Which three of the following are components of a security rule? (Choose three.)
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
Which command line shell and scripting language does FortiNAC use for WinRM?
Refer to the exhibit.
What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?
By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?
View the command and output shown in the exhibit.
What is the current state of this host?
Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)
An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?