Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Fortinet NSE5_FNC_AD_7.6 Dumps

Fortinet NSE 5 - FortiNAC-F 7.6 Administrator Questions and Answers

Question 1

A healthcare organization is integrating FortiNAC-F with its existing MDM. Communication is failing between the systems.

What could be a probable cause?

Options:

A.

Security Fabric traffic is failing

B.

SSH communication is failing

C.

REST API communication is failing

D.

SOAP API communication is failing

Question 2

When creating a device profiling rule, what is an advantage of modeling the endpoint as a device in the inventory view?

Options:

A.

The device will have historic connection logs.

B.

The devices can have scheduled connection status polling.

C.

The devices will have connection logs.

D.

The devices can be associated with a logged on user.

Question 3

When preparing network infrastructure devices for visibility, what are the two main advantages of using MAC notification traps on supported devices instead of link-up and link-down traps? (Choose two.)

Options:

A.

MAC notification traps include IP address information.

B.

Overhead on FortiNAC-F and the infrastructure device is reduced.

C.

Hosts connecting to downstream non-managed hubs are immediately learned.

D.

Faster visibility updates with only a slight increase in processing.

Question 4

Which two statements are true about integrating a third-party device using SNMP traps from that device as input to generate an event? (Choose two.)

Options:

A.

The sending device must be modeled in the inventory topology.

B.

The sending device must support SNMPv3.

C.

set allowaccess snmp must be configured using the CLI on the FortiNAC-F receiving interface.

D.

The IP address OID and MAC address OID must be configured in the trap MIB file.

Question 5

Refer to the exhibits.

as

as

as

An administrator is troubleshooting visibility issues on a modeled switch The switch is configured to use link traps and to provision hosts based on network access policies. The administrator is seeing hosts on ports with no hosts connected and not seeing hosts on ports where hosts are known to be connected.

What is the most likely cause?

Options:

A.

The logical networks are set to deny.

B.

The host has uninstalled the FortiNAC-F agent.

C.

The switch cannot be contacted by FortiNAC-F

D.

The credentials are incorrect.

Question 6

In which three ways would deploying a FortiNAC-F Manager into a large environment consisting of several FortiNAC-F CAs simplify management? (Choose three.)

Options:

A.

Global infrastructure device inventory

B.

Global version control

C.

Global authentication security policies

D.

Pooled licenses

E.

Global visibility

Question 7

Refer to the exhibit.

as

Which devices are automatically evaluated by these device profiling rules?

Options:

A.

Rogue devices, only when they are initially added to the database

B.

Known trusted devices, each time they connect

C.

All hosts, each time they connect

D.

Rogue devices, each time they change location

Question 8

Refer to the exhibit.

as

If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?

Options:

A.

The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

B.

The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM.

C.

The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

D.

The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM.

Question 9

Refer to the exhibit.

as

When a contractor account is created using this template, which value is set in the accounts Role field?

Options:

A.

Engineer-Contractor

B.

Eng-Contractor

C.

Contractor

D.

Accounting Contractor

Question 10

Refer to the exhibit.

as

Given this topology, and a layer 3 registration network configuration, which IP address would be designated in the DHCP relay configuration for the registration network?

Options:

A.

192.168.10.254

B.

192.168.100 75

C.

192.168.100.20

D.

192.168.200.10

Question 11

An administrator wants FortiNAC-F to pass firewall tags to FortiGate to leverage dynamic address groups used in firewall policies. On FortiNAC-F, what determines the values that are passed?

Options:

A.

Model configuration

B.

Device profiling rule

C.

Security rule

D.

RADIUS group attribute

Question 12

Refer to the exhibit.

as

What will happen to the host of a guest user created from this template if the time of connection is 8:00 PM?

Options:

A.

The host will be marked as non-authenticated.

B.

The host will be marked as a rogue device.

C.

The host will be marked as at-risk.

D.

The host will be administratively disabled.

Question 13

An administrator wants each department to create and manage its own contractor accounts but not be able to manage contractor accounts for other departments. What must the administrator configure to limit the sponsor ' s capabilities?

Options:

A.

The contractor ' s template

B.

The portal settings on the kiosk portal page

C.

The user/host profile applied to the contractor

D.

The sponsor ' s administrative profile

Question 14

When creating a user or host profile, which three criteria can you apply? (Choose three.)

Options:

A.

Host or user group memberships

B.

Host or user attributes

C.

Adapter current VLAN

D.

An applied access policy

E.

Location

Question 15

What must an administrator configure to allow FortiNAC-F to process incoming syslog messages that are not supported by default?

Options:

A.

A Syslog Service Connector

B.

A Security Action

C.

A Security Event Parser

D.

A Log Receiver

Question 16

An administrator manages a corporate environment where all users log into the corporate domain each time they connect to the network. The administrator wants to leverage login scripts to use a FortiNAC-F agent to enhance endpoint visibility

Which agent can be deployed as part of a login script?

Options:

A.

Persistent

B.

Dissolvable

C.

Mobile

D.

Passive

Question 17

Refer to the exhibit.

as

When configuring guest access using a network access policy, where would an administrator configure the Guest-VLAN value?

Options:

A.

In the Model configuration

B.

In the Guest template

C.

In the User/Host profile

D.

in the Guest portal configuration

Page: 1 / 6
Total 59 questions