Big Halloween Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Forescout FSCP Dumps Questions Answers

Page: 1 / 6
Total 80 questions

Forescout Certified Professional Exam Questions and Answers

Question 1

Why is SMB required for Windows Manageability?

Options:

A.

Scripts run on CounterACT are copied to a temp directory and run locally on the endpoint

B.

Scripts run on endpoints are copied to a Linux script repository and run locally on the endpoint

C.

Scripts run on endpoints are copied to a temp directory and run remotely from CounterACT

D.

Scripts run on CounterACT are copied to a script repository and run remotely from CounterACT

E.

Scripts run on endpoints are copied to a temp directory and run locally on the endpoint

Buy Now
Question 2

Irresolvable hosts would match the condition. When configuring policies, which of the following statements is true regarding this image?

Select one:

Options:

A.

Has no effect on irresolvable hosts

B.

Generates a NOT condition in the sub-rule condition

C.

Negates the criteria outside the property

D.

Modifies the irresolvable condition to TRUE

Question 3

Which field in the User Directory plugin should be configured for Active Directory subdomains?

Options:

A.

Replicas

B.

Address

C.

Parent Groups

D.

Domain Aliases

E.

DNS Detection

Question 4

What is the best practice for order of sub rules?

Options:

A.

Last rule should capture the highest number of endpoints

B.

First rule should capture the lowest number of endpoints

C.

Second rule should capture the highest number of endpoints

D.

Last rule should not use a catch all

E.

First rule should capture the highest number of endpoints

Question 5

Which of the following properties can be determined by the HPS Plugin? (Choose two)

Options:

A.

Application installed on Mac OS

B.

External Device on Windows

C.

Operating System

D.

AD group membership

E.

HTTP banner

Question 6

How can scripts be run when the Endpoint Remote Inspection method is set to "Using MS-WMI"?

Options:

A.

Using Task Scheduler but this has limitations

B.

Using WMI, which will allow interactive scripts to run

C.

Using RRP, which will allow interactive scripts to run

D.

Using WMI, but they may not be run interactively using this method

E.

Using fsprocserv.exe, but scripts may not be run interactively using this method

Question 7

Which type of endpoint can be queried for registry key properties?

Options:

A.

Managed unknown endpoint

B.

Unmanaged Windows endpoint

C.

Managed Windows endpoint

D.

Windows endpoint

E.

Managed Linux endpoint

Question 8

Which of the following is an advantage of FLEXX licensing?

Options:

A.

License is centralized by an appliance by combining hardware and software

B.

Licensing is centralized and managed by an Enterprise Manager

C.

With FLEXX license, you can add See + Control + Resiliency as a base License

D.

FLEXX licensing is offered with V7 and V8 Resiliency and Advanced Compliance licenses

E.

FLEXX licensing works in V7 or on CTxx appliances

Question 9

Which of the following is a switch plugin property that can be used to identify endpoint connection location?

Options:

A.

Switch Location

B.

Switch Port Alias

C.

Switch IP/FQDN and Port Name

D.

Switch Port Action

E.

Wireless SSID

Question 10

Which of the following is true when setting up an Enterprise Manager as a High Availability Pair?

Options:

A.

If HA reboots, this is an indication of a problem.

B.

Set up HA on the Secondary node first.

C.

Connect devices to the network and to each other.

D.

HA needs to be manually configured on the secondary appliance in order to sync correctly.

E.

HA requires a license.

Question 11

Main rules are executed independently of each other. However, one policy may be set to run first by configuring which of the following?

Options:

A.

There is no way to cause one policy to run first

B.

Setting the Main Rule condition to utilize primary classification

C.

Categorizing the Policy as an assessment policy

D.

Categorizing the Policy as a classifier

E.

Using Irresolvable criteria

Question 12

Which of the following must be configured in the User Directory plugin to allow active directory credentials to authenticate console logins?

Options:

A.

Include Parent groups

B.

Authentication

C.

Use as directory

D.

Target Group Resolution

E.

Use for console login

Question 13

What is the automated safety feature to prevent network wide outages/blocks?

Options:

A.

Stop all policies

B.

Disable policy

C.

Disable Policy Action

D.

Action Thresholds

E.

Send an Email Alert

Question 14

Which of the following is true regarding Failover Clustering module configuration?

Options:

A.

Once appliances are configured, then press the Apply button.

B.

Segments should be assigned to appliance folders and NOT to the individual appliances.

C.

You can see the status of failover by selecting IP Assignments and failover tab.

D.

Configure the second HA on the Secondary node.

E.

Place only the EM to participate in failover in the folder.

Question 15

When using MS-WMI for Remote inspection, which of the following properties should be used to test for Windows Manageability?

Options:

A.

Windows Manageable Domain (Current)

B.

MS-RRP Reachable

C.

MS-WMI Reachable

D.

MS-SMB Reachable

E.

Windows Manageable Domain

Question 16

Which of the following requires secure connector to resolve?

Options:

A.

Authentication login (advanced)

B.

Authentication certificate status

C.

HTTP login user

D.

Authentication login

E.

Signed-In status

Question 17

When using the "Assign to VLAN action," why might it be useful to have a policy to record the original VLAN?

Select one:

Options:

A.

Since CounterACT reads the startup config to find the original VLAN, network administrators making changes to switch running configs could overwrite this VLAN information

B.

Since CounterACT reads the running config to find the original VLAN, network administrators saving configuration changes to switches could overwrite this VLAN information

C.

Since CounterACT reads the running config to find the original VLAN, network administrators making changes to switch running configs could overwrite this VLAN information

D.

Since CounterACT reads the running config to find the original VLAN, any changes to switch running configs could overwrite this VLAN information

E.

Since CounterACT reads the startup config to find the original VLAN, network administrators saving configuration changes to switches could overwrite this VLAN information

Question 18

What is required for CounterAct to parse DHCP traffic?

Options:

A.

Must see symmetrical traffic

B.

The enterprise manager must see DHCP traffic

C.

DNS client must be running

D.

DHCP classifier must be running

E.

Plugin located in Network module

Question 19

Which of the following is true regarding CounterACT 8 FLEXX Licensing?

Options:

A.

CounterACT 8 can be installed on all CTxx and 51xx models.

B.

Disaster Recovery is used for member appliances.

C.

For member appliances, HA and Failover Clustering are part of Resiliency licensing.

D.

Changing the licensing of the deployment from Per Appliance Licensing to FLEXX Licensing can be done through the Customer Portal.

E.

Failover Clustering is used with EM and RM.

Question 20

Which of the following is the SMB protocol version required to manage Windows XP or Windows Vista endpoints?

Options:

A.

SMB V3.1.1

B.

SMB V1.0

C.

SMB is not required for XP or Vista

D.

SMB V2.0

E.

SMB V3.0

Question 21

What is the command to monitor system memory and CPU load with 5 second update intervals?

Options:

A.

watch -t 5 vmstat

B.

vmstat 5

C.

vmstat -t 5

D.

watch uptime

E.

watch -n 10 vmstat

Question 22

Which of the following switch actions cannot both be used concurrently on the same switch?

Options:

A.

Access Port ACL & Switch Block

B.

Switch Block & Assign to VLAN

C.

Endpoint Address ACL & Assign to VLAN

D.

Access Port ACL & Endpoint Address ACL

E.

Access Port ACL & Assign to VLAN

Question 23

Which of the following actions can be performed with Remote Inspection?

Options:

A.

Set Registry Key, Disable dual homing

B.

Send Balloon Notification, Send email to user

C.

Disable External Device, Start Windows Updates

D.

Start Secure Connector, Attempt to open a browser at the endpoint

E.

Endpoint Address ACL, Assign to VLAN

Page: 1 / 6
Total 80 questions