Fortinet nse6-fnc-7-2 practice test

Fortinet NSE 6 - FortiNAC 7.2

Last exam update: Nov 16 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 57

Question 1

Where should you configure MAC notification traps on a supported switch?

  • A. Configure them only after you configure linkup and linkdown traps.
  • B. Configure them on all ports on the switch.
  • C. Configure them only on ports set as 802 1g trunks.
  • D. Configure them on all ports except uplink ports.
Mark Question:
Answer:

C


Explanation:
In general, for network switches supporting MAC notification traps, it's advisable to configure these
traps on all ports except uplink ports. Uplink ports are used for connecting to other switches or
network infrastructure devices and typically don't need MAC notification traps, which are more
relevant for end-device connectivity monitoring.
The study guide specifies that MAC notification traps should not be configured on interfaces that are
uplinks. They are the preferred method for learning and updating Layer 2 information and should be
used whenever available, but not on uplink interfaces​​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Where do you look to determine which network access policy, if any is being applied to a particular
host?

  • A. The Policy Details view for the host
  • B. The Connections view
  • C. The Port Properties view of the hosts port
  • D. The Policy Logs view
Mark Question:
Answer:

A


Explanation:
To determine which network access policy is applied to a particular host, you should look at the
Policy Details window. This window provides information about the types of policies applied (such as
Network Access, Authentication, Supplicant, etc.), including the profile name, policy name,
configuration name, and any settings that make up the configuration​​.
FortiNAC p 382: "Under Network Access Settings - Policy Name - Name of the Network Access Policy
that currently applies to the host."

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

While troubleshooting a network connectivity issue, an administrator determines that a device was
being automatically provisioned to an incorrect VLAN.
Where would the administrator look to determine when and why FortiNAC made the network access
change?

  • A. The Event view
  • B. The Admin Auditing view
  • C. The Port Changes view
  • D. The Connections view
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which agent can receive and display messages from FortiNAC to the end user?

  • A. Dissolvable
  • B. Persistent
  • C. Passive
  • D. MDM
Mark Question:
Answer:

B


Explanation:
The persistent agent has the ability to display messages on the desktop of an endpoint. These
messages can target an individual host, a group of hosts, or all hosts with the persistent agent
installed. The messaging options include sending a message content with an optional web address
link

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?

  • A. Security rule
  • B. Device profiling rule
  • C. RADIUS group attribute
  • D. Logical network
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

What capability do logical networks provide?

  • A. Point of access-base autopopulation of device groups'
  • B. Interactive topology view diagrams
  • C. Application of different access values from a single access policy
  • D. IVLAN -based inventory reporting
Mark Question:
Answer:

C


Explanation:
Logical Networks allow you to create fewer Network Access Policies than before. (FortiNAC - What's
new in FortiNAC 7.2)
Logical networks in FortiNAC decouple a policy from a specific access value, allowing for the
application of different access values from a single access policy. This is done based on the point of
connection, significantly reducing the number of network access policies needed and simplifying
network access policy management​

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which two device classification options can register a device automatically and transparently to the
end user? (Choose two.)

  • A. Dissolvable agent
  • B. DotlxAuto Registration
  • C. Device importing
  • D. MDM integration
  • E. Captive portal
Mark Question:
Answer:

B, D


Explanation:
The FortiNAC 7.2 Study Guide does not explicitly mention Dot1x Auto Registration and MDM
integration as the specific device classification options for automatic and transparent registration to
the end user. However, based on the general functioning of FortiNAC, Dot1x Auto Registration and
MDM integration are typically used for such purposes. The guide discusses automatic device
registration in the context of profiling rules

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

  • A. NTP
  • B. DHCP
  • C. Web
  • D. DNS
  • E. ISMTP
Mark Question:
Answer:

B, C, D


Explanation:
In an isolation VLAN, FortiNAC supplies DHCP and DNS services. The guide specifies that FortiNAC
has a DHCP scope defined for a particular VLAN and should be the only DHCP server available to
hosts on that VLAN. Additionally, hosts on the VLAN would get a DNS server configuration of the
FortiNAC IP for that VLAN

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 9

Which group type can have members added directly from the FortiNAC Control Manager?

  • A. Administrator
  • B. Device
  • C. Port
  • D. Host
Mark Question:
Answer:

B


Explanation:
The study guide explains that there are six different types of groups in FortiNAC, including device,
host, IP phone, port, user, and administrator groups. Groups created by administrative users or
imported as a result of an LDAP integration can be used to organize elements but do not enforce any
type of control or functionality directly​

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which system group will force at-risk hosts into the quarantine network, based on point of
connection?

  • A. Physical Address Filtering
  • B. Forced Quarantine
  • C. Forced Isolation
  • D. Forced Remediation
Mark Question:
Answer:

D


Explanation:
Forced Quarantine, study guide 7.2 pag 245 and 248

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

How are logical networks assigned to endpoints?

  • A. Through device profiling rules
  • B. Through network access policies
  • C. Through Layer 3 polling configurations
  • D. Through FortiGate IPv4 policies
Mark Question:
Answer:

A


Explanation:
Logical networks are assigned to endpoints through device profiling rules in FortiNAC. These
networks appear in device Model Configuration views and are used for endpoint isolation based on
the endpoint’s state or status

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single
switch port simultaneously, what happens to the port?

  • A. The port becomes a threshold uplink
  • B. The port is disabled
  • C. The port is added to the Forced Registration group
  • D. The port is switched into the Dead-End VLAN
Mark Question:
Answer:

A


Explanation:
If more than 20 endpoints are seen connected on a single switch port simultaneously after a
successful Layer 2 poll, the port is designated as an uplink. FortiNAC will ignore all physical addresses
learned on an uplink port and will not perform any control operations on it

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this
result?

  • A. A security trigger activity
  • B. A security filter
  • C. An event to alarm mapping
  • D. An event to action mapping
Mark Question:
Answer:

C


Explanation:
To generate an alarm from a Host At Risk event, an administrative user must create an Event to
Alarm Mapping for the Vulnerability Scan Failed event. Within this alarm mapping, a host security
action must be designated to mark the host at risk

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which three communication methods are used by FortiNAC to gather information from and control,
infrastructure devices? (Choose three.)

  • A. CLI
  • B. SMTP
  • C. SNMP
  • D. FTP
  • E. RADIUS
Mark Question:
Answer:

ACE


Explanation:
FortiNAC Study Guide 7.2 | Page 11
FortiNAC uses various methods to communicate with infrastructure devices such as SNMP for
discovery and ongoing management, SSH or Telnet through the CLI for tasks related to the
infrastructure, and RADIUS for handling specific types of requests

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 15

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the
configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

  • A. To deny access to only the production DNS server
  • B. To allow access to only the FortiNAC VPN interface
  • C. To allow access to only the production DNS server
  • D. To deny access to only the FortiNAC VPN interface
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2