Big Halloween Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Forescout FSCP Dumps

Page: 1 / 8
Total 80 questions

Forescout Certified Professional Exam Questions and Answers

Question 1

Select the action that requires symmetrical traffic.

Options:

A.

Assign to VLAN

B.

WLAN block

C.

Endpoint ACL

D.

Start SecureConnector

E.

Virtual Firewall

Question 2

Policies will recheck when certain conditions are met. These may include...

Options:

A.

Admission event, group name change, Scope recheck timer expires

B.

Policy recheck timer expires, admission event, SC event change

C.

Admission event, policy categorization, SC event change

D.

Policy categorization, admission event, action schedule activation

E.

Policy recheck timer expires, group name change, SC event change

Question 3

Which of the following is a switch plugin property that can be used to identify endpoint connection location?

Options:

A.

Switch Location

B.

Switch Port Alias

C.

Switch IP/FQDN and Port Name

D.

Switch Port Action

E.

Wireless SSID

Question 4

Which of the following is true regarding how CounterACT restores a quarantined endpoint to its original production VLAN after the "Assign to VLAN Action" is removed?

Options:

A.

This happens automatically because CounterACT compares the running and startup configs

B.

This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not changed in the switch running config

C.

This happens automatically as long as no configuration changes to the switch are made to the running config

D.

This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config

E.

A policy is required to ensure this happens correctly.

Question 5

What should be done after the Managed Windows devices are sent to a policy to determine the Windows 10 patch delivery optimization setting?

Options:

A.

Push out the proper DWORD setting via GPO

B.

Non Windows 10 devices must be called out in sub-rules since they will not have the relevant DWORD

C.

Manageable Windows devices are not required by this policy

D.

Non Windows 10 devices must be called out in sub-rules so that the relevant DWORD value may be changed

E.

Write sub-rules to check for each of the DWORD values used in patch delivery optimization

Question 6

Why would the patch delivery optimization mechanism used for Windows 10 updates be a potential security concern?

Options:

A.

It can be configured to use a peer-to-peer file sharing protocol

B.

CounterACT cannot initiate Windows updates for Windows 10 devices

C.

It uses a peer-to-peer file sharing protocol by default

D.

The registry DWORD controlling this behavior cannot be changed

E.

It always uses a peer-to-peer file sharing protocol

Question 7

What should you do first when preparing for an upgrade to a new CounterACT version?

Options:

A.

Upgrade the members first before upgrading the EM.

B.

Upgrading an appliance is done through Options/Modules.

C.

From the appliance CLI, fstool upgrade /tmp/counteract-v8.0.1.fsp

D.

Consult the CounterACT® Release Notes for the appropriate version

E.

Upgrade only the modules compatible with the version you are installing.

Question 8

When configuring policies, which of the following statements is true regarding the indicated property?

as

Select one:

Options:

A.

Irresolvable hosts would match the condition

B.

Negates the criteria inside the property

C.

Negates the criteria outside the property

D.

Modifies the irresolvable condition to TRUE

E.

Negates the "evaluate irresolvable as" setting

Question 9

When an admission event is seen, how are main rules and sub-rules processed?

Options:

A.

Main rules process concurrently, sub-rules process sequentially.

B.

Main rules process in parallel, sub-rules process concurrently.

C.

Main rules process concurrently, sub-rules process in parallel.

D.

Main rules process sequentially, sub-rules process concurrently.

E.

Main rules process sequentially, sub-rules process in parallel.

Question 10

When configuring policies, which of the following statements is true regarding this image?

as

Options:

A.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to True

B.

The external NOT does not change the meaning of "evaluate irresolvable as"

C.

Has no effect on irresolvable hosts

D.

Negates the criteria inside the property

E.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to False

Question 11

Which of the following statements is true regarding Layer-2 channel?

Options:

A.

Recommended when there are a large number of VLANs

B.

Response interface is a VLAN trunk

C.

Monitor interface is a trunk

D.

Utilizes two interfaces

E.

Appliance monitor interface must be connected to an access layer switch

Question 12

Which of the following switch actions cannot both be used concurrently on the same switch?

Options:

A.

Access Port ACL & Switch Block

B.

Switch Block & Assign to VLAN

C.

Endpoint Address ACL & Assign to VLAN

D.

Access Port ACL & Endpoint Address ACL

E.

Access Port ACL & Assign to VLAN

Question 13

Which field in the User Directory plugin should be configured for Active Directory subdomains?

Options:

A.

Replicas

B.

Address

C.

Parent Groups

D.

Domain Aliases

E.

DNS Detection

Question 14

Which of the following User Directory server settings is necessary to enable guest approval by sponsors?

Options:

A.

Policy to control

B.

Guest Tags

C.

Sponsor Group

D.

Guest password policy

E.

Authentication Server

Question 15

Which of the following is true when setting up an Enterprise Manager as a High Availability Pair?

Options:

A.

If HA reboots, this is an indication of a problem.

B.

Set up HA on the Secondary node first.

C.

Connect devices to the network and to each other.

D.

HA needs to be manually configured on the secondary appliance in order to sync correctly.

E.

HA requires a license.

Question 16

Which of the following is a User Directory feature?

Options:

A.

Guest authentication

B.

Dashboard

C.

Radius authorization

D.

Query Switches

E.

Assets portal

Question 17

When using the discover properties OS, Function, Network Function and NIC Vendor and Module, certain hosts may not be correctly profiled. What else may be used to provide additional possible details to assist in correctly profiling the host?

Options:

A.

Monitoring traffic

B.

Packet engine

C.

Advanced Classification

D.

NMAP Scanning

E.

Function

Question 18

Main rules are executed independently of each other. However, one policy may be set to run first by configuring which of the following?

Options:

A.

There is no way to cause one policy to run first

B.

Setting the Main Rule condition to utilize primary classification

C.

Categorizing the Policy as an assessment policy

D.

Categorizing the Policy as a classifier

E.

Using Irresolvable criteria

Question 19

Which of the following lists contain items you should verify when you are troubleshooting a failed switch change VLAN action?

Select one:

Options:

A.

The Switch Vendor is compatible for the change VLAN action

The Enterprise manager IP is allowed read VLAN access to the switch

The network infrastructure allows CounterACT SSH and SNMP Get traffic to reach the switch

The action is disabled in the policy

The Switch Model is compatible for ACL actions

The Enterprise manager IP is allowed write VLAN changes to the switch

The network infrastructure allows Cou

B.

The Switch Vendor is compatible for the change VLAN action

The managing appliance IP is allowed read VLAN access to the switch

The network infrastructure allows CounterACT SSH and SNMP Get traffic to reach the switch

The action is disabled in the policy

C.

The Switch Model is compatible for the change VLAN action

The managing appliance IP is allowed write VLAN changes to the switch

The network infrastructure allows CounterACT SSH and SNMP Set traffic to reach the switch

The action is enabled in the policy

D.

The Switch Vendor is compatible for all actions

The managing appliance IP is allowed read VLAN access to the switch

The network infrastructure allows CounterACT SSH and SNMP Set traffic to reach the switch

The action is enabled in the policy

Question 20

Proper policy flow should consist of...

Options:

A.

Modify as little as possible in discovery, each classify sub-rule should flow to an assess policy, IoT classify policies typically test ownership, IT classify usually indicates ownership.

B.

Modify as little as possible in discovery, each classify sub-rule should flow to an assess policy, IoT classify policies typically test manageability, IT classify usually indicates ownership.

C.

Modify as little as possible in discovery, each sub-rule should flow to assess. IT classify policies typically test manageability, IoT classify usually indicates ownership.

D.

Discovery should include customized sub-rules, each discovery sub-rule should flow to a classify policy, IT classify policies typically test manageability, IoT classify usually indicates ownership.

E.

Modify as little as possible in discovery, each discovery sub-rule should flow to a classify policy. IT classify policies typically test manageability, IoT classify usually indicates ownership.

Question 21

What is NOT an admission event?

Options:

A.

DHCP Request

B.

IP Address Change

C.

Host becomes offline

D.

Login to an authentication server

E.

New VPN user

Question 22

What Protocol does CounterACT use to verify the revocation status of certificates?

Options:

A.

PKI Certificate Revocation Protocol (PCRP)

B.

Online Certificate Status Protocol (OCSP)

C.

Online Revocation Status Protocol (ORSP)

D.

Certificate Revocation List Protocol (CRLP)

E.

Certificate Revocation Protocol (CRP)

Question 23

Which of the following is an example of a remediation action?

Options:

A.

Start SecureConnector

B.

Start Antivirus update

C.

Assign to VLAN

D.

Switch port block

E.

HTTP login

Question 24

Which of the following are true about the comments field of the CounterACT database? (Choose two)

Options:

A.

Endpoints may have multiple comments assigned to them

B.

It cannot be edited manually by a right click administrator action, it can only be edited in policy by using the action "Run Script on CounterACT"

C.

It can be edited manually by a right click administrator action, or it can be edited in policy by using the action "Run Script on CounterACT"

D.

Endpoints may have exactly one comment assigned to them

E.

It can be edited manually by a right click administrator action, or it can be edited in policy by using the action "Run Script on Windows"

Page: 1 / 8
Total 80 questions