March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Refer to the exhibit.

Based on the settings shown in the exhibit what action will FortiClient take when it detects that a user is trying to download an infected file?

A.

Blocks the infected files as it is downloading

B.

Quarantines the infected files and logs all access attempts

C.

Sends the infected file to FortiGuard for analysis

D.

Allows the infected file to download without scan

Full Access
Question # 5

Refer to the exhibit.

Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant? (Choose two.)

A.

Enable the webfilter profile

B.

Integrate FortiSandbox for infected file analysis

C.

C. Patch applications that have vulnerability rated as high or above

D.

D. Run Calculator application on the endpoint

Full Access
Question # 6

Refer to the exhibit, which shows the Zero Trust Tagging Rule Set configuration.

Which two statements about the rule set are true? (Choose two.)

A.

The endpoint must satisfy that only Windows 10 is running.

B.

The endpoint must satisfy that only AV software is installed and running.

C.

The endpoint must satisfy that antivirus is installed and running and Windows 10 is running.

D.

The endpoint must satisfy that only Windows Server 2012 R2 is running.

Full Access
Question # 7

Which three features does FortiClient endpoint security include? (Choose three.)

A.

L2TP

B.

B. IPsec

C.

DLP

D.

D. Vulnerability management

E.

E. Real-time protection

Full Access
Question # 8

An administrator configures ZTNA configuration on the FortiGate for remote users. Which statement is true about the firewall policy?

A.

It enforces access control

B.

B. It redirects the client request to the access proxy

C.

It defines the access proxy

D.

It applies security profiles to protect traffic

Full Access
Question # 9

An administrator wants to simplify remote access without asking users to provide user credentials.

Which access control method provides this solution"?

A.

SSL VPN

B.

B. ZTNA full mode

C.

L2TP

D.

ZTNA IP/MAC filtering mode

Full Access
Question # 10

Refer to the exhibit.

Based on the FortiClient logs shown in the exhibit which application is blocked by the application firewall?

A.

Twitter

B.

Facebook

C.

Internet Explorer

D.

Firefox

Full Access
Question # 11

Refer to the exhibits.

Which show the Zero Trust Tag Monitor and the FortiClient GUI status.

Remote-Client is tagged as Remote-Users on the FortiClient EMS Zero Trust Tag Monitor.

What must an administrator do to show the tag on the FortiClient GUI?

A.

Update tagging rule logic to enable tag visibility

B.

B. Change the FortiClient system settings to enable tag visibility

C.

Change the endpoint control setting to enable tag visibility

D.

Change the user identity settings to enable tag visibility

Full Access
Question # 12

Refer to the exhibit.

Based on the FortiClient logs shown in the exhibit which endpoint profile policy is currently applied to the FortiClient endpoint from the EMS server?

A.

Default

B.

Compliance rules default

C.

C. Fortinet- Training

D.

Default configuration policy

Full Access
Question # 13

Which three types of antivirus scans are available on FortiClient? (Choose three )

A.

Proxy scan

B.

Full scan

C.

Custom scan

D.

Flow scan

E.

Quick scan

Full Access
Question # 14

Refer to the exhibit.

Which shows the output of the ZTNA traffic log on FortiGate.

What can you conclude from the log message?

A.

The remote user connection does not match the explicit proxy policy.

B.

The remote user connection does not match the ZTNA server configuration.

C.

C. The remote user connection does not match the ZTNA rule configuration.

D.

The remote user connection does not match the ZTNA firewall policy

Full Access