Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers, Page 4
List of questions
Question 31

Which connecting endpoints are evaluated against all enabled device profiling rules?
All hosts, each time they connect
Rogues devices, only when they connect for the first time
Known trusted devices each time they change location
Rogues devices, each time they connect
FortiNAC process to classify rogue devices and create an organized inventory of known trusted registered devices.
Based on FortiNAC's approach to device profiling and rule evaluation, rogue devices are evaluated against enabled device profiling rules each time they connect. This consistent evaluation ensures that rogue devices are properly classified and handled according to the latest network policies each time they attempt to access the network.
Reference
FortiNAC documentation on device profiling and rule evaluation.
Question 32

Which agent is used only as part of a login script?
Mobile
Passive
Persistent
Dissolvable
In the context of network access control systems like FortiNAC, a dissolvable agent is typically a piece of software that is executed on the endpoint as part of a login script or when a user accesses a captive portal. It runs once to gather information or enforce policies and then removes itself from the system, hence the term 'dissolvable.'
Reference
FortiNAC documentation on agent deployment and types of agents.
Question 33

What agent is required in order to detect an added USB drive?
Persistent
Dissolvable
Mobile
Passive
Expand the Persistent Agent folder. Select USB Detection from the tree.
1. Click System > Settings.
2. Expand the Persistent Agent folder.
3. Select USB Detection from the tree.
4. Click Add or select an existing USB drive and click Modify.
Question 34

What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
Question 35

Where are logical network values defined?
Question 36

Which three of the following are components of a security rule? (Choose three.)
Question 37

In which view would you find who made modifications to a Group?
Question 38

Which two of the following are required for endpoint compliance monitors? (Choose two.)
Question 39

What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?
Question 40

Which command line shell and scripting language does FortiNAC use for WinRM?
Question