New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCP_FCT_AD-7.4 Questions and Answers

Question # 6

Which two VPNtypes can a FortiClientendpoint user inmate from the Windows command prompt? (Choose two)

A.

L2TP

B.

PPTP

C.

IPSec

D.

SSL VPN

Full Access
Question # 7

Refer to the exhibits.

Which show the Zero Trust Tag Monitor and the FortiClient GUI status.

Remote-Client is tagged as Remote-Users on the FortiClient EMS Zero Trust Tag Monitor.

What must an administrator do to show the tag on the FortiClient GUI?

A.

Update tagging rule logic to enable tag visibility

B.

B. Change the FortiClient system settings to enable tag visibility

C.

Change the endpoint control setting to enable tag visibility

D.

Change the user identity settings to enable tag visibility

Full Access
Question # 8

What is the function of the quick scan option on FortiClient?

A.

It scans programs and drivers that are currently running, for threats

B.

It performs a full system scan including all files, executable files. DLLs, and drivers for throats.

C.

It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.

D.

It scans executable files. DLLs, and drivers that are currently running, for threats.

Full Access
Question # 9

Which component or device shares device status information through ZTNA telemetry?

A.

FortiClient

B.

FortiGate

C.

FortiGate Access Proxy

D.

FortiClient EMS

Full Access
Question # 10

Which security fabric component sends a notification io quarantine an endpoint after IOC detection "n the automation process?

A.

FortiAnalyzer

B.

FortiGate

C.

FortiClient EMS

D.

FortiClient

Full Access
Question # 11

Which statement about FortiClient comprehensive endpoint protection is true?

A.

It helps to safeguard systems from email spam

B.

It helps to safeguard systems from data loss.

C.

It helps to safeguard systems from DDoS.

D.

lt helps to safeguard systems from advanced security threats, such as malware.

Full Access
Question # 12

An administrator has lost web access to the FortiClient EMS console, and the web page to access to the console is timing out.

How can the administrator gather information to investigate the issue? (Choose one answer)

A.

Use the CLI diagnostic tool on the EMS server.

B.

Download the webserver logs from the PostgreSQL server.

C.

Use the diagnostic logs option from the FortiClient EMS GUI.

D.

Download the log generator from the support site and run it on the EMS server.

Full Access
Question # 13

Which three types of antivirus scans are available on FortiClient? (Choose three )

A.

Proxy scan

B.

Full scan

C.

Custom scan

D.

Flow scan

E.

Quick scan

Full Access
Question # 14

Which two statements are true about the ZTNA rule? (Choose two.)

A.

It applies security profiles to protect traffic

B.

It applies SNAT to protect traffic.

C.

It defines the access proxy.

D.

It enforces access control.

Full Access
Question # 15

An administrator configures ZTNA configuration on the FortiGate. Which statement is true about the firewall policy?

A.

It redirects the client request to the access proxy.

B.

It uses the access proxy.

C.

It defines ZTNA server.

D.

It only uses ZTNA tags to control access for endpoints.

Full Access
Question # 16

An administrator needs to connect FortiClient EMS as a fabric connector to FortiGate What is the prerequisite to get FortiClient EMS lo connect to FortiGate successfully?

A.

Import and verify the FortiClient EMS tool CA certificate on FortiGate.

B.

Revoke and update the FortiClient client certificate on EMS.

C.

Import and verify the FortiClient client certificate on FortiGate.

D.

Revoke and update the FortiClient EMS root CA.

Full Access
Question # 17

Refer to the exhibit.

Based on The settings shown in The exhibit, which statement about FortiClient behaviour is Hue?

A.

FortiClient scans infected files when the user copies files to the Resources folder.

B.

FortiClient quarantines infected ties and reviews later, after scanning them.

C.

FortiClient copies infected files to the Resources folder without scanning them.

D.

FortiClient blocks and deletes infected files after scanning them.

Full Access
Question # 18

Refer to the exhibit.

Based on the settings shown in the exhibit which statement about FortiClient behavior is true?

A.

FortiClient quarantines infected files and reviews later, after scanning them.

B.

FortiClient blocks and deletes infected files after scanning them.

C.

FortiClient scans infected files when the user copies files to the Resources folder

D.

FortiClient copies infected files to the Resources folder without scanning them.

Full Access
Question # 19

A company must integrate the FortiClient EMS with their existing identity management infrastructure for user authentication, and implement and enforce administrative access with multi-factor authentication (MFA). Which two authentication methods can they use in this scenario? (Choose two answers)

A.

LDAPS

B.

RADIUS

C.

TACACS

D.

SAML

Full Access
Question # 20

What action does FortiClient anti-exploit detection take when it detects exploits?

A.

Deletes the compromised application process

B.

Patches the compromised application process

C.

Blocks memory allocation to the compromised application process

D.

Terminates the compromised application process

Full Access