ERASED TEST, YOU MAY BE INTERESTED ON SOPADEBATATA
|
---|
TAKE THE TEST

Title of test:
SOPADEBATATA Description: SOPA DE BATATA Author:
Creation Date: 27/01/2025 Category: Computers Number of questions: 56 |
Share the Test:



New Comment
No comments about this test.
Content:
Which devices are evaluated by device profiling rules? All hosts, each time they connect Known trusted devices, each time they connect Rogue devices, only when they are initially added to the database Rogue devices, each time they change location. Where should you configure MAC notification traps on a supported switch? Configure them only on ports that generate linkup and linkdown traps. Configure them only on uplink ports. Configure them on all ports on the switch. Configure them on all ports except uplink ports. Which group type can have members added directly from the FORTINAC Control Manager ? Port Host Administrator Device. Which two methods can be used to gather a list of installed applications and application details, from a host? (Choose two.) Application layer traffic inspection Agent technology MDM integration Portal page on-boarding options. When creating a user or host profile, which three criteria can you apply? (Choose three.) An applied access policy Host or user group memberships Administrative group membership Host or user attributes Location. When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed? RADIUS group attribute Device profiling rule Logical network Security rule. With enforcement for network access policies and at-risk hosts enabled, what happens if a host matches a network access policy and has a state of "at risk"? The host is isolated The host is provisioned based on the network access policy The host is administratively disabled. The host is provisioned based on the default access defined by the point of connection. An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies. What is the purpose of the FortiGate firewall policy that applies to clients not yet authorized by FortiNAC? To allow access to only the production DNS server To deny access to only the FortiNAC VPN interface To deny access to only the production DNS server To allow access to only the FortiNAC VPN interface. When FortiNAC is managing VPN clients connecting through FortiGate, why must the clients run a FortiNAC agent? To meet the client security profile rule for scanning connecting clients To transparently update the client IP address upon successful authentication To collect user authentication details To collect the client IP address and MAC address. Which three are components of a security rule? (Choose three.) Methods User or host profile Security String Action Trigger. Refer to the exhibit What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups? Multiple enforcement groups could not contain the same port. Both types of enforcement would be applied. Enforcement would be applied only to rogue hosts. Only the higher ranked enforcement group would be applied. During configuration of high availability, what is required to use the shared IP address option? The isolation network type is Layer 2 The isolation network type is Layer 3 The primary and secondary administrative interfaces are on the same subnet A direct cable link between FortiNAC devices. Which two policy types can be created on a FortiNAC Control Manager? (Choose two.) Supplicant EasyConnect Endpoint Compliance Network Access Authentication. When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary? To validate the VPN client being used To designate the required agent type To confirm the installed endpoint certificate To validate the VPN user credentials. An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result? An event to alarm mapping A security filter activity A security trigger activity An event to action mapping. During the on-boarding process through the captive portal, what are two reasons why a host that successfully registered would remain stuck in the Registration VLAN? (Choose two. There is another unregistered host on the same port. The wrong agent is installed. The port default VLAN is the same as the Registration VLAN There is no agent installed on the host. Refer to the exhibit showing the Client command and output. What is the current state of this host? Not authenticated Rogue At-Risk Registered. Which FortiNAC agent is required in order to detect an added USB drive? Dissolvable Persistent ZTNA Agent Passive. What causes a host state to change to "at risk"? The host has been administratively disabled. The logged on user is not found in the active directory. The host was removed from the Registered Hosts group. The host has been marked as failed for an admin scan. In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information? RADIUS Endstation traffic monitoring Link traps SNMP traps. Refer to the exhibit. When a contractor account is created using this template, what value will be set in the accounts Role field? Accounting Contractor Engineer-Contractor Eng-Contractor Contractor. Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.) The device must be added as a patch management server. A security event parser must be created for the device. The device must be added as a log receiver. The device sending the messages must be modeled in the Network Inventory view. How are logical networks assigned to endpoints? Through device profiling rules Through network access policies Through Model configuration settings Through FortiGate IPv4 policies. Two FortiNAC devices have been configured as an HA pair. The primary server went off line and a success failover to the secondary has occurred. What happens if the primary server comes back online? The primary server will determine that the secondary has control and power down for maintenance. The secondary server will update the primary and the servers will load balance until an administrator forces the primary to resume full control. The primary and secondary servers will resume communication and the secondary will maintain control. After five successful heartbeats between the servers, the primary server will resume control. Which FortiNAC agent can receive and display messages from FortiNAC to the end user? Mobile Passive Dissolvable Persistent. Which three conditions trigger Layer 2 polling of infrastructure devices? (Choose three.) scheduled poll failed Layer 3 poll Receipt of linkup and link-down traps manual poll matched security policy. What capability do logical networks provide? Application of different access values from a single access policy Point of access-base autopopulation of enforcement groups VLAN-based inventory reporting More detailed network inventory views. Which two agents can validate endpoint compliance transparently to the end user? (Choose two.) Persistent Dissolvable Mobile Passive. By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port? The port is disabled. The port is added to the Authorized Access Points group. The port becomes a threshold uplink The port is added to the Access Point Management group. While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN Where would the administrator look to determine when and why FortiNAC made the network access change? The Port Changes view The Security Event view The Admin Auditing view The Reports view. Refer to the exhibit If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs? NO VLAN change is performed. The host is moved to VLAN 111. The host is disabled The host is moved to a default isolation VLAN. Examine the communication between a primary FortiNAC (192 168.10.10) and a secondary FortiNAC (192.168.10.110) configured as an HA pair What is the current state of the FortiNAC HA pair? Failover from the primary server to the secondary server is in progress The secondary server is running and in control The primary server is running and in control The database replication failed. Refer to the exhibit showing the client command and output. What is the current state of this host? Rogue Not authenticated AL-Risk Registered. Two FortiNAC devices have been configured in an HA configuration. After five failed heartbeats between the primary device and secondary device, the primary device fails to ping the designated gateway What happens next? The primary device changes its designation to secondary, and the secondary device changes to primary The primary device continues to operate as the in-control device and changes the status of secondary device to contact lost The primary device shuts down NAC processes and changes to a management down status. The primary device waits 3 minutes and attempts to re-establish the HA heartbeat before attempting a second ping of the gateway. Which two device classification options can register a device automatically and transparently to the end user? (Choose two.) Dissolvable agent Captive portal Dot1x Auto Registration MDM integration. Which two methods can be used to gather a list of installed applications and application details, from a host? (Choose two.) Agent technology Application layer traffic inspection Portal page on-boarding options MDM integration. Which three capabilities does FortiNAC Control Manager provide? (Choose three.) Global authentication security policies Global version control Global visibility Global infrastructure device inventory Pooled licenses. Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group. The port will be provisioned to the registration network, and both hosts will be isolated The port will be added to the Access Point Management group. The port will be provisioned for the normal state host, and both hosts will have access to that VLAN The port will have shared media enforcement applied. Refer to the exhibit If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile? The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM. How does FortiGate update FortiNAC about VPN session information? SNMP traps Syslog messages API calls to FortiNAC Security Fabric integration. Which agent is used only as part of a login script? Mobile Passive Persistent Dissolvable. In an isolation VLAN, which three services does FortiNAC supply? (Choose three.) DHCP NTP DDNS Web DNS. What method of communication does FortiNAC use to control VPN host access on FortiGate? RSSO Security Fabric SAML SSO RADIUS accounting. An administrator wants to leverage logical networks so that a single network access policy will provision cameras to different networks at different locations. Where are the logical network values defined? In the User/Host profile of each network access policy In the Device Properties view of each device In the Profiled Devices view In the Model Configuration view of each infrastructure device. Which three communication methods does FortiNAC use to gather information from and control infrastructure devices? (Choose three.) CLI SNMP HTTP/HTTPS NMAP RADIUS. During an evaluation of state-based enforcement, an administrator discovers that ports that should not be under enforcement have been added to enforcement group In which view would the administrator be able to determine who added the ports to the groups? The Event Management view The Alarms view The Security Events view The Admin Auditing view. With enforcement for network access policies and at-risk hosts enabled, what happens if a host matches a network access policy and has a state of "at risk"? The host is administratively disabled. The host is provisioned based on the default access defined by the point of connection. The host is isolated. The host is provisioned based on the network access policy. When configuring isolation networks in the configuration wizard, why does a Layer 3 network type allow for more than one DHCP scope for each isolation network type? Configuring more than one DHCP scope allows for DHCP server redundancy There can be more than one isolation network of each type Any scopes beyond the first scope are used if the initial scope runs out of IP addresses The Layer 3 network type allows for one scope for each possible host status. Which system group forces at-risk hosts into the quarantine network, based on point of connection? Role Based Access Forced Isolation Forced Quarantine Forced Remediation. Which two are required for endpoint compliance monitors? (Choose two.) ZTNA agent MDM integration Persistent agent Custom scan. Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.) The device sending the messages must be modeled in the Network Inventory view. A security event parser must be created for the device. The device must be added as a patch management server. The device must be added as a log receiver. When FortiNAC passes a group or firewall tag value to FortiGate, what determines the value that is passed? Network access configuration RADIUS group attribute Device profiling rule Security rule. Where do you look to determine which network access policy, if any, is being applied to a particular host? The Port Properties view of the hosts port The Policy Details view for the host The Connections view The Policy Logs view. Which two methods can be used to gather a list of installed applications and application details, from a host? (Choose two.) MDM integration Agent technology Application layer traffic inspection Portal page on-boarding options. In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information? RADIUS Endstation traffic monitoring Link traps OSNMP traps. Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.) SNMP RADIUS FTP CLI SMTP. |
Report abuse