Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Fortinet NSE6_FNC-9.1 Dumps

Fortinet NSE 6 - FortiNAC 9.1 Questions and Answers

Question 1

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

Options:

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Question 2

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

Options:

A.

To deny access to only the production DNS server

B.

To allow access to only the FortiNAC VPN interface

C.

To allow access to only the production DNS server

D.

To deny access to only the FortiNAC VPN interface

Question 3

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

Options:

A.

NTP

B.

DHCP

C.

Web

D.

DNS

E.

ISMTP

Question 4

What agent is required in order to detect an added USB drive?

Options:

A.

Persistent

B.

Dissolvable

C.

Mobile

D.

Passive

Question 5

Which group type can have members added directly from the FortiNAC Control Manager?

Options:

A.

Administrator

B.

Device

C.

Port

D.

Host

Question 6

In which view would you find who made modifications to a Group?

Options:

A.

The Event Management view

B.

The Security Events view

C.

The Alarms view

D.

The Admin Auditing view

Question 7

Refer to the exhibit.

Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?

Options:

A.

The port will be provisioned for the normal state host, and both hosts will have access to that VLAN.

B.

The port will not be managed, and an event will be generated.

C.

The port will be provisioned to the registration network, and both hosts will be isolated.

D.

The port will be administratively shut down.

Question 8

View the command and output shown in the exhibit.

What is the current state of this host?

Options:

A.

Rogue

B.

Registered

C.

Not authenticated

D.

At-Risk

Question 9

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

Options:

A.

Manual polling

B.

Scheduled poll timings

C.

A failed Layer 3 poll

D.

A matched security policy

E.

Linkup and Linkdown traps

Question 10

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

Options:

A.

Physical Address Filtering

B.

Forced Quarantine

C.

Forced Isolation

D.

Forced Remediation

Question 11

Which three of the following are components of a security rule? (Choose three.)

Options:

A.

Security String

B.

Methods

C.

Action

D.

User or host profile

E.

Trigger

Question 12

Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)

Options:

A.

A security event parser must be created for the device.

B.

The device sending the messages must be modeled in the Network Inventory view.

C.

The device must be added as a patch management server.

D.

The device must be added as a log receiver.

Question 13

Where should you configure MAC notification traps on a supported switch?

Options:

A.

Configure them only after you configure linkup and linkdown traps.

B.

Configure them on all ports on the switch.

C.

Configure them only on ports set as 802 1g trunks.

D.

Configure them on all ports except uplink ports.

Question 14

What capability do logical networks provide?

Options:

A.

Point of access-baseautopopulationof device groups'

B.

Interactive topology view diagrams

C.

Application of different access values from a single access policy

D.

IVLAN -based inventory reporting