Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

NSE6_FNC-7.2 Questions and Answers

Question # 6

Which agent is used only as part of a login script?

A.

Mobile

B.

Passive

C.

Persistent

D.

Dissolvable

Full Access
Question # 7

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Full Access
Question # 8

While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.

Where would the administrator look to determine when and why FortiNAC made the network access change?

A.

The Event view

B.

The Admin Auditing view

C.

The Port Changes view

D.

The Connections view

Full Access
Question # 9

Which group type can have members added directly from the FortiNAC Control Manager?

A.

Administrator

B.

Device

C.

Port

D.

Host

Full Access
Question # 10

Which three capabilities does FortiNAC Control Manager provide? (Choose three.)

A.

Global visibility

B.

Global authentication security policies

C.

Global infrastructure device inventory

D.

Global version control

E.

Pooled licenses

Full Access
Question # 11

Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)

A.

Dissolvable agent

B.

DotlxAuto Registration

C.

Device importing

D.

MDM integration

E.

Captive portal

Full Access
Question # 12

Where do you look to determine which network access policy, if any is being applied to a particular host?

A.

The Policy Details view for the host

B.

The Connections view

C.

The Port Properties view of the hosts port

D.

The Policy Logs view

Full Access
Question # 13

Which devices would be evaluated by device profiling rules?

A.

Rogue devices, each time they connect

B.

All hosts, each time they connect

C.

Known trusted devices, each time they change location

D.

Rogue devices, only when they are initially added to the database

Full Access
Question # 14

Refer to the exhibit, and then answer the question below.

Which host is rogue?

A.

1

B.

3

C.

2

D.

4

Full Access
Question # 15

Where should you configure MAC notification traps on a supported switch?

A.

Configure them only after you configure linkup and linkdown traps.

B.

Configure them on all ports on the switch.

C.

Configure them only on ports set as 802 1g trunks.

D.

Configure them on all ports except uplink ports.

Full Access
Question # 16

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

A.

Physical Address Filtering

B.

Forced Quarantine

C.

Forced Isolation

D.

Forced Remediation

Full Access
Question # 17

By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?

A.

The port is switched into the Dead-End VLAN.

B.

The port becomes a threshold uplink.

C.

The port is disabled.

D.

The port is added to the Forced Registration group.

Full Access