Where should you configure MAC notification traps on a supported switch?
D
Where do you look to determine which network access policy, if any is being applied to a particular
host?
A
Explanation:
FortiNAC p 382: "Under Network Access Settings - Policy Name - Name of the Network Access Policy
that currently applies to the host."
While troubleshooting a network connectivity issue, an administrator determines that a device was
being automatically provisioned to an incorrect VLAN.
Where would the administrator look to determine when and why FortiNAC made the network access
change?
C
Which agent can receive and display messages from FortiNAC to the end user?
B
When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?
D
What capability do logical networks provide?
C
Explanation:
Logical Networks allow you to create fewer Network Access Policies than before. (FortiNAC - What's
new in FortiNAC 8.5)
Which two device classification options can register a device automatically and transparently to the
end user? (Choose two.)
B, D
In an isolation VLAN which three services does FortiNAC supply? (Choose three.)
B, C, D
Which group type can have members added directly from the FortiNAC Control Manager?
A
Which system group will force at-risk hosts into the quarantine network, based on point of
connection?
B
Explanation:
Forced Quarantine, study guide 7.2 pag 245 and 248
How are logical networks assigned to endpoints?
B
By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single
switch port simultaneously, what happens to the port?
A
An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this
result?
C
Which three communication methods are used by FortiNAC to gather information from and control,
infrastructure devices? (Choose three.)
ACE
Explanation:
FortiNAC Study Guide 7.2 | Page 11
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the
configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
B