Pass the Fortinet NSE 6 Network Security Specialist NSE6_FNC-9.1 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

Options:

A.

Authentication


B.

Network Access


C.

Endpoint Compliance


D.

Supplicant EasvConnect


Expert Solution
Questions # 2:

In which view would you find who made modifications to a Group?

Options:

A.

The Event Management view


B.

The Security Events view


C.

The Alarms view


D.

The Admin Auditing view


Expert Solution
Questions # 3:

How are logical networks assigned to endpoints?

Options:

A.

Through device profiling rules


B.

Through network access policies


C.

Through Layer 3 polling configurations


D.

Through FortiGate IPv4 policies


Expert Solution
Questions # 4:

Which devices would be evaluated by device profiling rules?

Options:

A.

Rogue devices, each time they connect


B.

All hosts, each time they connect


C.

Known trusted devices, each time they change location


D.

Rogue devices, only when they are initially added to the database


Expert Solution
Questions # 5:

By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?

Options:

A.

The port is switched into the Dead-End VLAN.


B.

The port becomes a threshold uplink.


C.

The port is disabled.


D.

The port is added to the Forced Registration group.


Expert Solution
Questions # 6:

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

Options:

A.

To deny access to only the production DNS server


B.

To allow access to only the FortiNAC VPN interface


C.

To allow access to only the production DNS server


D.

To deny access to only the FortiNAC VPN interface


Expert Solution
Questions # 7:

What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?

Options:

A.

Only rogue hosts would be impacted.


B.

Both enforcement groups cannot contain the same port.


C.

Only al-risk hosts would be impacted.


D.

Both types of enforcement would be applied.


Expert Solution
Questions # 8:

What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?

Options:

A.

The port would be provisioned for the normal state host, and both hosts would have access to that VLAN.


B.

The port would not be managed, and an event would be generated.


C.

The port would be provisioned to the registration network, and both hosts would be isolated.


D.

The port would be administratively shut down.


Expert Solution
Questions # 9:

Which three are components of a security rule? (Choose three.)

Options:

A.

Methods


B.

Security String


C.

Trigger


D.

User or host profile


E.

Action


Expert Solution
Questions # 10:

Which two of the following are required for endpoint compliance monitors? (Choose two.)

Options:

A.

Persistent agent


B.

Logged on user


C.

Security rule


D.

Custom scan


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions