● NSE 5 - FortiNAC 7.2 Exam Materials
Please note that the exam "NSE 5 - FortiNAC 7.2 Exam" is no longer offered by Fortinet and is not available for booking through Pearson VUE, so we opened it on free view,
It has been replaced by the exam "NSE 5 - FortiNAC-F 7.6 Administrator"
The new exam version is available on Brave-Dumps and can be purchased.
It has been replaced by the exam "NSE 5 - FortiNAC-F 7.6 Administrator"
The new exam version is available on Brave-Dumps and can be purchased.
Question #1
Question #2
Where should you configure MAC notification traps on a supported switch? (Choose one answer)
- A. Configure them only on ports that generate linkup and linkdown traps.
- B. Configure them only on uplink ports.
- C. Configure them on all ports on the switch.
- D. Configure them on all ports except uplink ports.
Question #3
Which group type can have members added directly from the FortiNAC Control Manager? (Choose one answer)
- A. Port
- B. Host
- C. Administrator
- D. Device
Question #4
Which two methods can be used to gather a list of installed applications and application details, from a host? (Choose two answers)
- A. Application layer traffic inspection
- B. Agent technology
- C. MDM integration
- D. Portal page on-boarding options
Question #5
When creating a user or host profile, which three criteria can you apply? (Choose three answers)
- A. Location
- B. An applied access policy
- C. Host or user group memberships
- D. Administrative group membership
- E. Host or user attributes
Question #6
When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed? (Choose one answer)
- A. RADIUS group attribute
- B. Device profiling rule
- C. Logical network
- D. Security rule
Question #7
With enforcement for network access policies and at-risk hosts enabled, what happens if a host matches a network access policy and has a state of “at risk”? (Choose one answer)
- A. The host is isolated
- B. The host is provisioned based on the network access policy
- C. The host is administratively disabled
- D. The host is provisioned based on the default access defined by the point of connection
Question #8
What is the purpose of the FortiGate firewall policy that applies to clients not yet authorized by FortiNAC? (Choose one answer)
- A. To allow access to only the production DNS server
- B. To deny access to only the FortiNAC VPN interface
- C. To deny access to only the production DNS server
- D. To allow access to only the FortiNAC VPN interface
Question #9
When FortiNAC is managing VPN clients connecting through FortiGate, why must the clients run a FortiNAC agent? (Choose one answer)
- A. To meet the client security profile rule for scanning connecting clients
- B. To transparently update the client IP address upon successful authentication
- C. To collect user authentication details
- D. To collect the client IP address and MAC address
Question #10
Which three are components of a security rule? (Choose three answers)
- A. Methods
- B. User or host profile
- C. Security String
- D. Action
- E. Trigger
Which devices are evaluated by device profiling rules? (Choose one answer)