Download Fortinet NSE 6 - FortiNAC 8.5.NSE6_FNC-8.5.VCEplus.2021-02-04.30q.vcex

Vendor: Fortinet
Exam Code: NSE6_FNC-8.5
Exam Name: Fortinet NSE 6 - FortiNAC 8.5
Date: Feb 04, 2021
File Size: 164 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)
  1. SNMP
  2. RADIUS
  3. FTP
  4. CLI
  5. SMTP
Correct answer: ABC
Explanation:
Set up SNMP communication with FortiNAC  RADIUS Server that is used by FortiNAC to communicate  FortiNAC can be configured via CLI to use HTTP or HTTPS for OS updates instead of FTP.  Reference: https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/28966/snmp https://docs.fortinet.com/document/fortinac/8.8.0/administration-guide/938271/configure-radius-settings https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/e7ebbdaa-cabf-11ea-8b7d-00505692583a/FortiNAC_Deployment_Guide.pdf
Set up SNMP communication with FortiNAC  
RADIUS Server that is used by FortiNAC to communicate  
FortiNAC can be configured via CLI to use HTTP or HTTPS for OS updates instead of FTP.  
Reference: https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/28966/snmp https://docs.fortinet.com/document/fortinac/8.8.0/administration-guide/938271/configure-radius-settings 
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/e7ebbdaa-cabf-11ea-8b7d-00505692583a/FortiNAC_Deployment_Guide.pdf
Question 2
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
  1. A matched security policy 
  2. Scheduled poll timings
  3. Linkup and Linkdown traps
  4. Manual polling
  5. A failed Layer 3 poll
Correct answer: BCD
Question 3
How should you configure MAC notification traps on a supported switch?
  1. Configure them only on ports set as 802.1q trunks
  2. Configure them on all ports except uplink ports
  3. Configure them on all ports on the switch
  4. Configure them only after you configure linkup and linkdown traps
Correct answer: B
Explanation:
FortiNAC process to classify rogue devices and create an organized inventory of known trusted registered devices.  Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9529d49c-892c-11e9-81a4-00505692583a/FortiNAC_Device_Profiler_Configuration.pdf
FortiNAC process to classify rogue devices and create an organized inventory of known trusted registered devices.  
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9529d49c-892c-11e9-81a4-00505692583a/FortiNAC_Device_Profiler_Configuration.pdf
Question 4
What agent is required in order to detect an added USB drive?
  1. Mobile
  2. Passive
  3. Dissolvable
  4. Persistent
Correct answer: D
Explanation:
Expand the Persistent Agent folder. Select USB Detection from the tree.  Reference: https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/814147/usb-detection
Expand the Persistent Agent folder. Select USB Detection from the tree.  
Reference: https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/814147/usb-detection
Question 5
Which two of the following are required for endpoint compliance monitors? (Choose two.)
  1. Logged on user
  2. Security rule
  3. Persistent agent
  4. Custom scan
Correct answer: BD
Explanation:
DirectDefense’s analysis of FireEye Endpoint attests that the products help meet the HIPAA Security Rule. In the menu on the left click the + sign next to Endpoint Compliance to open it.  Reference: https://www.fireeye.com/content/dam/fireeye-www/products/pdfs/cg-pci-and-hipaa-compliances.pdf https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/92047/add-or-modify-a-scan
DirectDefense’s analysis of FireEye Endpoint attests that the products help meet the HIPAA Security Rule. In the menu on the left click the + sign next to Endpoint Compliance to open it.  
Reference: https://www.fireeye.com/content/dam/fireeye-www/products/pdfs/cg-pci-and-hipaa-compliances.pdf 
https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/92047/add-or-modify-a-scan
Question 6
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?
  1. The port is added to the Forced Registration group.
  2. The port is disabled.
  3. The port is switched into the Dead-End VLAN. 
  4. The port becomes a threshold uplink.
Correct answer: B
Question 7
In a wireless integration, how does FortiNAC obtain connecting MAC address information?
  1. Link traps
  2. End station traffic monitoring
  3. MAC notification traps
  4. RADIUS
Correct answer: D
Explanation:
Intelligent Access Points (IAPs) and controllers support two methods of RADIUS based authentication: RADIUS MAC authentication and 802.1x authentication. Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9019f7f8-200d-11e9-b6f6-f8bc1258b856/FortiNAC_Wireless_Integration_Overview.pdf
Intelligent Access Points (IAPs) and controllers support two methods of RADIUS based authentication: RADIUS MAC authentication and 802.1x authentication. 
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9019f7f8-200d-11e9-b6f6-f8bc1258b856/FortiNAC_Wireless_Integration_Overview.pdf
Question 8
Which system group will force at-risk hosts into the quarantine network, based on point of connection?
  1. Forced Quarantine
  2. Forced Remediation
  3. Forced Isolation
  4. Physical Address Filtering
Correct answer: B
Explanation:
A remediation plan is established, including a forensic analysis and a reload of the system. Also, users are forced to change their passwords as the system held local user accounts. Reference: https://oit.rice.edu/quarantining-process-used-it-staff-members-introduction
A remediation plan is established, including a forensic analysis and a reload of the system. Also, users are forced to change their passwords as the system held local user accounts. Reference: 
https://oit.rice.edu/quarantining-process-used-it-staff-members-introduction
Question 9
During the on-boarding process through the captive portal, why would a host that successfully registered remain stuck in the Registration VLAN? (Choose two.)
  1. The wrong agent is installed.
  2. Bridging is enabled on the host.
  3. There is another unregistered host on the same port.
  4. The ports default VLAN is the same as the Registration VLAN.
Correct answer: AD
Explanation:
Scenario 4: NAT detection disabled, using endpoint compliance policy and agent. Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/868f1267-7299-11e9-81a4-00505692583a/fortinac-admin-operation-85.pdf
Scenario 4: NAT detection disabled, using endpoint compliance policy and agent. 
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/868f1267-7299-11e9-81a4-00505692583a/fortinac-admin-operation-85.pdf
Question 10
In which view would you find who made modifications to a Group?
  1. The Admin Auditing view
  2. The Alarms view
  3. The Event Management view
  4. The Security Events view
Correct answer: A
Explanation:
It’s important to audit Group Policy changes in order to determine the details of changes made to Group Policies by delegated users. Reference: https://www.lepide.com/how-to/audit-chnages-made-to-group-policy-objects.html
It’s important to audit Group Policy changes in order to determine the details of changes made to Group Policies by delegated users. Reference: 
https://www.lepide.com/how-to/audit-chnages-made-to-group-policy-objects.html
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!