Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NSE5_FNC_AD_7.6 Questions and Answers

Question # 6

When creating a device profiling rule, what is an advantage of modeling the endpoint as a device in the inventory view?

A.

The device will have historic connection logs.

B.

The devices can have scheduled connection status polling.

C.

The devices will have connection logs.

D.

The devices can be associated with a logged on user.

Full Access
Question # 7

A healthcare organization is integrating FortiNAC-F with its existing MDM. Communication is failing between the systems.

What could be a probable cause?

A.

Security Fabric traffic is failing

B.

SSH communication is failing

C.

REST API communication is failing

D.

SOAP API communication is failing

Full Access
Question # 8

Refer to the output below.

Question # 8

Examine the communication between a primary FortiNAC-F (192.168.10.10) and a secondary FortlNAC-F (192.168.10.110) configured as a 1+1 HA pair. What is the current state of the FortiNAC-F HA pair?

A.

The secondary server is running and in control.

B.

The database replication failed

C.

Failover from the primary server to the secondary server is in progress.

D.

The primary server is running and in control.

Full Access
Question # 9

Refer to the exhibits.

Question # 9

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

A.

Both types of enforcement would be applied

B.

Enforcement would be applied only to rogue hosts

C.

Multiple enforcement groups could not contain the same port.

D.

Only the higher ranked enforcement group would be applied.

Full Access
Question # 10

Refer to the exhibit.

Question # 10

What would FortiNAC-F generate if only one of the security fitters is satisfied?

A.

A normal alarm

B.

A security event

C.

A security alarm

D.

A normal event

Full Access
Question # 11

Refer to the exhibit.

Question # 11

What will happen to the host of a guest user created from this template if the time of connection is 8:00 PM?

A.

The host will be marked as non-authenticated.

B.

The host will be marked as a rogue device.

C.

The host will be marked as at-risk.

D.

The host will be administratively disabled.

Full Access
Question # 12

Refer to the exhibit.

Question # 12

When configuring guest access using a network access policy, where would an administrator configure the Guest-VLAN value?

A.

In the Model configuration

B.

In the Guest template

C.

In the User/Host profile

D.

in the Guest portal configuration

Full Access
Question # 13

As part of a FortiNAC-F integration with FortiGate for management of VPN users, what must be configured on FortiGate to keep FortiNAC-F up to date with VPN session information?

A.

SNMP traps

B.

RADIUS accounting

C.

Security Fabric integration

D.

Syslog messages

Full Access
Question # 14

An administrator wants to control user access to corporate resources by integrating FortiNAC-F with FortiGate using firewall tags defined on FortiNAC-F.

Where would the administrator assign the firewall tag value that will be sent to FortiGate?

A.

RADIUS group attribute

B.

Logical network

C.

Device profiling rule

D.

Security rule

Full Access
Question # 15

During the testing of a newly modeled infrastructure switch, the administrator is not seeing hosts as they connect or move from one port to another. What would cause this issue?

A.

MAC notification traps are misconfigured.

B.

Layer 3 polling is failing.

C.

The default scheduled polling is disabled.

D.

Contact polling is not configured.

Full Access
Question # 16

An administrator wants to continually monitor endpoints for the existence of a specific registry key and the status of a required security service. Which two requirements must be in place for the administrator to use FortiNAC-F compliance monitors? (Choose two.)

A.

MDM integration

B.

Persistent agent

C.

Custom scan

D.

Remediation admin scan

Full Access
Question # 17

An organization wants to add a FortiNAC-F Manager to simplify their large FortiNAC-F deployment.

Which two policy types can be managed globally? (Choose two.)

A.

Authentication

B.

Endpoint Compliance

C.

Supplicant EasyConnect

D.

Network Access

Full Access