New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NSE5_FCT-7.0 Questions and Answers

Question # 6

Which two third-party tools can an administrator use to deploy FortiClient? (Choose two.)

A.

Microsoft Windows Installer

B.

B. Microsoft SCCM

C.

C. Microsoft Active Directory GPO

D.

QR code generator

Full Access
Question # 7

Refer to the exhibit.

Based on the FortiClient logs shown in the exhibit which endpoint profile policy is currently applied to the FortiClient endpoint from the EMS server?

A.

Default

B.

Compliance rules default

C.

C. Fortinet- Training

D.

Default configuration policy

Full Access
Question # 8

Refer to the exhibit.

Based on the settings shown in the exhibit which statement about FortiClient behavior is true?

A.

FortiClient quarantines infected files and reviews later, after scanning them.

B.

FortiClient blocks and deletes infected files after scanning them.

C.

FortiClient scans infected files when the user copies files to the Resources folder

D.

FortiClient copies infected files to the Resources folder without scanning them.

Full Access
Question # 9

Which three types of antivirus scans are available on FortiClient? (Choose three )

A.

Proxy scan

B.

Full scan

C.

Custom scan

D.

Flow scan

E.

Quick scan

Full Access
Question # 10

Refer to the exhibit.

Based on the settings shown in the exhibit what action will FortiClient take when it detects that a user is trying to download an infected file?

A.

Blocks the infected files as it is downloading

B.

Quarantines the infected files and logs all access attempts

C.

Sends the infected file to FortiGuard for analysis

D.

Allows the infected file to download without scan

Full Access
Question # 11

Which statement about FortiClient enterprise management server is true?

A.

It provides centralized management of FortiGate devices.

B.

lt provides centralized management of multiple endpoints running FortiClient software.

C.

It provides centralized management of FortiClient Android endpoints only.

D.

It provides centralized management of Chromebooks running real-time protection

Full Access
Question # 12

An administrator installs FortiClient EMS in the enterprise.

Which component is responsible for enforcing protection and checking security posture?

A.

FortiClient vulnerability scan

B.

FortiClient EMS tags

C.

FortiClient EMS

D.

D. FortiClient

Full Access
Question # 13

An administrator configures ZTNA configuration on the FortiGate for remote users. Which statement is true about the firewall policy?

A.

It enforces access control

B.

B. It redirects the client request to the access proxy

C.

It defines the access proxy

D.

It applies security profiles to protect traffic

Full Access
Question # 14

Refer to the exhibit.

Based on the settings shown in the exhibit, which action will FortiClient take when users try to access www.facebook.com ?

A.

FortiClient will monitor only the user's web access to the Facebook website

B.

FortiClient will block access to Facebook and its subdomains.

C.

FortiClient will prompt a warning message to warn the user before they can access the Facebook website

Full Access