View all questions & answers for the NSE 5 - FortiNAC 7.2 Exam Materials exam


Question 1 Discussion

Which devices are evaluated by device profiling rules? (Choose one answer)

  • A. All hosts, each time they connect
  • B. Known trusted devices, each time they connect
  • C. Rogue devices, only when they are initially added to the database
  • D. Rogue devices, each time they change location
Correct Answer: C

Brave-Dump Clients Votes

C 60%
D 40%

Comments



Emmanuel Sakala 2025-06-03 17:08:03

Selected Answers: D


Rogue devices, each time they change location


Emmanuel Sakala 2025-06-06 18:18:18

Selected Answers: D


Rogue devices, each time they change location


Mahboab Ali Ghaleb 2025-09-09 00:26:14

Selected Answers: C


FortiNAC 7.2 Study guide, p. 114.
Note that devices (Rouge devices) are initially evaluated against device profiling rules only if they do not exist in the database. This prevents unnecessary rule evaluation for devices that already exist in the database.
Device profiling rules in FortiNAC are used to classify unknown/rogue devices when they first appear or discovered on the network for the first time. Once a device is in the database (known/trusted), profiling isn’t repeated every time it connects.
in other words, more clearly:
When it connects again, it is evaluated against the network access policies and confirmation rules, not the initial device profiling rules. This is why options A, B, and D are incorrect.


Mahboab Ali Ghaleb 2025-09-09 18:25:40

Selected Answers: C


C is correct


Diogo 2025-11-05 00:00:57

Selected Answers: C


FortiNAC 7.2 Study guide, p. 114.

Correct Answer:
C. Rogue devices, only when they are initially added to the database

Explanation:
As stated in the course, FortiNAC evaluates device profiling rules only for devices that are not already in the database. When a new (rogue) device connects for the first time, it is added to the database and then evaluated against the profiling rules. Once a device exists in the database, it is not re-evaluated every time it connects, which helps avoid unnecessary rule processing.