Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet NSE 6 Network Security Specialist NSE6_FNC-9.1 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam NSE6_FNC-9.1 Premium Access

View all detail and faqs for the NSE6_FNC-9.1 exam


428 Students Passed

89% Average Score

91% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

Options:

A.

Physical Address Filtering

B.

Forced Quarantine

C.

Forced Isolation

D.

Forced Remediation

Questions # 2:

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.

What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

Options:

A.

To deny access to only the production DNS server

B.

To allow access to only the FortiNAC VPN interface

C.

To allow access to only the production DNS server

D.

To deny access to only the FortiNAC VPN interface

Questions # 3:

Which command line shell and scripting language does FortiNAC use for WinRM?

Options:

A.

Linux

B.

Bash

C.

DOS

D.

Powershell

Questions # 4:

Which two of the following are required for endpoint compliance monitors? (Choose two.)

Options:

A.

Persistent agent

B.

Logged on user

C.

Security rule

D.

Custom scan

Questions # 5:

Where are logical network values defined?

Options:

A.

In the model configuration view of each infrastructure device

B.

In the port properties view of each port

C.

On the profiled devices view

D.

In the security and access field of each host record

Questions # 6:

View the command and output shown in the exhibit.

Question # 6

What is the current state of this host?

Options:

A.

Rogue

B.

Registered

C.

Not authenticated

D.

At-Risk

Questions # 7:

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

Options:

A.

Agent technology

B.

Portal page on-boarding options

C.

MDM integration

D.

Application layer traffic inspection

Questions # 8:

Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)

Options:

A.

A security event parser must be created for the device.

B.

The device sending the messages must be modeled in the Network Inventory view.

C.

The device must be added as a patch management server.

D.

The device must be added as a log receiver.

Questions # 9:

An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?

Options:

A.

A security trigger activity

B.

A security filter

C.

An event to alarm mapping

D.

An event to action mapping

Questions # 10:

Which agent is used only as part of a login script?

Options:

A.

Mobile

B.

Passive

C.

Persistent

D.

Dissolvable

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.