Which connecting endpoints are evaluated against all enabled device profiling rules?
D
Explanation:
FortiNAC process to classify rogue devices and create an organized inventory of known trusted
registered devices.
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9529d49c-
892c-11e9-81a4-00505692583a/FortiNAC_Device_Profiler_Configuration.pdf
Which agent is used only as part of a login script?
B
Explanation:
If the logon script runs the logon application in persistent mode, configure your Active Directory
server not to run scripts synchronously.
Reference:
https://www.websense.com/content/support/library/deployctr/v76/init_setup_creating_and_runni
ng_logon_agent_script_deployment_tasks.aspx
What agent is required in order to detect an added USB drive?
A
Explanation:
Expand the Persistent Agent folder. Select USB Detection from the tree.
Reference:
https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/814147/usb-
detection
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously
appeared on a port that is a member of the Forced Registration port group?
C
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
CD
Explanation:
Mobile agents use the network transparently.
Reference:
https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/377110/persistent-agent-
certificate-validation
https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/377110/persistent-agent-
certificate-validation
Which three communication methods are used by the FortiNAC to gather information from, and
control, infrastructure devices? (Choose three)
ACD
Explanation:
Set up SNMP communication with FortiNAC
RADIUS Server that is used by FortiNAC to communicate
FortiNAC can be configured via CLI to use HTTP or HTTPS for OS updates instead of FTP.
Reference:
https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/28966/snmp
https://docs.fortinet.com/document/fortinac/8.8.0/administration-guide/938271/configure-radius-
settings
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/e7ebbdaa-cabf-11ea-
8b7d-00505692583a/FortiNAC_Deployment_Guide.pdf
Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects
to a port on the switch, what will occur?
C
Explanation:
The ability to limit the number of workstations that can connect to specific ports on the switch is
managed with Port Security. If these limits are breached, or access from unknown workstations is
attempted, the port can do any or all of the following: drop the untrusted data, notify the network
administrator, or disable the port.
Reference:
https://www.alliedtelesis.com/sites/default/files/documents/solutions-
guides/lan_protection_solution_reva.pdf
Where are logical network values defined?
A
Reference:
https://www.sciencedirect.com/topics/computer-science/logical-network
How should you configure MAC notification traps on a supported switch?
C
Explanation:
Configure SNMP MAC Notification traps on all access ports (do not include uplinks).
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/be7fcde9-
9685-11e9-81a4-00505692583a/Configuring_Traps_for_MAC_Notification.pdf
Where do you look to determine what network access policy, if any, is being applied to a particular
host?
C
Reference:
https://docs.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-
np-overview
Which three of the following are components of a security rule? (Choose three.)
CDE
Reference:
https://docs.fortinet.com/document/fortinac/8.8.0/administration-guide/167668/add-
or-modify-a-rule
Which system group will force at-risk hosts into the quarantine network, based on point of
connection?
D
Explanation:
A remediation plan is established, including a forensic analysis and a reload of the system. Also, users
are forced to change their passwords as the system held local user accounts.
Reference:
https://oit.rice.edu/quarantining-process-used-it-staff-members-introduction
During the on-boarding process through the captive portal, why would a host that successfully
registered remain stuck in the Registration VLAN? (Choose two.)
BD
Explanation:
Scenario 4: NAT detection disabled, using endpoint compliance policy and agent.
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/868f1267-
7299-11e9-81a4-00505692583a/fortinac-admin-operation-85.pdf
In which view would you find who made modifications to a Group?
D
Explanation:
It’s important to audit Group Policy changes in order to determine the details of changes made to
Group Policies by delegated users.
Reference:
https://www.lepide.com/how-to/audit-chnages-made-to-group-policy-objects.html
Which two of the following are required for endpoint compliance monitors? (Choose two.)
AD
Explanation:
DirectDefense’s analysis of FireEye Endpoint attests that the products help meet the HIPAA Security
Rule.
In the menu on the left click the + sign next to Endpoint Compliance to open it.
Reference:
https://www.fireeye.com/content/dam/fireeye-www/products/pdfs/cg-pci-and-hipaa-
compliances.pdf
https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/92047/add-or-modify-a-
scan