Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Fortinet NSE 6 - FortiNAC 9.1 Question and Answers

Fortinet NSE 6 - FortiNAC 9.1

Last Update May 4, 2024
Total Questions : 47

We are offering FREE NSE6_FNC-9.1 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare NSE6_FNC-9.1 free exam questions and then go for complete pool of Fortinet NSE 6 - FortiNAC 9.1 test questions that will help you more.

NSE6_FNC-9.1 pdf

NSE6_FNC-9.1 PDF

$35  $99.99
NSE6_FNC-9.1 Engine

NSE6_FNC-9.1 Testing Engine

$42  $119.99
NSE6_FNC-9.1 PDF + Engine

NSE6_FNC-9.1 PDF + Testing Engine

$56  $159.99
Questions 1

In which view would you find who made modifications to a Group?

Options:

A.  

The Event Management view

B.  

The Security Events view

C.  

The Alarms view

D.  

The Admin Auditing view

Discussion 0
Questions 2

Refer to the exhibit.

Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?

Options:

A.  

The port will be provisioned for the normal state host, and both hosts will have access to that VLAN.

B.  

The port will not be managed, and an event will be generated.

C.  

The port will be provisioned to the registration network, and both hosts will be isolated.

D.  

The port will be administratively shut down.

Discussion 0
Questions 3

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

Options:

A.  

To confirm installed security software

B.  

To validate the VPN user credentials

C.  

To designate the required agent type

D.  

To validate the VPN client beingused

Discussion 0
Questions 4

Where do you look to determine which network access policy, if any is being applied to a particular host?

Options:

A.  

The Policy Details view for the host

B.  

The Connections view

C.  

The Port Properties view of the hosts port

D.  

The Policy Logs view

Discussion 0
Questions 5

Refer to the exhibit.

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

Options:

A.  

The host is moved to VLAN 111.

B.  

The host is moved to a default isolation VLAN.

C.  

No VLAN change is performed.

D.  

The host is disabled.

Discussion 0
Questions 6

View the command and output shown in the exhibit.

What is the current state of this host?

Options:

A.  

Rogue

B.  

Registered

C.  

Not authenticated

D.  

At-Risk

Discussion 0
Questions 7

Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)

Options:

A.  

Dissolvable

B.  

Mobile

C.  

Passive

D.  

Persistent

Discussion 0
Questions 8

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?

Options:

A.  

The host is provisioned based on the default access defined by the point of connection.

B.  

The host is provisioned based on the network access policy.

C.  

The host is isolated.

D.  

The host is administratively disabled.

Discussion 0
Questions 9

Which two of the following are required for endpoint compliance monitors? (Choose two.)

Options:

A.  

Persistent agent

B.  

Logged on user

C.  

Security rule

D.  

Custom scan

Discussion 0
Questions 10

While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.

Where would the administrator look to determine when and why FortiNAC made the network access change?

Options:

A.  

The Event view

B.  

The Admin Auditing view

C.  

The Port Changes view

D.  

The Connections view

Discussion 0
Questions 11

Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

Options:

A.  

Authentication

B.  

Network Access

C.  

Endpoint Compliance

D.  

Supplicant EasvConnect

Discussion 0
Questions 12

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

Options:

A.  

To deny access to only the production DNS server

B.  

To allow access to only the FortiNAC VPN interface

C.  

To allow access to only the production DNS server

D.  

To deny access to only the FortiNAC VPN interface

Discussion 0
Questions 13

Which agent can receive and display messages from FortiNAC to the end user?

Options:

A.  

Dissolvable

B.  

Persistent

C.  

Passive

D.  

MDM

Discussion 0
Questions 14

When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?

Options:

A.  

Security rule

B.  

Device profiling rule

C.  

RADIUS group attribute

D.  

Logical network

Discussion 0