Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCP_FCT_AD-7.2 Questions and Answers

Question # 6

Exhibit.

Refer to the exhibits, which show the Zero Trust Tag Monitor and the FortiClient GUI status.

Remote-Client is tagged as Remote-User* on the FortiClient EMS Zero Trust Tag Monitor.

What must an administrator do to show the tag on the FortiClient GUI?

A.

Change the FortiClient EMS shared settings to enable tag visibility.

B.

Change the endpoint alerts configuration to enable tag visibility.

C.

Update tagging rule logic to enable tag visibility.

D.

Change the FortiClient system settings to enable lag visibility.

Full Access
Question # 7

Refer to the exhibit.

Based on the FortiClient logs shown in the exhibit which application is blocked by the application firewall?

A.

Twitter

B.

Facebook

C.

Internet Explorer

D.

Firefox

Full Access
Question # 8

In a ForliSandbox integration, what does the remediation option do?

A.

Deny access to a tile when it sees no results

B.

Alert and notify only

C.

Exclude specified files

D.

Wait for FortiSandbox results before allowing files

Full Access
Question # 9

An administrator deploys a FortiClient installation through the Microsoft AD group policy After installation is complete all the custom configuration is missing.

What could have caused this problem?

A.

The FortiClient exe file is included in the distribution package

B.

The FortiClient MST file is missing from the distribution package

C.

FortiClient does not have permission to access the distribution package.

D.

The FortiClient package is not assigned to the group

Full Access
Question # 10

What is the function of the quick scan option on FortiClient?

A.

It scans programs and drivers that are currently running, for threats

B.

It performs a full system scan including all files, executable files. DLLs, and drivers for throats.

C.

It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.

D.

It scans executable files. DLLs, and drivers that are currently running, for threats.

Full Access
Question # 11

Which security fabric component sends a notification io quarantine an endpoint after IOC detection "n the automation process?

A.

FortiAnalyzer

B.

FortiGate

C.

FortiClient EMS

D.

FortiClient

Full Access
Question # 12

An administrator installs FortiClient EMS in the enterprise.

Which component is responsible for enforcing protection and checking security posture?

A.

FortiClient EMS tags

B.

FortiClient vulnerability scan

C.

FortiClient

D.

FortiClient EMS

Full Access
Question # 13

An administrator is required to maintain a software vulnerability on the endpoints, without showing the feature on the FortiClient. What must the administrator do to achieve this requirement?

A.

Select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile

B.

Disable select the vulnerability scan feature in the deployment package

C.

Click the hide icon on the vulnerability scan profile assigned to endpoint

D.

Use the default endpoint profile

Full Access
Question # 14

Refer to the exhibits.

Which shows the configuration of endpoint policies.

Based on the configuration, what will happen when someone logs in with the user account student on an endpoint in the trainingAD domain?

A.

FortiClient EMS will assign the Sales policy

B.

B. FortiClient EMS will assign the Training policy

C.

FortiClient EMS will assign the Default policy

D.

FortiClient EMS will assign the Training policy for on-fabric endpoints and the Sales policy for the off-fabric endpoint

Full Access
Question # 15

Refer to the exhibit.

Based on the FortiClient tog details shown in the exhibit, which two statements ace true? (Choose two.)

A.

The filename Is Unconfirmed 899290.crdovnload.

B.

The file status is Quarantined

C.

The filename is sent to FortiSandbox for further inspection.

D.

The file location is \??\D:\Users\.

Full Access
Question # 16

Which statement about FortiClient comprehensive endpoint protection is true?

A.

It helps to safeguard systems from email spam

B.

It helps to safeguard systems from data loss.

C.

It helps to safeguard systems from DDoS.

D.

lt helps to safeguard systems from advanced security threats, such as malware.

Full Access