Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What capability do logical networks provide?

A.

Point of access-baseautopopulationof device groups'

B.

Interactive topology view diagrams

C.

Application of different access values from a single access policy

D.

IVLAN -based inventory reporting

Full Access
Question # 5

By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?

A.

The port is switched into the Dead-End VLAN.

B.

The port becomes a threshold uplink.

C.

The port is disabled.

D.

The port is added to the Forced Registration group.

Full Access
Question # 6

What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?

A.

The port would be provisioned for the normal state host, and both hosts would have access to that VLAN.

B.

The port would not be managed, and an event would be generated.

C.

The port would be provisioned to the registration network, and both hosts would be isolated.

D.

The port would be administratively shut down.

Full Access
Question # 7

What agent is required in order to detect an added USB drive?

A.

Persistent

B.

Dissolvable

C.

Mobile

D.

Passive

Full Access
Question # 8

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

A.

Manual polling

B.

Scheduled poll timings

C.

A failed Layer 3 poll

D.

A matched security policy

E.

Linkup and Linkdown traps

Full Access
Question # 9

View the command and output shown in the exhibit.

What is the current state of this host?

A.

Rogue

B.

Registered

C.

Not authenticated

D.

At-Risk

Full Access
Question # 10

Where do you look to determine when and why the FortiNAC made an automated network access change?

A.

The Event view

B.

The Port Changes view

C.

The Connections view

D.

The Admin Auditing view

Full Access
Question # 11

View the command and output.

What is the state of database replication?

A.

Secondary to primary synchronization failed.

B.

Primary to secondary synchronization failed.

C.

Secondary to primary synchronization was successful.

D.

Primary to secondary database synchronization was successful.

Full Access
Question # 12

How are logical networks assigned to endpoints?

A.

Through device profiling rules

B.

Through network access policies

C.

Through Layer 3 polling configurations

D.

Through FortiGate IPv4 policies

Full Access
Question # 13

Refer to the exhibit.

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

A.

Multiple enforcement groups could not contain the same port.

B.

Only the higher ranked enforcement group would be applied.

C.

Both types of enforcement would be applied.

D.

Enforcement would be applied only to rogue hosts.

Full Access
Question # 14

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

A.

To confirm installed security software

B.

To validate the VPN user credentials

C.

To designate the required agent type

D.

To validate the VPN client beingused

Full Access