Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet NSE 6 Network Security Specialist NSE6_FNC-7.2 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam NSE6_FNC-7.2 Premium Access

View all detail and faqs for the NSE6_FNC-7.2 exam


412 Students Passed

88% Average Score

98% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

When FortiNAC is managing VPN clients connecting through FortiGate. why must the clients run a FortiNAC agent?

Options:

A.

To collect user authentication details

B.

To meet the client security profile rule for scanning connecting clients

C.

To collect the client IP address and MAC address

D.

To transparently update the client IP address upon successful authentication

Questions # 2:

When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?

Options:

A.

Security rule

B.

Device profiling rule

C.

RADIUS group attribute

D.

Logical network

Questions # 3:

Where are logical network values defined?

Options:

A.

In the model configuration view of each infrastructure device

B.

In the port properties view of each port

C.

On the profiled devices view

D.

In the security and access field of each host record

Questions # 4:

How does FortiGate update FortiNAC about VPN session information?

Options:

A.

API calls to FortiNAC

B.

Syslog messages

C.

SNMP traps

D.

Security Fabric Integration

Questions # 5:

Which two of the following are required for endpoint compliance monitors? (Choose two.)

Options:

A.

Persistent agent

B.

Logged on user

C.

Security rule

D.

Custom scan

Questions # 6:

In which view would you find who made modifications to a Group?

Options:

A.

The Event Management view

B.

The Security Events view

C.

The Alarms view

D.

The Admin Auditing view

Questions # 7:

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?

Options:

A.

SNMP traps

B.

RADIUS

C.

Endstation traffic monitoring

D Link traps

Questions # 8:

What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?

Options:

A.

Only rogue hosts would be impacted.

B.

Both enforcement groups cannot contain the same port.

C.

Only al-risk hosts would be impacted.

D.

Both types of enforcement would be applied.

Questions # 9:

Refer to the exhibit.

Question # 9

What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

Options:

A.

Multiple enforcement groups could not contain the same port.

B.

Only the higher ranked enforcement group would be applied.

C.

Both types of enforcement would be applied.

D.

Enforcement would be applied only to rogue hosts.

Questions # 10:

What capability do logical networks provide?

Options:

A.

Point of access-base autopopulation of device groups'

B.

Interactive topology view diagrams

C.

Application of different access values from a single access policy

D.

IVLAN -based inventory reporting

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.