● Fortinet NSE 6 - FortiNAC 7.2 Actual Exam Materials
The Actual questions for Fortinet NSE 6 - FortiNAC 7.2 (NSE6_FNC-7.2) - Updated Weekly
Exam Questions: 51
Question #1
Question #2
Where should you configure MAC notification traps on a supported switch? (Choose one answer)
- A. Configure them only on ports that generate linkup and linkdown traps.
- B. Configure them only on uplink ports.
- C. Configure them on all ports on the switch.
- D. Configure them on all ports except uplink ports.
Question #3
Which group type can have members added directly from the FortiNAC Control Manager? (Choose one answer)
- A. Port
- B. Host
- C. Administrator
- D. Device
Question #4
Which two methods can be used to gather a list of installed applications and application details, from a host? (Choose two answers)
- A. Application layer traffic inspection
- B. Agent technology
- C. MDM integration
- D. Portal page on-boarding options
Question #5
When creating a user or host profile, which three criteria can you apply? (Choose three answers)
- A. Location
- B. An applied access policy
- C. Host or user group memberships
- D. Administrative group membership
- E. Host or user attributes
Question #6
When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed? (Choose one answer)
- A. RADIUS group attribute
- B. Device profiling rule
- C. Logical network
- D. Security rule
Question #7
With enforcement for network access policies and at-risk hosts enabled, what happens if a host matches a network access policy and has a state of “at risk”? (Choose one answer)
- A. The host is isolated
- B. The host is provisioned based on the network access policy
- C. The host is administratively disabled
- D. The host is provisioned based on the default access defined by the point of connection
Question #8
What is the purpose of the FortiGate firewall policy that applies to clients not yet authorized by FortiNAC? (Choose one answer)
- A. To allow access to only the production DNS server
- B. To deny access to only the FortiNAC VPN interface
- C. To deny access to only the production DNS server
- D. To allow access to only the FortiNAC VPN interface
Question #9
When FortiNAC is managing VPN clients connecting through FortiGate, why must the clients run a FortiNAC agent? (Choose one answer)
- A. To meet the client security profile rule for scanning connecting clients
- B. To transparently update the client IP address upon successful authentication
- C. To collect user authentication details
- D. To collect the client IP address and MAC address
Question #10
Which three are components of a security rule? (Choose three answers)
- A. Methods
- B. User or host profile
- C. Security String
- D. Action
- E. Trigger
Which devices are evaluated by device profiling rules? (Choose one answer)