Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)
In which view would you find who made modifications to a Group?
How are logical networks assigned to endpoints?
Which devices would be evaluated by device profiling rules?
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
Which three are components of a security rule? (Choose three.)
Which two of the following are required for endpoint compliance monitors? (Choose two.)