Big Halloween Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FSCP Questions and Answers

Question # 6

Which of the following switch actions cannot both be used concurrently on the same switch?

A.

Access Port ACL & Switch Block

B.

Switch Block & Assign to VLAN

C.

Endpoint Address ACL & Assign to VLAN

D.

Access Port ACL & Endpoint Address ACL

E.

Access Port ACL & Assign to VLAN

Full Access
Question # 7

Which of the following requires secure connector to resolve?

A.

Authentication login (advanced)

B.

Authentication certificate status

C.

HTTP login user

D.

Authentication login

E.

Signed-In status

Full Access
Question # 8

The host property 'HTTP User Agent banner' is resolved by what function?

A.

Device classification engine

B.

NetFlow

C.

NMAP scanning

D.

Packet engine

E.

Device profile library

Full Access
Question # 9

Which of the following is a switch plugin property that can be used to identify endpoint connection location?

A.

Switch Location

B.

Switch Port Alias

C.

Switch IP/FQDN and Port Name

D.

Switch Port Action

E.

Wireless SSID

Full Access
Question # 10

Which of the following must be configured in the User Directory plugin to allow active directory credentials to authenticate console logins?

A.

Include Parent groups

B.

Authentication

C.

Use as directory

D.

Target Group Resolution

E.

Use for console login

Full Access
Question # 11

What best defines a 'Post-Connect Methodology'?

A.

802.1X is a flavor of Post-Connect

B.

Guilty until proven innocent

C.

Innocent until proven guilty

D.

Used subsequent to pre-connect

E.

Assessed for critical compliance before IP address is assigned

Full Access
Question # 12

Which field is NOT editable in the User Directory plugin once it is configured?

A.

Administrator

B.

Server Name

C.

Password

D.

Address

E.

Port

Full Access
Question # 13

Which of the following logs are available from the GUI?

A.

Host Details, Policy, Blocking, Event Viewer, Audit Trail

B.

Switch, Policy, Blocking, Event Viewer, Audit Trail

C.

Switch, Discovery, Threat Protection, Event Viewer, Audit Trail

D.

HPS, Policy, Threat Protection, Event Viewer, Audit Trail

E.

Host Details, Policy, Today Log, Threat Event Viewer, Audit Trail

Full Access
Question # 14

Which type of endpoint can be queried for registry key properties?

A.

Managed unknown endpoint

B.

Unmanaged Windows endpoint

C.

Managed Windows endpoint

D.

Windows endpoint

E.

Managed Linux endpoint

Full Access
Question # 15

Irresolvable hosts would match the condition. When configuring policies, which of the following statements is true regarding this image?

Select one:

A.

Has no effect on irresolvable hosts

B.

Generates a NOT condition in the sub-rule condition

C.

Negates the criteria outside the property

D.

Modifies the irresolvable condition to TRUE

Full Access
Question # 16

The host property 'service banner' is resolved by what function?

A.

Packet engine

B.

NMAP scanning

C.

Device classification engine

D.

Device profile library

E.

NetFlow

Full Access
Question # 17

Which of the following plugins assists in classification for computer endpoints? (Choose two)

A.

Switch

B.

HPS Inspection Engine

C.

Linux Plugin

D.

Advanced Tools

E.

DNS Client

Full Access
Question # 18

What should be done after the Managed Windows devices are sent to a policy to determine the Windows 10 patch delivery optimization setting?

A.

Push out the proper DWORD setting via GPO

B.

Non Windows 10 devices must be called out in sub-rules since they will not have the relevant DWORD

C.

Manageable Windows devices are not required by this policy

D.

Non Windows 10 devices must be called out in sub-rules so that the relevant DWORD value may be changed

E.

Write sub-rules to check for each of the DWORD values used in patch delivery optimization

Full Access
Question # 19

Place the DNS Enforce control actions into the correct workflow order for endpoints which have a pending control action.

Full Access
Question # 20

Where are the plugin logs located in the CounterACT CLI?

A.

/usr/local/forescout/plugin//log

B.

/usr/local/forescout/plugin/log/

C.

/usr/local/forescout/log

D.

/usr/local/log/plugin/

E.

/usr/local/forescout/log/plugin/

Full Access
Question # 21

When creating a new "Send Mail" notification action, which email is used by default?

A.

The email configured under Options > General > Mail

B.

The email address of the last logged in user

C.

The Tech Support email

D.

The email that was used when registering the license

E.

The email entered in the send mail action on the rule

Full Access
Question # 22

Which of the following are endpoint attributes learned from the Switch plugin?

A.

Host Name, Mac table, Switch IP, Port Description, Host Table, Switch Version

B.

Port VLAN, Switch Version, Mac address, Host name, Port Description, ARP Table, Switch Version

C.

Mac address, Host name, Port VLAN, Port Description, Switch OS, Switch Version

D.

Switch Version, Mac address, Switch OS, Port VLAN, Host Name, ARP Table

E.

Mac address, Switch IP and Port name, ARP Table, Switch Port Information

Full Access
Question # 23

When troubleshooting an issue that affects multiple endpoints, why might you choose to view Policy logs before Host logs?

A.

Because you can gather more pertinent information about a single host

B.

Because Policy logs show details for a range of endpoints

C.

You would not. Host logs are the best choice for a range of endpoints

D.

Policy logs may help to pinpoint the issue for a specific host

E.

Looking at Host logs is always the first step in the process

Full Access
Question # 24

When using MS-WMI for Remote inspection, which of the following properties should be used to test for Windows Manageability?

A.

Windows Manageable Domain (Current)

B.

MS-RRP Reachable

C.

MS-WMI Reachable

D.

MS-SMB Reachable

E.

Windows Manageable Domain

Full Access