registered
Not authenticated
At-Risk
The exhibit's command and output detail various attributes for a specific host, including the MAC address, connection status, and various other parameters. The status 'Connected' and state 'Initial' indicate that the host has been detected on the network but has not yet completed any authentication process. The lines 'Client Not Authenticated = true' and 'Client needs to authenticate = false' suggest that the host has not yet been authenticated. Therefore, the current state of the host is 'Not authenticated,' since there is a clear indication that the authentication process has not been completed for this host.
Question 29

View the command and output.
What is the state of database replication?
Secondary to primary synchronization failed.
Primary to secondary synchronization failed.
Secondary to primary synchronization was successful.
Primary to secondary database synchronization was successful.
The command and output shown in the exhibit indicate that the host FortiNAC-Secondary is referencing FortiNAC-Primary, and it states 'Slave is active.' In database replication terminology within a high availability setup, the term 'Slave is active' typically means that the secondary server (slave) is actively receiving data from the primary server (master). This implies that the synchronization process from the primary to the secondary database has been successful and is currently active.
Reference
FortiNAC 7.2 Study Guide, Security Policies section
Question 30

Refer to the exhibit.
What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?
Multiple enforcement groups could not contain the same port.
Only the higher ranked enforcement group would be applied.
Both types of enforcement would be applied.
Enforcement would be applied only to rogue hosts.
In systems like FortiNAC, when a port is designated to be in multiple enforcement groups, it is common for only the higher-priority or higher-ranked group's policies to be applied. This is to prevent conflicting enforcement actions from being attempted on the same port. Although the specific details of the priority or ranking system are not provided in the extracted references, the principle of hierarchical policy enforcement suggests that only the policies of the higher-ranked group would be applied to the port.
Reference
FortiNAC documentation would typically outline this behavior in sections discussing port group enforcement or policy application.
Question