ExamGecko
Home / Fortinet / NSE6_FNC-7.2 / List of questions
Ask Question

Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)

A security event parser must be created for the device.

A security event parser must be created for the device.

The device sending the messages must be modeled in the Network Inventory view.

The device sending the messages must be modeled in the Network Inventory view.

The device must be added as a patch management server.

The device must be added as a patch management server.

The device must be added as a log receiver.

The device must be added as a log receiver.

Suggested answer: A, B
Explanation:

To allow FortiNAC to process incoming syslog messages from an unknown vendor, two steps must be taken:

Creation of a customized event parser: This enables FortiNAC to parse and integrate syslog messages from any vendor or device, as long as the messages are in CSV, CEF, or Tag/Value format.

Modeling the device in the Topology view: Any device that sends syslog messages to FortiNAC must be modeled in this view. FortiNAC will not process syslog or trap messages unless the source address belongs to a device modeled in the topology.

Reference

FortiNAC 7.2 Study Guide, pages 428 and 399

asked 16/03/2025
asdf asdf
43 questions

Question 22

Report Export Collapse

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

Agent technology

Agent technology

Portal page on-boarding options

Portal page on-boarding options

MDM integration

MDM integration

Application layer traffic inspection

Application layer traffic inspection

Suggested answer: A, C
Explanation:

To gather a list of installed applications and application details from a host, two methods can be used:

Agent technology: FortiNAC uses agent technology to collect all installed applications on an endpoint.

Integration with MDMs (Mobile Device Management systems): MDMs that support application gathering can be integrated with FortiNAC to collect application information.

Reference

FortiNAC 7.2 Study Guide, page 302

asked 16/03/2025
shridhar deshpande
42 questions

Question 23

Report Export Collapse

Which devices would be evaluated by device profiling rules?

Rogue devices, each time they connect

Rogue devices, each time they connect

All hosts, each time they connect

All hosts, each time they connect

Known trusted devices, each time they change location

Known trusted devices, each time they change location

Rogue devices, only when they are initially added to the database

Rogue devices, only when they are initially added to the database

Suggested answer: B
Explanation:

Device profiling rules in FortiNAC are used to evaluate and classify rogue devices. These rules can be configured to automatically, manually, or through sponsorship evaluate and classify unknown untrusted devices as they are identified and created.

Reference

FortiNAC 7.2 Study Guide, page 98

asked 16/03/2025
Shrini Ch
37 questions

Question 24

Report Export Collapse

Which three are components of a security rule? (Choose three.)

Methods

Methods

Security String

Security String

Trigger

Trigger

User or host profile

User or host profile

Action

Action

Suggested answer: C, D, E
Explanation:

Components of a security rule in FortiNAC include:

Trigger: The condition or event that initiates the evaluation of the rule.

User or Host Profile: A requirement that can be added to a rule to specify the user or host profile that must be matched.

Action: The activities or responses that FortiNAC performs when the rule is matched.

Reference

FortiNAC 7.2 Study Guide, page 419

asked 16/03/2025
john lopez
34 questions

Question 25

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FNC-7.2 image Question 25 63877746187879926049462

If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?

The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM.

The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM.

The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM.

The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM.

The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

Suggested answer: D
Explanation:

Looking at the provided exhibit which shows the Modify User/Host Profile window, the following must be true for a host to match the user/host profile:

The host must be connected to a port within the 'Building 1 First Floor Ports' group.

The host must fulfill at least one of the following attributes:

Have a role value of 'Contractor'

Have an installed persistent agent with the security and access value of 'Contractor'

The host must be connected between the specified times of 6 AM and 5 PM on any day of the week.

The profile specifies that the host can match the profile by having any one of the listed attributes (Role as Contractor, Persistent Agent installed with specific security & access value), and the time condition must also be met. Therefore, the correct answer is D, which includes 'or' conditions for the role value and persistent agent and specifies the correct time frame.

asked 16/03/2025
Peter Lilley
58 questions

Question 26

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FNC-7.2 image Question 26 63877746187895550513582

Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?

The port will be provisioned for the normal state host, and both hosts will have access to that VLAN.

The port will be provisioned for the normal state host, and both hosts will have access to that VLAN.

The port will not be managed, and an event will be generated.

The port will not be managed, and an event will be generated.

The port will be provisioned to the registration network, and both hosts will be isolated.

The port will be provisioned to the registration network, and both hosts will be isolated.

The port will be administratively shut down.

The port will be administratively shut down.

Suggested answer: C
Explanation:

The exhibit shows the status of two hosts connected to a wired infrastructure and indicates their respective MAC addresses and the rule name associated with them. When a port is a member of the Forced Registration port group, and multiple hosts with different statuses are connected to that port, FortiNAC will provision the port to the registration network, which is designed to isolate hosts until they are verified or registered. This ensures that unregistered or unauthorized hosts do not gain access to the network. Therefore, both hosts will be isolated in the registration network according to FortiNAC policy for such scenarios.

asked 16/03/2025
SAI CHARAN TANGELLA
40 questions

Question 27

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FNC-7.2 image Question 27 63877746187926799894063

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

The host is moved to VLAN 111.

The host is moved to VLAN 111.

The host is moved to a default isolation VLAN.

The host is moved to a default isolation VLAN.

No VLAN change is performed.

No VLAN change is performed.

The host is disabled.

The host is disabled.

Suggested answer: A
Explanation:

The exhibit shows a configuration panel where VLAN IDs are specified for different states, such as Default, Registration, and Authentication. When forcing the registration of unknown (rogue) hosts, if an unknown host connects to a port on the switch, the FortiNAC system will move the host to the VLAN designated for Registration. In the exhibit, the VLAN ID for Registration is set to 111, hence the host would be moved to VLAN 111 to undergo the registration process.

asked 16/03/2025
Kong Yew Kuen
45 questions

Question 28

Report Export Collapse

View the command and output shown in the exhibit.

Fortinet NSE6_FNC-7.2 image Question 28 63877746187973673538664

What is the current state of this host?

Rogue

Rogue

Registered

Registered

Not authenticated

Not authenticated

At-Risk

At-Risk

Suggested answer: A
Explanation:

The exhibit's command and output detail various attributes for a specific host, including the MAC address, connection status, and various other parameters. The status 'Connected' and state 'Initial' indicate that the host has been detected on the network but has not yet completed any authentication process. The lines 'Client Not Authenticated = true' and 'Client needs to authenticate = false' suggest that the host has not yet been authenticated. Therefore, the current state of the host is 'Not authenticated,' since there is a clear indication that the authentication process has not been completed for this host.

asked 16/03/2025
Ana Santos
49 questions

Question 29

Report Export Collapse

View the command and output.

Fortinet NSE6_FNC-7.2 image Question 29 63877746187973673538664

What is the state of database replication?

Secondary to primary synchronization failed.

Secondary to primary synchronization failed.

Primary to secondary synchronization failed.

Primary to secondary synchronization failed.

Secondary to primary synchronization was successful.

Secondary to primary synchronization was successful.

Primary to secondary database synchronization was successful.

Primary to secondary database synchronization was successful.

Suggested answer: D
Explanation:

The command and output shown in the exhibit indicate that the host FortiNAC-Secondary is referencing FortiNAC-Primary, and it states 'Slave is active.' In database replication terminology within a high availability setup, the term 'Slave is active' typically means that the secondary server (slave) is actively receiving data from the primary server (master). This implies that the synchronization process from the primary to the secondary database has been successful and is currently active.

Reference

FortiNAC 7.2 Study Guide, Security Policies section

asked 16/03/2025
Sweet Don
42 questions

Question 30

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FNC-7.2 image Question 30 63877746188114294872467

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

Multiple enforcement groups could not contain the same port.

Multiple enforcement groups could not contain the same port.

Only the higher ranked enforcement group would be applied.

Only the higher ranked enforcement group would be applied.

Both types of enforcement would be applied.

Both types of enforcement would be applied.

Enforcement would be applied only to rogue hosts.

Enforcement would be applied only to rogue hosts.

Suggested answer: B
Explanation:

In systems like FortiNAC, when a port is designated to be in multiple enforcement groups, it is common for only the higher-priority or higher-ranked group's policies to be applied. This is to prevent conflicting enforcement actions from being attempted on the same port. Although the specific details of the priority or ranking system are not provided in the extracted references, the principle of hierarchical policy enforcement suggests that only the policies of the higher-ranked group would be applied to the port.

Reference

FortiNAC documentation would typically outline this behavior in sections discussing port group enforcement or policy application.

asked 16/03/2025
Haythem KEfi
38 questions
Total 57 questions
Go to page: of 6