Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

NSE6_FNC-9.1 Questions and Answers

Question # 6

Which three of the following are components of a security rule? (Choose three.)

A.

Security String

B.

Methods

C.

Action

D.

User or host profile

E.

Trigger

Full Access
Question # 7

What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?

A.

The port would be provisioned for the normal state host, and both hosts would have access to that VLAN.

B.

The port would not be managed, and an event would be generated.

C.

The port would be provisioned to the registration network, and both hosts would be isolated.

D.

The port would be administratively shut down.

Full Access
Question # 8

Which command line shell and scripting language does FortiNAC use for WinRM?

A.

Linux

B.

Bash

C.

DOS

D.

Powershell

Full Access
Question # 9

Refer to the exhibit.

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

A.

Multiple enforcement groups could not contain the same port.

B.

Only the higher ranked enforcement group would be applied.

C.

Both types of enforcement would be applied.

D.

Enforcement would be applied only to rogue hosts.

Full Access
Question # 10

By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?

A.

The port becomes a threshold uplink

B.

The port is disabled

C.

The port is added to the Forced Registration group

D.

The port is switched into the Dead-End VLAN

Full Access
Question # 11

View the command and output shown in the exhibit.

What is the current state of this host?

A.

Rogue

B.

Registered

C.

Not authenticated

D.

At-Risk

Full Access
Question # 12

Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)

A.

Dissolvable agent

B.

DotlxAuto Registration

C.

Device importing

D.

MDM integration

E.

Captive portal

Full Access
Question # 13

An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?

A.

A security trigger activity

B.

A security filter

C.

An event to alarm mapping

D.

An event to action mapping

Full Access
Question # 14

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

A.

To deny access to only the production DNS server

B.

To allow access to only the FortiNAC VPN interface

C.

To allow access to only the production DNS server

D.

To deny access to only the FortiNAC VPN interface

Full Access