ExamGecko
Home Home / Fortinet / NSE6_FNC-7.2

Fortinet NSE6_FNC-7.2 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Which group type can have members added directly from the FortiNAC Control Manager?

A.
Administrator
A.
Administrator
Answers
B.
Device
B.
Device
Answers
C.
Port
C.
Port
Answers
D.
Host
D.
Host
Answers
Suggested answer: A

Where are logical network values defined?

A.
In the model configuration view of each infrastructure device
A.
In the model configuration view of each infrastructure device
Answers
B.
In the port properties view of each port
B.
In the port properties view of each port
Answers
C.
On the profiled devices view
C.
On the profiled devices view
Answers
D.
In the security and access field of each host record
D.
In the security and access field of each host record
Answers
Suggested answer: A

Which three of the following are components of a security rule? (Choose three.)

A.
Security String
A.
Security String
Answers
B.
Methods
B.
Methods
Answers
C.
Action
C.
Action
Answers
D.
User or host profile
D.
User or host profile
Answers
E.
Trigger
E.
Trigger
Answers
Suggested answer: C, D, E

What agent is required in order to detect an added USB drive?

A.
Persistent
A.
Persistent
Answers
B.
Dissolvable
B.
Dissolvable
Answers
C.
Mobile
C.
Mobile
Answers
D.
Passive
D.
Passive
Answers
Suggested answer: A

Explanation:

Expand the Persistent Agent folder. Select USB Detection from the tree.

1. Click System > Settings.

2. Expand the Persistent Agent folder.

3. Select USB Detection from the tree.

4. Click Add or select an existing USB drive and click Modify.

In which view would you find who made modifications to a Group?

A.
The Event Management view
A.
The Event Management view
Answers
B.
The Security Events view
B.
The Security Events view
Answers
C.
The Alarms view
C.
The Alarms view
Answers
D.
The Admin Auditing view
D.
The Admin Auditing view
Answers
Suggested answer: D

Explanation:

It's important to audit Group Policy changes in order to determine the details of changes made to Group Policies by delegated users.

Which two of the following are required for endpoint compliance monitors? (Choose two.)

A.
Persistent agent
A.
Persistent agent
Answers
B.
Logged on user
B.
Logged on user
Answers
C.
Security rule
C.
Security rule
Answers
D.
Custom scan
D.
Custom scan
Answers
Suggested answer: A, D

Explanation:

DirectDefense's analysis of FireEye Endpoint attests that the products help meet the HIPAA Security Rule.

In the menu on the left click the + sign next to Endpoint Compliance to open it.

https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/92047/add-or-modify-a-scan

What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?

A.
Only rogue hosts would be impacted.
A.
Only rogue hosts would be impacted.
Answers
B.
Both enforcement groups cannot contain the same port.
B.
Both enforcement groups cannot contain the same port.
Answers
C.
Only al-risk hosts would be impacted.
C.
Only al-risk hosts would be impacted.
Answers
D.
Both types of enforcement would be applied.
D.
Both types of enforcement would be applied.
Answers
Suggested answer: B

Which command line shell and scripting language does FortiNAC use for WinRM?

A.
Linux
A.
Linux
Answers
B.
Bash
B.
Bash
Answers
C.
DOS
C.
DOS
Answers
D.
Powershell
D.
Powershell
Answers
Suggested answer: D

Explanation:

Open Windows PowerShell or a command prompt. Run the following command to determine if you already have WinRM over HTTPS configured.

Admin Guide on p. 362, 'Matches if the device successfully responds to a WinRM client session request. User name and password credentials are required. If there are multiple credentials, each set of credentials will be attempted to find a potential match. The commands are used to automate interaction with the device. Each command is run via Powershell.'

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

A.
Manual polling
A.
Manual polling
Answers
B.
Scheduled poll timings
B.
Scheduled poll timings
Answers
C.
A failed Layer 3 poll
C.
A failed Layer 3 poll
Answers
D.
A matched security policy
D.
A matched security policy
Answers
E.
Linkup and Linkdown traps
E.
Linkup and Linkdown traps
Answers
Suggested answer: A, B, E

When you create a user or host profile; which three criteria can you use? (Choose three.)

A.
An applied access policy
A.
An applied access policy
Answers
B.
Administrative group membership
B.
Administrative group membership
Answers
C.
Location
C.
Location
Answers
D.
Host or user group memberships
D.
Host or user group memberships
Answers
E.
Host or user attributes
E.
Host or user attributes
Answers
Suggested answer: C, D, E

Explanation:

Fortinac-admin-operations, P. 391

Total 47 questions
Go to page: of 5